Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 311

About Self-Encrypting Drives (SEDs) and AutoSED, Scenarios Covered by AutoSED, Using AutoSED is

Page 311 highlights

19 About Self-Encrypting Drives (SEDs) and AutoSED A self-encrypting drive (SED) performs Advanced Encryption Standard (AES) encryption on all data stored within that drive. SED hardware handles this encryption in real-time with no impact on performance. To protect your data, a SED will immediately lock itself whenever it is removed from the array (or otherwise powers down). If the drive is lost or stolen, its contents are inaccessible without the encryption key. The Dell AutoSED feature provides the benefits of SED security with no effort on the part of the administrator. You do not need to configure or set up drives, manage encryption, or install a Key Management Service (KMS). Everything is handled by AutoSED. AutoSED operates at the level of the physical disk drives within an individual member. SEDs cannot be used to encrypt volumes, in the sense of securing each iSCSI volume with its own key. SEDs also cannot provide security across members, so it is up to the administrator to ensure that SED members and non-SED members are properly deployed. Using AutoSED is effortless, but it is important to understand what protection AutoSED provides and what protection it does not provide. Central to the AutoSED security model is the concept of a SEDset. Similar to how RAID groups drives into a RAIDset for redundancy, AutoSED groups drives into a SEDset for security. Each member of a group has one SEDset that spans all active drives in the member. The SEDset cannot be unlocked unless it is sufficiently intact, which means that at least half of its drives are present. Scenarios Covered by AutoSED • Loss of a drive - When a drive leaves the SEDset (whether by failure, removal, or otherwise), the drive immediately locks itself. Its contents are inaccessible without the encryption key, which is owned by the SEDset. At the same time, the SEDset immediately resecures itself to exclude the departed drive, preventing access to the key. • Loss of fewer than half the drives - When fewer than half the drives in the SEDset are removed, the SEDset remains intact and resecures itself to exclude all the removed drives. The removed drives are locked, and have no access to the SEDset key. • Loss of other array components - The SEDset key resides wholly within the drives. The key cannot be found in the flash cards, channel cards, midplane, chassis, or any other component, including the controllers and controller memory. Scenarios Not Covered by AutoSED • Loss of the entire array - A SEDset is a self-contained apparatus, which is why the array can unlock itself with no external assistance. A stolen array will continue to unlock itself, just as it did before it was stolen. • Loss of half the drives - Security might be compromised if half (or more) of the drives are removed at one time. These drives can be combined into an intact SEDset of their own, which will automatically unlock itself. • Insider attack - Any person who possesses the administrator password can access any volume on the array, or change ACLs to allow others to do the same. Similarly, a compromised host can access volumes that the host is authorized to access. SED is irrelevant in these cases. • Data in flight - SEDs provide no protection for data in flight on the network. IPsec should be used to provide secure connections to the array. • Tampering with array hardware - AutoSED is not resistant to modified firmware, hardware probes and other snooping devices, or the removal of a drive without loss of power to that drive. About Self-Encrypting Drives (SEDs) and AutoSED 311

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

19
About Self-Encrypting Drives (SEDs) and AutoSED
A self-encrypting drive (SED) performs Advanced Encryption Standard (AES) encryption on all data stored within that drive. SED
hardware handles this encryption in real-time with no impact on performance. To protect your data, a SED will immediately lock itself
whenever it is removed from the array (or otherwise powers down). If the drive is lost or stolen, its contents are inaccessible without
the encryption key.
The Dell AutoSED feature provides the
benefits
of SED security with no
effort
on the part of the administrator. You do not need to
configure
or set up drives, manage encryption, or install a Key Management Service (KMS). Everything is handled by AutoSED.
AutoSED operates at the level of the physical disk drives within an individual member. SEDs cannot be used to encrypt volumes, in
the sense of securing each iSCSI volume with its own key. SEDs also cannot provide security across members, so it is up to the
administrator to ensure that SED members and non-SED members are properly deployed.
Using AutoSED is
effortless,
but it is important to understand what protection AutoSED provides and what protection it does not
provide.
Central to the AutoSED security model is the concept of a SEDset. Similar to how RAID groups drives into a RAIDset for redundancy,
AutoSED groups drives into a SEDset for security. Each member of a group has one SEDset that spans all active drives in the
member. The SEDset cannot be unlocked unless it is
sufficiently
intact, which means that at least half of its drives are present.
Scenarios Covered by AutoSED
Loss of a drive — When a drive leaves the SEDset (whether by failure, removal, or otherwise), the drive immediately locks itself.
Its contents are inaccessible without the encryption key, which is owned by the SEDset. At the same time, the SEDset
immediately resecures itself to exclude the departed drive, preventing access to the key.
Loss of fewer than half the drives — When fewer than half the drives in the SEDset are removed, the SEDset remains intact and
resecures itself to exclude all the removed drives. The removed drives are locked, and have no access to the SEDset key.
Loss of other array components — The SEDset key resides wholly within the drives. The key cannot be found in the
flash
cards,
channel cards, midplane, chassis, or any other component, including the controllers and controller memory.
Scenarios Not Covered by AutoSED
Loss of the entire array — A SEDset is a self-contained apparatus, which is why the array can unlock itself with no external
assistance. A stolen array will continue to unlock itself, just as it did before it was stolen.
Loss of half the drives — Security might be compromised if half (or more) of the drives are removed at one time. These drives
can be combined into an intact SEDset of their own, which will automatically unlock itself.
Insider attack — Any person who possesses the administrator password can access any volume on the array, or change ACLs to
allow others to do the same. Similarly, a compromised host can access volumes that the host is authorized to access. SED is
irrelevant in these cases.
Data in
flight
— SEDs provide no protection for data in
flight
on the network. IPsec should be used to provide secure
connections to the array.
Tampering with array hardware — AutoSED is not resistant to
modified
firmware,
hardware probes and other snooping devices,
or the removal of a drive without loss of power to that drive.
About Self-Encrypting Drives (SEDs) and AutoSED
311