ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Hard disk encryption without OS access?

    IT Discussion
    6
    57
    2.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      JasGot
      last edited by

      We have a customer who is being told they have to ensure all their data is encrypted when at rest. They are being told by their franchisor.

      The software product they use for running their business is the only app on the server and the software vendor will not allow access to the server OS.

      I know the hard ball way to deal with this, but I am looking to know and consider all of our options.

      Moving away from the current software vendor is a nearly insurmountable task.

      The software is running on Red Hat. Not sure which version.

      JaredBuschJ scottalanmillerS pmonchoP DashrenderD 5 Replies Last reply Reply Quote 1
      • JaredBuschJ
        JaredBusch @JasGot
        last edited by

        @JasGot said in Hard disk encryption without OS access?:

        software vendor will not allow access to the server OS.

        This is an impossible ask. You cannot install applications without the proper access.

        1 Reply Last reply Reply Quote 0
        • JaredBuschJ
          JaredBusch @JasGot
          last edited by

          @JasGot said in Hard disk encryption without OS access?:

          encrypted when at rest.

          Define encrypted at rest please. From the flow of your post, I assume it means when the server is shut off.

          J 1 Reply Last reply Reply Quote 1
          • scottalanmillerS
            scottalanmiller @JasGot
            last edited by

            @JasGot said in Hard disk encryption without OS access?:

            We have a customer who is being told they have to ensure all their data is encrypted when at rest. They are being told by their franchisor.

            The software product they use for running their business is the only app on the server and the software vendor will not allow access to the server OS.

            I know the hard ball way to deal with this, but I am looking to know and consider all of our options.

            Moving away from the current software vendor is a nearly insurmountable task.

            The software is running on Red Hat. Not sure which version.

            Move the install to production (e.g. virtualization) and encrypt the VM storage at a higher level. Easy, clean, done.

            1 Reply Last reply Reply Quote 1
            • pmonchoP
              pmoncho @JasGot
              last edited by

              @JasGot said in Hard disk encryption without OS access?:

              We have a customer who is being told they have to ensure all their data is encrypted when at rest. They are being told by their franchisor.

              The software product they use for running their business is the only app on the server and the software vendor will not allow access to the server OS.

              I know the hard ball way to deal with this, but I am looking to know and consider all of our options.

              Moving away from the current software vendor is a nearly insurmountable task.

              The software is running on Red Hat. Not sure which version.

              If the client controls the server hardware, then SED SSD is a an option.

              scottalanmillerS 1 Reply Last reply Reply Quote 1
              • scottalanmillerS
                scottalanmiller @pmoncho
                last edited by

                @pmoncho said in Hard disk encryption without OS access?:

                If the client controls the server hardware, then SED SSD is a an option.

                If they control the hardware, they can virtualize. Just image the system and done.

                J 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller
                  last edited by

                  How are you taking backups today?

                  J 1 Reply Last reply Reply Quote 0
                  • J
                    JasGot @JaredBusch
                    last edited by

                    @JaredBusch said in Hard disk encryption without OS access?:

                    Define encrypted at rest please. From the flow of your post, I assume it means when the server is shut off.

                    The data on the drive. The OS will decrypt it when it or an application needs access.

                    So powered off, yes. Or another OS, like a live boot from usb or CD.

                    Self Encrypted Drives seem to be the only way to go. We may be be stuck with going to their cloud platform.... 😞

                    JaredBuschJ scottalanmillerS 5 Replies Last reply Reply Quote 0
                    • JaredBuschJ
                      JaredBusch @JasGot
                      last edited by

                      @JasGot said in Hard disk encryption without OS access?:

                      Self Encrypted Drives seem to be the only way to go.

                      Generally, SED are decrypted on boot by the TPM, so booting to a USB will still decrypt the drive.

                      If not, then there is no way to boot the system functional without a user present.

                      scottalanmillerS J 2 Replies Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @JasGot
                        last edited by

                        @JasGot said in Hard disk encryption without OS access?:

                        The data on the drive. The OS will decrypt it when it or an application needs access.

                        If the OS decrypts it, that's not really encrypted at rest per se because while technically you CAN stop it from being read, it's not really encrypted as it is automatically readable just be being powered on. There's no "working" encryption. Technically it might fool someone, but it meets no test of intent. To a casual intruder, they'd never know it was encrypted, even if the system got powered off.

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @JasGot
                          last edited by

                          @JasGot said in Hard disk encryption without OS access?:

                          Self Encrypted Drives seem to be the only way to go. We may be be stuck with going to their cloud platform

                          Why not do what I said? Seems like a REALLY simple solution that actually solves every aspect of the problem, including intent.

                          J 1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @JasGot
                            last edited by

                            @JasGot said in Hard disk encryption without OS access?:

                            The OS will decrypt it when it or an application needs access.

                            This is not how anything works. I mean sure, it is what you want, but it is not how anything is actually designed.

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @JaredBusch
                              last edited by

                              @JaredBusch said in Hard disk encryption without OS access?:

                              If not, then there is no way to boot the system functional without a user present.

                              That would be the intent of any "encrypted at rest" request. When you get that legal requirement, it means either a human or a complex automated system acting like a human (a TFA system, for example) has to be involved to decrypt the data. That's the sole intent of the rule.

                              It's a bad way to write it, I realize. But the concept of encrypted at rest means human interaction to access, by any useful definition.

                              Otherwise, all data is encrypted at rest already by the nature of being encoded in ASCII or whatever.

                              J 1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @JaredBusch
                                last edited by

                                @JaredBusch said in Hard disk encryption without OS access?:

                                @JasGot said in Hard disk encryption without OS access?:

                                The OS will decrypt it when it or an application needs access.

                                This is not how anything works. I mean sure, it is what you want, but it is not how anything is actually designed.

                                If it is a database, it has to decrypt it before loading the database. If it is a file (used for a database or whatever) it decrypts it to open it the first time and it is decrypted once open.

                                1 Reply Last reply Reply Quote 0
                                • JaredBuschJ
                                  JaredBusch @JasGot
                                  last edited by

                                  @JasGot said in Hard disk encryption without OS access?:

                                  The OS will decrypt it when it needs access.

                                  This means that the data is basically not encrypted as long as the OS is booted. Also, no system works this way.

                                  Encrypted volumes are unlocked by the OS once and remain unlocked. No system that exists in the normal space works like you are wanting.

                                  scottalanmillerS 1 Reply Last reply Reply Quote 1
                                  • scottalanmillerS
                                    scottalanmiller
                                    last edited by

                                    When I worked in sovereign trusts we sometimes had to do this and every time required huge discussions because encrypted at rest is such an insanely bad idea generally. Especially for servers.

                                    But the answer was always this... if the system lost power or rebooted for any reason, the concept of encryption at rest required, no ifs, ands or buts, that a human with extremely high level authorization had to decrypt the data because the purpose of encryption at rest was to ensure that using power, OS changes, or reboots could not be used to bypass the encryption. Anything else while meeting the requirements of the English phrase "encrypted at rest" did not meet the engineering requirements in IT of the concept.

                                    It's like redundancy. In English it means two of something. In engineering it means secondary backup mechanisms to protect against primary failure.

                                    In IT, encrypted at rest means human (or similar) interaction.

                                    1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @JaredBusch
                                      last edited by

                                      @JaredBusch said in Hard disk encryption without OS access?:

                                      @JasGot said in Hard disk encryption without OS access?:

                                      The OS will decrypt it when it needs access.

                                      This means that the data is basically not encrypted as long as the OS is booted. Also, no system works this way.

                                      Encrypted volumes are unlocked by the OS once and remain unlocked. No system that exists in the normal space works like you are wanting.

                                      He's correct. If it is the hard drive you are thinking of, that decrypts the moment it gets first accessed (meaning mounted.) If it is an OS-encrypted drive, same thing, it decrypts on mount. If you are encrypting file by file, it decrypts the first time it is accessed and stays that way generally until reboot.

                                      "At rest" is when the system is powered down or, maybe, unmounted. That's all.

                                      Encrypted at rest provides nearly zero real world data protection, even in the biggest enterprise spaces protecting trillions of dollars of assets, it borders on being a joke (for servers) due to RAID and other obfuscation functions. It has a time and a place, but the ENTIRETY of its value comes from the requirement of a human to verify a lack of tampering before allowing a system to power on.

                                      ObsolesceO 1 Reply Last reply Reply Quote 0
                                      • ObsolesceO
                                        Obsolesce @scottalanmiller
                                        last edited by

                                        @scottalanmiller encrypted at rest is just full disk encryption, like all modern Android and Apple phones do, Filevault for Mac, BitLocker with Windows, FDE like when setting up Ubuntu. Set up properly, e.g., encryption startup PIN, among others, definitely provides a lot of benefit and is a defacto standard these days. The issue is that so many do not do it correctly, for the wrong reasons, and with the wrong idea.

                                        An easy way to see it in practice where it works, imagine if everyone's smart phones were not encrypted at rest, they are, which is why authorities have such issue with it (I mean if samsung/apple weren't forced to create back doors for the government).

                                        scottalanmillerS 3 Replies Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @Obsolesce
                                          last edited by

                                          @Obsolesce said in Hard disk encryption without OS access?:

                                          @scottalanmiller encrypted at rest is just full disk encryption, like all modern Android and Apple phones do, Filevault for Mac, BitLocker with Windows, FDE like when setting up Ubuntu.

                                          With Android or iPhone, they require human intervention to unlock. So that's exactly what I just described. That's why you can reboot a phone to keep the police from just getting into it, because it can't be decrypted without the human.

                                          ObsolesceO 1 Reply Last reply Reply Quote 1
                                          • scottalanmillerS
                                            scottalanmiller @Obsolesce
                                            last edited by

                                            @Obsolesce said in Hard disk encryption without OS access?:

                                            An easy way to see it in practice where it works, imagine if everyone's smart phones were not encrypted at rest, they are, which is why authorities have such issue with it (I mean if samsung/apple weren't forced to create back doors for the government).

                                            Exactly, so you have to do the same with the server. If no human interaction is needed to decrypt, the police or a hacker will get the hardware, turn it on, and never know that you thought it was encrypted. Because at a system level, it's not at all.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post