ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Local Encryption Scenarios

    IT Discussion
    security encryption full disk encryption
    7
    45
    3.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      Desktops are more likely to be stolen when locked (or off.) Desktops are typically stolen from an office during off hours or when people are away. Laptops are typically stolen when out of the office and "out" somewhere, being used. Swiped from a table or whatever when someone looks away. If stolen from a bag or car, almost certainly locked. But if taken from a cafe or whatever, almost certainly unlocked.

      Using local encryption has a massive risk of making people feel that they could ignore good security because "everything is encrypted, right"? Except it isn't, while in use.

      1 Reply Last reply Reply Quote 0
      • BRRABillB
        BRRABill @dbeato
        last edited by

        @dbeato said in Local Encryption Scenarios:

        @scottalanmiller said in Local Encryption Scenarios:

        @dbeato said in Local Encryption Scenarios:

        @scottalanmiller said in Local Encryption Scenarios:

        @dbeato said in Local Encryption Scenarios:

        @scottalanmiller said in Local Encryption Scenarios:

        @BRRABill said in Local Encryption Scenarios:

        They must use a local PC, because that is the only way their CPA software will run.

        There is no such software, this is a false situation. This is a hypothetical that will never apply in the real world. So sure, we might get a contrived answer in this scenario, but it won't be useful.

        How is this a false situation?

        There is no such software. You can't actually make software that has to run on a laptop to work (you COULD make a license like that, but no one has.)

        It's false, because this situation can't exist in the real world today. Anyone making it happen would be doing so purely for the purpose of making an example like this come true. It has no technical or market value.

        I understand, as a software based yes it is not dictated by which computer it is installed unless is a software with a USB Dongle or something like that.

        Even that, rarely would a dongle cause an issue either. You can still access the machine that has the dongle in it remotely.

        Yeah, but not everyone wants to pay for it (Be it extra device, server, cloud service and so forth). I think that is the biggest issue when dealing with things like these.

        That is kind of where I am going with this question.

        Yes, you can use cloud VMs and cloud CPA software (in this example) but why not just encrypt the machine with VeraCrypt for free?

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @dbeato
          last edited by

          @dbeato said in Local Encryption Scenarios:

          @scottalanmiller said in Local Encryption Scenarios:

          @dbeato said in Local Encryption Scenarios:

          @scottalanmiller said in Local Encryption Scenarios:

          @dbeato said in Local Encryption Scenarios:

          @scottalanmiller said in Local Encryption Scenarios:

          In the contrived scenario, how will backups be handled? The intense "need" for encryption makes for a more complicated backup situation as the backups must be kept very secure, but also be very accessible.

          Encrypted drives doesn't make a complicated backups, you just encrypt the backups as well. It is seamless for the operating system as it is already boot into it and then it is backed up.

          No, but a situation that makes you need to encrypt local drives does.

          Mmm, is that how that works for any of your HIPAA or Financial Sector customers?

          Correct. None of them have these kinds of issues because they do security well, rather than pretending to do security by using local encryption. There is a reason why the most secure environments don't need local encryption, CPAs certainly should not need it.

          Okay, I mean so you are saying BoFA for example does not need to require Local Encryption even though they do?

          Obviously not, that would be silly. Banks don't do local encryption for normal workloads. They also don't allow customer data to go to end points for exposure.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @BRRABill
            last edited by

            @BRRABill said in Local Encryption Scenarios:

            @dbeato said in Local Encryption Scenarios:

            @scottalanmiller said in Local Encryption Scenarios:

            @dbeato said in Local Encryption Scenarios:

            @scottalanmiller said in Local Encryption Scenarios:

            @dbeato said in Local Encryption Scenarios:

            @scottalanmiller said in Local Encryption Scenarios:

            @BRRABill said in Local Encryption Scenarios:

            They must use a local PC, because that is the only way their CPA software will run.

            There is no such software, this is a false situation. This is a hypothetical that will never apply in the real world. So sure, we might get a contrived answer in this scenario, but it won't be useful.

            How is this a false situation?

            There is no such software. You can't actually make software that has to run on a laptop to work (you COULD make a license like that, but no one has.)

            It's false, because this situation can't exist in the real world today. Anyone making it happen would be doing so purely for the purpose of making an example like this come true. It has no technical or market value.

            I understand, as a software based yes it is not dictated by which computer it is installed unless is a software with a USB Dongle or something like that.

            Even that, rarely would a dongle cause an issue either. You can still access the machine that has the dongle in it remotely.

            Yeah, but not everyone wants to pay for it (Be it extra device, server, cloud service and so forth). I think that is the biggest issue when dealing with things like these.

            That is kind of where I am going with this question.

            Yes, you can use cloud VMs and cloud CPA software (in this example) but why not just encrypt the machine with VeraCrypt for free?

            Because one is secure and responsible, one is insecure and irresponsible. Local encryption as you are now describing it is actively bad because it is being used as an excuse to not properly secure the data.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller
              last edited by

              That highlights my concern... doing something that "sounds super secure to non-technical people, but in reality does very little" is bad when it triggers human emotional responses. To a purely logical being (a computer) making decisions, local encryption would not do this. But in the real world with human users, it normally does. And if ANY behaviour changes based on using the local encryption, then in that scenario, the local encryption was a bad thing, not a good thing. Not just a waste, but actually a negative to the security.

              BRRABillB 1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller
                last edited by

                If you add the encryption and no one knows about it, or you truly get no other decisions or behaviour to be made based on it, then it can be a good thing as long as the data is properly protected (there is a much higher risk of data loss when using encryption.)

                But for a CPA, data loss is minor while data exposure is big.

                1 Reply Last reply Reply Quote 0
                • 1
                  1337
                  last edited by 1337

                  If it's a laptop, how can it be stolen and still not locked? As soon as you close the lid it's locked by a password. I doubt a thief would not close the lid if he grabs it while someone is using it.

                  Anyway, the best option would be to not have sensitive information on the laptop at all, but that is not always possible. It's also a question of how sensitive the information is.

                  1 scottalanmillerS 2 Replies Last reply Reply Quote 0
                  • 1
                    1337 @1337
                    last edited by 1337

                    Anyway, in the case of the CPA we are talking about material that is not really sensitive at all.

                    The data files could be secured the same way as any paper records. Locked in a safe or similar when not in use.

                    DustinB3403D 1 Reply Last reply Reply Quote 0
                    • DustinB3403D
                      DustinB3403 @1337
                      last edited by

                      @Pete-S said in Local Encryption Scenarios:

                      Anyway, in the case of the CPA we are talking about material that is not really sensitive at all.

                      The data files could be secured the same way as any paper records. Locked in a safe when not in use.

                      That would be the same as being encrypted, since the lock on a safe = encryption and the physical key = the passphrase to decrypt the drive or data.

                      1 1 Reply Last reply Reply Quote 0
                      • 1
                        1337 @DustinB3403
                        last edited by 1337

                        @DustinB3403 said in Local Encryption Scenarios:

                        @Pete-S said in Local Encryption Scenarios:

                        Anyway, in the case of the CPA we are talking about material that is not really sensitive at all.

                        The data files could be secured the same way as any paper records. Locked in a safe when not in use.

                        That would be the same as being encrypted, since the lock on a safe = encryption and the physical key = the passphrase to decrypt the drive or data.

                        Well, in principle only. You can walk away with the encrypted computer but it would be harder with the safe.

                        In most cases physical security is about delaying. You can smash and grab a laptop from the office window but it would require a lot more time to break in properly and then open a safe before someone shows up. So it's less likely to happen.

                        DustinB3403D 1 Reply Last reply Reply Quote 0
                        • DustinB3403D
                          DustinB3403 @1337
                          last edited by

                          @Pete-S said in Local Encryption Scenarios:

                          @DustinB3403 said in Local Encryption Scenarios:

                          @Pete-S said in Local Encryption Scenarios:

                          Anyway, in the case of the CPA we are talking about material that is not really sensitive at all.

                          The data files could be secured the same way as any paper records. Locked in a safe when not in use.

                          That would be the same as being encrypted, since the lock on a safe = encryption and the physical key = the passphrase to decrypt the drive or data.

                          Well, in principle only. You can walk away with the encrypted computer but it would be harder with the safe.

                          In most cases physical security is about delaying. You can smash and grab a laptop from the office window but it would require a lot more time to break in properly and then open a safe before someone shows up.

                          You have those examples a bit mixed up.

                          The comparable scenario would be "getting to the data" The physical medium housing that data doesn't matter.

                          You break the lock, you get the data. If you break the encryption key you get the data.

                          But a physical lock is likely easier to break and get into whatever than it would to decrypt a encrypted volume.

                          1 1 Reply Last reply Reply Quote 0
                          • 1
                            1337 @DustinB3403
                            last edited by

                            @DustinB3403 said in Local Encryption Scenarios:

                            @Pete-S said in Local Encryption Scenarios:

                            @DustinB3403 said in Local Encryption Scenarios:

                            @Pete-S said in Local Encryption Scenarios:

                            Anyway, in the case of the CPA we are talking about material that is not really sensitive at all.

                            The data files could be secured the same way as any paper records. Locked in a safe when not in use.

                            That would be the same as being encrypted, since the lock on a safe = encryption and the physical key = the passphrase to decrypt the drive or data.

                            Well, in principle only. You can walk away with the encrypted computer but it would be harder with the safe.

                            In most cases physical security is about delaying. You can smash and grab a laptop from the office window but it would require a lot more time to break in properly and then open a safe before someone shows up.

                            You have those examples a bit mixed up.

                            The comparable scenario would be "getting to the data" The physical medium housing that data doesn't matter.

                            You break the lock, you get the data. If you break the encryption key you get the data.

                            But a physical lock is likely easier to break and get into whatever than it would to decrypt a encrypted volume.

                            Reminds me of this classic:
                            alt text

                            DustinB3403D DonahueD 2 Replies Last reply Reply Quote 0
                            • DustinB3403D
                              DustinB3403 @1337
                              last edited by

                              @Pete-S said in Local Encryption Scenarios:

                              @DustinB3403 said in Local Encryption Scenarios:

                              @Pete-S said in Local Encryption Scenarios:

                              @DustinB3403 said in Local Encryption Scenarios:

                              @Pete-S said in Local Encryption Scenarios:

                              Anyway, in the case of the CPA we are talking about material that is not really sensitive at all.

                              The data files could be secured the same way as any paper records. Locked in a safe when not in use.

                              That would be the same as being encrypted, since the lock on a safe = encryption and the physical key = the passphrase to decrypt the drive or data.

                              Well, in principle only. You can walk away with the encrypted computer but it would be harder with the safe.

                              In most cases physical security is about delaying. You can smash and grab a laptop from the office window but it would require a lot more time to break in properly and then open a safe before someone shows up.

                              You have those examples a bit mixed up.

                              The comparable scenario would be "getting to the data" The physical medium housing that data doesn't matter.

                              You break the lock, you get the data. If you break the encryption key you get the data.

                              But a physical lock is likely easier to break and get into whatever than it would to decrypt a encrypted volume.

                              Reminds me of this classic:
                              alt text

                              Exactly.

                              1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @1337
                                last edited by

                                @Pete-S said in Local Encryption Scenarios:

                                If it's a laptop, how can it be stolen and still not locked? As soon as you close the lid it's locked by a password. I doubt a thief would not close the lid if he grabs it while someone is using it.

                                That's not always he case, and thieves know not to close lids.

                                1 1 Reply Last reply Reply Quote 0
                                • 1
                                  1337 @scottalanmiller
                                  last edited by 1337

                                  @scottalanmiller said in Local Encryption Scenarios:

                                  @Pete-S said in Local Encryption Scenarios:

                                  If it's a laptop, how can it be stolen and still not locked? As soon as you close the lid it's locked by a password. I doubt a thief would not close the lid if he grabs it while someone is using it.

                                  That's not always he case, and thieves know not to close lids.

                                  What kind of thieves are we talking about here? The kind that are after national security secrets or the kind that needs money to buy drugs? Or are we talking about professionals that make a living stealing things?

                                  JaredBuschJ 1 Reply Last reply Reply Quote 1
                                  • DustinB3403D
                                    DustinB3403
                                    last edited by

                                    @Pete-S in the discussion of hitting the person with a $5 wrench, that of course means the goal is to steal the data. Not the File Cabinet that houses the data.

                                    But the same applies for the laptop too. If the goal is to steal the laptop, you don't care about the data and just want to steal a laptop.

                                    Bolting the cabinet down or using a cable lock on the laptop are just deterrents to prevent theft of the house. The lock is a deterrent to prevent data theft.

                                    1 1 Reply Last reply Reply Quote 0
                                    • BRRABillB
                                      BRRABill @scottalanmiller
                                      last edited by

                                      @scottalanmiller said in Local Encryption Scenarios:

                                      And if ANY behaviour changes based on using the local encryption, then in that scenario, the local encryption was a bad thing, not a good thing. Not just a waste, but actually a negative to the security.

                                      Right, but if the user stays the same (with the exception of entering in a password) [NOTE: if they don't put it on a post-it note LOL] then the local encryption could be seen as a plus.

                                      1 Reply Last reply Reply Quote 0
                                      • 1
                                        1337 @DustinB3403
                                        last edited by 1337

                                        @DustinB3403 said in Local Encryption Scenarios:

                                        @Pete-S in the discussion of hitting the person with a $5 wrench, that of course means the goal is to steal the data. Not the File Cabinet that houses the data.

                                        But the same applies for the laptop too. If the goal is to steal the laptop, you don't care about the data and just want to steal a laptop.

                                        Bolting the cabinet down or using a cable lock on the laptop are just deterrents to prevent theft of the house. The lock is a deterrent to prevent data theft.

                                        I think in 99.99% of the cases the CPA would face, the goal is to steal the laptop and not the data. It is unlikely the hard drive would face any other fate than being wiped. But the guys doing the wiping would probably check if the drive had something of value first that they could sell.

                                        If someone was after the data it would probably be criminals and they would go the $5 wrench route. Or bribe someone for $1500 or whatever would be required..

                                        DustinB3403D 1 Reply Last reply Reply Quote 0
                                        • DustinB3403D
                                          DustinB3403 @1337
                                          last edited by

                                          @Pete-S exactly.

                                          So you would go with simple traditional and easily employed security. Cable locks for the hardware, encryption for the data at rest.

                                          1 1 Reply Last reply Reply Quote 0
                                          • 1
                                            1337 @DustinB3403
                                            last edited by 1337

                                            @DustinB3403 said in Local Encryption Scenarios:

                                            @Pete-S exactly.

                                            So you would go with simple traditional and easily employed security. Cable locks for the hardware, encryption for the data at rest.

                                            I think I would just put the entire laptop in the safe and not bother with the encryption.
                                            Cable locks doesn't withstand a simple bolt cutter.

                                            DustinB3403D 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 2 / 3
                                            • First post
                                              Last post