Data Encryption Overview South Seas Corporation Jared Owensby

14 Slides273.00 KB

Data Encryption Overview South Seas Corporation Jared Owensby

Important Points Full Disk Encryption Typically sector by sector: OS is also encrypted; the entire drive is encrypted including the empty space on the HDD. One-time initial encryption only. Selective Encryption Only certain parts of the OS and the information on the HDD. File/Folder Based Encryption Each file by itself, and each file as you add or create them. Encryption of the SAM File If the SAM file is not encrypted there is a possibility of compromising windows passwords, which also may be used for encryption authentication. Encryption of Hibernation Files The risk is very small, but it is possible to extract hibernation files from a drive that has been lost or stolen. These should also be encrypted. Multi OS support Linux and Macintosh have become larger players over the years. Your security shouldn’t be limited because of the OS you chose.

Considerations Dual Boot support Dual boot machines are very handy when you have them, and they should also be entitled to the same protection that a single OS machine has Pre-Boot Authentication (PBA) Login screen prior to the OS booting, usually made to be very resistant against brute force attacks Windows Authentication Allowing the Windows GINA to handle the authentication procedures Two Factor Authentication Tokens such as Aladdin eToken pro 32k or RSA (PKCS or PKI) Biometrics* Bio-Password* Single Sign On (Limited to Windows login/authentication) Multiple options to achieve a single sign on to the desktop: *Cached Credentials, not typically considered to be true two-factor authentication

Common Encryption Software FileVault PGP Pointsec TruCrypt (open source) Utimaco WinMagic

Gartner Magic Quadrant (1H06)

Utimaco SafeGuard Easy (In bundle) Full disk encryption, AES as well as others Private Disk (In bundle) Secure volumes Private Crypto (In bundle) Files and Folders Removable Media (Added to bundle) Flash memory, CD/DVD, External HDD SafeGuard Advanced Security (In bundle) Single Sign on enhancements, granular control over ports LanCrypt (In bundle) Network Shares SafeGuard PDA (In bundle) PDA’s SafeGuard Enterprise (Migration option, in bundle) Email Gateway (Optional purchase, State Pricing) Hardware Security Module (Optional purchase, State Pricing)

Pointsec Pointsec* Full Disk encryption AES, 3DES, Blowfish, CAST Boot Protection Client Machines Port Protection* Granular Protection from unauthorized USB devices Removable media encryption *May require separate purchase

PGP Full Disk Encryption* AES, 3DES Boot Sectors Removable Media Protection* File Based Encryption* Network Shares* IM Services* Secure Transfer and Backup Services* *May require separate purchase

Win Magic Enterprise Solution Pre Boot Authentication (Required) Must use a SQL Server for Central Management Active Directory Client is to be pushed out over the network AES File, Folder, and Secure Volume Encryption

True Crypt Open Source Secure volumes Portable devices are supported Uses AES as well as others Can combine Algorithms, unique to TC Can do an entire device, but it will format the device first Cannot encrypt existing data, but data can be put into secure volumes

File Vault Comes with Mac OS (Free) Mac Only (Not Windows) AES128 Secures the Home Directory Secure Volume Company wide master password Very specific use

Project Planning/Lessons Learned Include Everyone! Communication is paramount. Network/Server, IT Security, Management, Training Department, Helpdesk, etc. Written Security Policy & Procedures. Know your environment. Determine what you are going to encrypt. Laptop, Desktop, PDA, Files, Email, Removable media. Phased Approach. (Lab Test, Pilot Group, Push) Don’t try to “Fix” encryption software issues without help! Plan Ahead!!!!

Best Practices Back up your data, before deployment!!! Turn off Anti Virus, or any other MBR monitoring software. Turn off any software that monitors sector based write access. Install software and then turn on encryption in a second step. Do not lose master passwords!!! Write them down. Keep in a safe place.

Questions?

Back to top button