Self-Encrypting Drives for
Servers, NAS and SAN Arrays
Overview
This paper discusses the challenge of securing data on hard
drives that will inevitably leave the owner’s control. It introduces
Self-Encrypting Drives (SED), which may be used in two ways: to
provide instant secure erase (cryptographic erase or making the
data no longer readable), and to enable auto-locking to secure
active data if a drive is misplaced or stolen from a system while in
use. Two appendices then follow: The first compares SEDs to other
encryption technologies used to secure drive data. The second
provides detailed analysis of instant secure erase and auto-lock
SED technology, explaining how SEDs are used in servers, NAS and
SAN arrays, virtualized environments, RAIDs, JBODs and discrete
drives.
Introduction
When hard drives are retired and moved outside the physically
protected data center into the hands of others, the data on those
drives is put at significant risk. IT departments routinely retire drives
for a variety of reasons, including:
•
Returning drives for warranty, repair or expired lease agreements
•
Removal and disposal of drives
•
Repurposing drives for other storage duties
Nearly all drives eventually leave the data center and their owners’
control; Seagate estimates that 50,000 drives are retired from data
centers daily. Corporate data resides on such drives, and when
most leave the data center, the data they contain is still readable.
Even data that has been striped across many drives in a RAID array
is vulnerable to data theft, because just a typical single stripe in
today’s high-capacity arrays is large enough to expose hundreds of
names and social security numbers.
Self-Encrypting Drives for
Servers, NAS and SAN Arrays
Drive Control Headaches and Disposal Costs
In an effort to avoid data breaches and the
ensuing customer notifications required by data
privacy laws, corporations have tried a myriad of
ways to erase the data on retired drives before
they leave the premises and potentially fall into
the wrong hands. Current retirement practices
designed to make data unreadable rely on
significant human involvement in the process,
and are thus subject to both technical and human
failure.
The drawbacks of today’s drive retirement
practices are both numerous and far-reaching:
•
Overwriting drive data is expensive, tying
up valuable system resources for days. No
notification of completion is generated by the
drive, and overwriting won’t cover reallocated
sectors, leaving that data exposed.
•
Degaussing or physically shredding a drive
are both costly. It’s difficult to ensure the
degauss strength is optimized for the drive
type, potentially leaving readable data on
the drive. Physically shredding the drive
is environmentally hazardous, and neither
practice allows the drive to be returned for
warranty or expired lease.
•
Some corporations have concluded the only
way to securely retire drives is to keep them
in their control, storing them indefinitely in
warehouses. But this is not truly secure, as
a large volume of drives coupled with human
involvement inevitably leads to some drives
being lost or stolen.
•
Other companies choose to hire professional
disposal services, an expensive option which
entails the cost of reconciling the services as
well as internal reports and auditing. More
troubling, transporting a drive to the service
puts the drive’s data at risk. Just one lost drive
could cost a company millions of dollars in
remedies for the breached data.
With these shortcomings in mind, it’s no surprise
that an IBM study found that 90 percent of the
drives returned to IBM were still readable. The key
lesson here? It’s not just the drive that’s exiting
the data center, it’s also the data stored within.
Encryption
Every day, thousands of terabytes of data leave
data centers as old systems are retired. But what
if all those hard drives had been automatically
and transparently encrypting that data, enabling
it to be instantly and securely erased? A majority
of U.S. states now have data privacy laws that
exempt encrypted data from mandatory reports
of data breaches. And make no mistake, the
cost of data exposure is high—US$6.6 million on
average1.
Challenges with performance, scalability and
complexity have led IT departments to push
back against security policies that require the
use of encryption. In addition, encryption has
been viewed as risky by those unfamiliar with key
management, a process for ensuring a company
can always decrypt its own data. Self-Encrypting
Drives comprehensively resolve these issues,
making encryption for drive retirement both easy
and affordable.
We’ll discuss two security scenarios:
•
SEDs that provide instant secure erase without
the need to manage keys
•
Auto-locking SEDs that help secure active data
against theft with key lifecycle management
21 2008 Annual Study: Co st of a Data Breach, Ponemon Institute, Februar y 2009
Self-Encrypting Drives for
Servers, NAS and SAN Arrays
Instant Secure Erase Without Managing Keys
The Self-Encrypting Drive provides instant data
destruction via cryptographic erase. When
the SED is in normal use, its owner need not
maintain authentication keys (otherwise known
as credentials or passwords) in order to access
the drive’s data. The SED will encrypt data being
written to the drive and decrypt data being read
from it, all without requiring an authentication key
from the owner.
When it’s time to retire or repurpose the drive,
the owner sends a command to the drive to
perform a cryptographic erase. Cryptographic
erase simply replaces the encryption key inside
the encrypted drive, making it impossible to ever
decrypt the data encrypted with the deleted key.
(A more detailed explanation of how secure erase
works appears in Appendix A.)
Self-Encrypting Drives reduce IT operating
expenses by freeing IT from both drive control
headaches and disposal costs. The SED’s
government-grade data security helps ensure
Safe Harbor for data privacy compliance without
hindering IT efficiency. Furthermore, SEDs
simplify decommissioning and preserve hardware
value for returns and repurposing by:
•
Eliminating the need to overwrite or destroy the
drive
•
Securing warranty and expired lease returns
•
Enabling drives to be repurposed securely
Auto-Locking Self-Encrypting Drives With
Key Lifecycle Management
Beyond using a Self-Encrypting Drive for instant
secure erase at retirement, the drive owner
may also choose to employ that same SED in
the auto-lock mode to help secure active data
against theft. Insider theft or misplacement is a
growing concern for businesses of all sizes; in
addition, managers of branch offices and small
businesses without strong physical security face
greater vulnerability to external theft.
Utilizing the SED in auto-lock mode simply
requires securing the drive during its normal use
with an authentication key. When secured in this
manner, the drive’s data encryption key is locked
whenever the drive is powered down. In other
words, the moment the SED is switched off or
unplugged, it automatically locks down the drive’s
data.
When the SED is then powered back on, the
SED requires authentication before being able to
unlock its encryption key and read any data on
the drive, thus protecting against misplacement
and insider or external theft.
The lifecycle of authentication keys can be
managed by the IBM Tivoli Key Lifecycle
Manager (formerly Encryption Key Manager),
which is a Java-based software program
that centrally generates, protects, stores and
backs up authentication keys. It is a unified
key management service that will support the
key management requirements for all forms of
storage (as well as other security applications).
IBM, LSI and Seagate will support the Key
Management Interoperability Protocol submitted
to OASIS for advancement through their open
standards process. With its platform neutrality,
IBM Tivoli Key Lifecycle Manager offers a simple
and effective method for managing the growing
number of encryption keys across the enterprise.
The auto-lock mode of Self-Encrypting Drives and
IBM Tivoli Key Lifecycle Manager is discussed in
detail in Appendix A.
The owner of a Self-Encrypting Drive is able to
use the SED first in secure erase-only mode, and
then later change that SED to auto-lock mode.
Later, after performing an instant secure erase
and repurposing the drive, the drive may then go
back to being used in secure erase-only mode.
So, initially, the drive owner may choose to leave
the SED in secure erase only mode during normal
operation, intending to just perform an instant
secure erase when needed. Later, perhaps
due to growing concerns over theft, the owner
may elect to use the SED in auto-lock mode for
the remainder of the owner’s use of the drive,
by simply creating an authentication key that
wraps the existing encryption key. Subsequently,
once the SED has been securely erased and
repurposed, its new owner may decide to not put
the drive in auto-lock mode and use the drive in
secure erase-only mode to securely erase the
drive at the end of its useful life.
3
Self-Encrypting Drives for
Servers, NAS and SAN Arrays
Using Self-Encrypting Drives merely for instant
secure erase provides an extremely efficient and
effective means to help securely retire a drive.
But using SEDs in auto-lock mode provides even
more advantages. In short, from the moment the
drive or system is removed from the data center
(with or without authorization), the drive is locked.
No advance thought or action is required from
the data center administrator to protect this data.
This helps prevent a breach should the drive be
mishandled and helps secure the data against the
threat of insider or outside theft.
Comparing Technologies for Securing Data
on Hard Drives
No single encryption technology can effectively
and efficiently secure all data against all threats.
Different technologies are used to protect against
different threats. For example, Self-Encrypting
Drives help secure data against threats when the
drive eventually leaves the owner’s control, but
it cannot protect data from certain threats that
take place within the data center. For example, if
an attacker gains access to a server that can in
turn access an unlocked drive, the attacker can
read the clear text coming from the drive. Thus
it’s important to remember that SED encryption
technology does not replace the data center’s
access controls, rather it complements them.
Securing data at rest also should be
complementary, rather than a replacement, to
securing data in motion. The vast majority of data
in motion moving over the wire downstream of
the file system, whether moving over Ethernet
on the NAS or at the block level on a SAN, is
physically under the IT storage administrator’s
control, and therefore is not considered a
security risk. For the data in motion that is not
physically under the administrator’s control, the
most widely accepted and established practice
for encrypting this data is to use IPSec or FC
over IP, which use ephemeral session encryption
keys to encrypt small amounts of data. It may
seem that, instead of using this session security
technique, encrypting in the fabric to secure the
data on the hard drive is a better solution: the
data is encrypted not only on the hard drive,
but also as it travels through the fabric. But this
4
approach has an a fundamental flaw: Rather than
increasing security, it actually decreases security
and increases complexity by exposing encryption
keys that are long-lived keys, while exposing large
amounts of cipher text that were all encrypted
with only a single encryption key. If encryption is
needed for data in motion, it should be provided
by IPSec or FC over IP. Encrypting data on the
drive is best performed by the drive itself, for all of
the reasons provided below.
Application, database, OS and file system
encryption (see Figure 1) are all techniques
that cover threats to drive data (whether from
database, file or system administrators or from
hackers) that arise within the data center. But due
to the significant performance degradation and
non-scalable changes required to the application,
database, OS or file system that such encryption
entails, it’s impractical to encrypt more than just a
limited portion of data. Administrators cope with
this restriction by reserving encryption for only the
most sensitive data.
This forces administrators to rely on data
classification in order to identify and locate
sensitive data; unfortunately, it’s widely
acknowledged that this process fails to identify
all instances of sensitive data. Data classification
is difficult, labor-intensive and challenging to
maintain, especially when sensitive information
can be copied from a protected source to an
unprotected destination. Such problems result
in too much unencrypted sensitive data being
written to disk, data which will likely persist on
the hard drive long after the drive’s useful life has
ended.
As such, it falls to encryption technologies
downstream of the file system to provide full disk
encryption and close the gap created when data
classification fails to capture sensitive data. These
technologies relieve data custodians from the
responsibility of classifying the data’s sensitivity
upon leaving control of the data center, a task
fraught with management headaches and extra
cost. Encrypting in the fabric, RAID disk controller
(in a server or storage subsystem controller) or
hard drive are all possibilities. But where should
this encryption take place?
Self-Encrypting Drives for
Servers, NAS and SAN Arrays
Figure 1.
Several years ago, before Seagate began working
on drive encryption, the United States National
Security Agency (NSA) analyzed the problem of
data security and determined that the best place
to perform encryption is in the hard drive. It’s a
well-known security maxim that guards should
be placed as close to the jewels as possible.
Similarly, encrypting within the hard drive is
optimal because that’s precisely where the
data resides. SEDs boast superior technology
to provide full disk encryption, lowering total
cost of ownership for servers’ direct-attached
storage, SANs and NAS storage while delivering
compelling advantages:
•
Simplified Key Management: SED eliminates
the need to track or manage a data encryption
key; when used for secure erase only, there’s
no need to track or manage an authentication
key either.
•
Reduced Costs via Standardized
Technology: Employing industry-standardized
technology cuts costs and ensures common
technology is used across SAN, NAS, server,
desktop, notebook and portable storage
platforms.
•
Optimum Storage Efficiency: Unlike some
encryption technologies, SED enables data
compression and de-duplication to maximize
value of disk storage capacity.
•
Increased Data Integrity: SED enables
Protection Information, the future of data
integrity, and does not impact hard drive’s
reliability or warranty.
•
Maximum Performance and Scalability: SED
performs at full drive speed while also scaling
linearly and automatically.
•
No Data Classification : Expensive, time-
consuming data classification is not needed to
maintain peak performance.
•
Reduced Re-Encr yption : SED ensures there
is less need to re-key and re-encrypt, because
the data encryption key is never exposed.
•
Superior Security: NSA qualified the first
SED model. SED doesn’t weaken security by
needlessly encrypting the storage fabric, which
exposes long-lived cipher text and keys. SED
leaves over-the-wire encryption to technologies
designed for securing data in motion
5
Loading...
+ 10 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.