Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 312

About Self-Encrypting Drives (SED), How Key Shares Work, How Self-Encryption Protects Data

Page 312 highlights

About Self-Encrypting Drives (SED) SEDs (self-encrypting drives) are disk drives that use an encryption key to secure the data stored on the disk. This encryption protects the PS series array from data theft when a drive is removed from the array. SED operates across all disks in an array at once. If one drive in a RAID set is removed from the array, a new set of encryption key shares is generated automatically and shared among the remaining disks. If a second drive is removed from the same RAID set, another set of encryption key shares is generated. SED drives are configured at the factory. When the drives are installed into an array, the array automatically detects the new SED drives and locks them. This process is automatic; the GUI has no user controls for SED. All of the drives in an array, including spares, must be of the same type and model, and must be running PS Series firmware 6.0 or higher. A SED drive installed into a mixed-disk configuration, or a configuration containing unencrypted drives, operates as an unencrypted disk. Likewise, a pool consisting of all SED drives might replicate to a pool with only a few SED drives or no SED drives at all. NOTE: SED drives are identified in the GUI with a gold key icon. How Key Shares Work Each array has an overall shared encryption key that protects data on all of the disks in that array. The shared encryption key is not stored in any one location on the array. Instead, the key is divided into portions called key shares. The number of key shares generated corresponds to the number of drives in the array (except for spares or other drives not used by the array). The key shares are distributed across all non-spare disks used in the RAID configuration. If your array has n non-spare disks, you must have (n+1)/2 of the key shares to unlock the data on the disks. If you are missing one or more of the key shares, you will not be able to recover the data. You can back up the disk encryption key shares. Key shares are backed up in groups of three files. To unlock the array, you need to supply two backup shares. Under normal operation, the keys are not necessary because the data is redundant; however; they might be useful in the event that a disk needs to be sent to a data recovery service. Use the Maintenance tab to back up the disk encryption key shares. How Self-Encryption Protects Data To understand how SED protects your data, you should understand the types of threats to data that SED cannot protect against. Each individual drive has its own secure PIN, which is local to that drive and not shared. If a drive fails, this PIN is needed to unlock and recover the information on that drive. All drives also have the key shares. During normal operation, the data redundancy across the array prevents individual drives from becoming single points of failure. SED protects against data theft in the following circumstances: • Loss or physical removal of fewer than half of the drives installed in an array (not counting the spares). This number includes drives that are removed for reuse elsewhere, as well as drives lost due to theft. The SED key remains secure and the disk encryption remains unbroken as long as more than half of the drives remain in the array. • "Cold memory" attacks that attempt to extract data from system DRAM by powering down the array or removing the drive. SED immediately erases any data in DRAM when power is lost. • Because SED drives are configured and shipped from the factory, SED protects the entire drive immediately. You cannot configure individual volumes for self-encryption. CAUTION: You must have (n+1)/2 of the current key shares to unlock the array, if the array has n drives installed. If you lose the keys, then the data on the drive will be irrevocably lost. SED cannot protect against the following threats: 312 About Self-Encrypting Drives (SEDs) and AutoSED

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

About Self-Encrypting Drives (SED)
SEDs (self-encrypting drives) are disk drives that use an encryption key to secure the data stored on the disk. This encryption
protects the PS series array from data theft when a drive is removed from the array.
SED operates across all disks in an array at once. If one drive in a RAID set is removed from the array, a new set of encryption key
shares is generated automatically and shared among the remaining disks. If a second drive is removed from the same RAID set,
another set of encryption key shares is generated.
SED drives are
configured
at the factory. When the drives are installed into an array, the array automatically detects the new SED
drives and locks them. This process is automatic; the GUI has no user controls for SED.
All of the drives in an array, including spares, must be of the same type and model, and must be running PS Series
firmware
6.0 or
higher. A SED drive installed into a mixed-disk
configuration,
or a
configuration
containing unencrypted drives, operates as an
unencrypted disk. Likewise, a pool consisting of all SED drives might replicate to a pool with only a few SED drives or no SED drives
at all.
NOTE: SED drives are
identified
in the GUI with a gold key icon.
How Key Shares Work
Each array has an overall shared encryption key that protects data on all of the disks in that array.
The shared encryption key is not stored in any one location on the array. Instead, the key is divided into portions called
key shares
.
The number of key shares generated corresponds to the number of drives in the array (except for spares or other drives not used by
the array). The key shares are distributed across all non-spare disks used in the RAID
configuration.
If your array has
n
non-spare
disks, you must have (
n
+1)/2 of the key shares to unlock the data on the disks. If you are missing one or more of the key shares, you
will not be able to recover the data.
You can back up the disk encryption key shares. Key shares are backed up in groups of three
files.
To unlock the array, you need to
supply two backup shares. Under normal operation, the keys are not necessary because the data is redundant; however; they might
be useful in the event that a disk needs to be sent to a data recovery service. Use the Maintenance tab to back up the disk
encryption key shares.
How Self-Encryption Protects Data
To understand how SED protects your data, you should understand the types of threats to data that SED cannot protect against.
Each individual drive has its own secure PIN, which is local to that drive and not shared. If a drive fails, this PIN is needed to unlock
and recover the information on that drive. All drives also have the key shares. During normal operation, the data redundancy across
the array prevents individual drives from becoming single points of failure.
SED protects against data theft in the following circumstances:
Loss or physical removal of fewer than half of the drives installed in an array (not counting the spares). This number includes
drives that are removed for reuse elsewhere, as well as drives lost due to theft. The SED key remains secure and the disk
encryption remains unbroken as long as more than half of the drives remain in the array.
“Cold memory” attacks that attempt to extract data from system DRAM by powering down the array or removing the drive. SED
immediately erases any data in DRAM when power is lost.
Because SED drives are
configured
and shipped from the factory, SED protects the entire drive immediately. You cannot
configure
individual volumes for self-encryption.
CAUTION: You must have (
n
+1)/2 of the current key shares to unlock the array, if the array has
n
drives installed. If you
lose the keys, then the data on the drive will be irrevocably lost.
SED cannot protect against the following threats:
312
About Self-Encrypting Drives (SEDs) and AutoSED