Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 313

About SED Members in a Group, Examples, Back Up a Self-Encrypting Drive (SED) Key

Page 313 highlights

• Loss of the entire array, or simultaneous loss of half of the drives in the array. If half of the drives on an array are lost, the data on those drives is compromised. The locking mechanism for the remaining drives is also compromised, leaving the data exposed. If more than half of the drives are lost, the array is rendered inoperable. In the case of a RAID-10 configuration, loss or theft of one drive in each mirrored pair could result in the data on the entire array being exposed and the RAID sets rendered inoperable. • If the drive is removed from the array but power is maintained to that drive, the drive remains unlocked. Data locking occurs when power to the drive is lost. • It is possible to recover the encryption key data from the SAS link if it is compromised ("snooped") during the process of unlocking a locked drive. • Insider attacks. For example, an administrator account can still change the ACLs on volumes, allowing different initiators to access the data on the disks. Administrators can read any volume, grant permission to anyone to read any volume, can obtain the key shares, and so on. About SED Members in a Group AutoSED operates at the member level, not at the group level. SED management is completely automatic within a member. Within a group, the administrator is responsible for deploying SED members and non-SED members properly. A pool must contain only SED members to be secure. A gold key icon indicates that the pool is fully encrypted. Volumes created in this pool are secure. Though it is permitted to mix SED members and non-SED members in the same pool, it is not recommended. An alert icon indicates that a pool is only partially encrypted. Mixed pools are intended only to simplify the gradual upgrade of a pool from non-SED to SED. No security benefits should be expected until the entire pool contains only SED members. Creating a volume in a mixed pool provides no security, because some or all of the volume might reside on non-SED members. Examples 1. A group contains two pools of non-SED members. A new SED member is brought online. Add the SED member to its own pool. Volumes that you create in this pool will be secure. Volumes that you create in the nonSED pools continue to be insecure. 2. A group contains a pool of three SED members. A non-SED member is added to this pool. Every volume in this pool immediately becomes insecure. Because of Dell EqualLogic's automatic load balancing, volumes and snapshots will be spread across all the members, including the non-SED member. To return the pool to secure operation, delete the non-SED member or move it to a different pool. 3. A group contains a pool of three non-SED members. The intention is to migrate the pool to secure operation. Add enough SED members to the pool to hold your data. Delete the non-SED members or move them to a different pool. During this time, the pool is still not secure. When the process completes, the gold key icon signifies that the pool (and all of its volumes) are now secure. Back Up a Self-Encrypting Drive (SED) Key The AutoSED machinery remains functional even when severe failures have taken the array offline. The backup is needed only in exceptional circumstances, such as the loss of more than half the drives from an array. The SED key is never explicitly revealed as part of the backup process. Rather, it is encrypted into a set of three unique backup units. Any two backup units from the same backup set can be combined to decode the key. Although the key never changes (unless the member is reset), each backup set is unique. No two sets are alike, and backup units from different sets cannot be combined. The array automatically creates and presents a backup set during initial setup, when the RAID policy is configured. Additional backup sets can be manually requested at any time. About Self-Encrypting Drives (SEDs) and AutoSED 313

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Loss of the entire array, or simultaneous loss of half of the drives in the array. If half of the drives on an array are lost, the data on
those drives is compromised. The locking mechanism for the remaining drives is also compromised, leaving the data exposed. If
more than half of the drives are lost, the array is rendered inoperable. In the case of a RAID-10
configuration,
loss or theft of one
drive in each mirrored pair could result in the data on the entire array being exposed and the RAID sets rendered inoperable.
If the drive is removed from the array but power is maintained to that drive, the drive remains unlocked. Data locking occurs
when power to the drive is lost.
It is possible to recover the encryption key data from the SAS link if it is compromised (“snooped”) during the process of
unlocking a locked drive.
Insider attacks. For example, an administrator account can still change the ACLs on volumes, allowing
different
initiators to
access the data on the disks. Administrators can read any volume, grant permission to anyone to read any volume, can obtain the
key shares, and so on.
About SED Members in a Group
AutoSED operates at the member level, not at the group level. SED management is completely automatic within a member. Within a
group, the administrator is responsible for deploying SED members and non-SED members properly.
A pool must contain only SED members to be secure. A gold key icon indicates that the pool is fully encrypted. Volumes created in
this pool are secure.
Though it is permitted to mix SED members and non-SED members in the same pool, it is not recommended. An alert icon indicates
that a pool is only partially encrypted.
Mixed pools are intended only to simplify the gradual upgrade of a pool from non-SED to SED. No security
benefits
should be
expected until the entire pool contains only SED members. Creating a volume in a mixed pool provides no security, because some or
all of the volume might reside on non-SED members.
Examples
1.
A group contains two pools of non-SED members. A new SED member is brought online.
Add the SED member to its own pool. Volumes that you create in this pool will be secure. Volumes that you create in the non-
SED pools continue to be insecure.
2.
A group contains a pool of three SED members. A non-SED member is added to this pool.
Every volume in this pool immediately becomes insecure. Because of Dell EqualLogic’s automatic load balancing, volumes and
snapshots will be spread across all the members, including the non-SED member. To return the pool to secure operation, delete
the non-SED member or move it to a
different
pool.
3.
A group contains a pool of three non-SED members. The intention is to migrate the pool to secure operation.
Add enough SED members to the pool to hold your data. Delete the non-SED members or move them to a
different
pool.
During this time, the pool is still not secure. When the process completes, the gold key icon
signifies
that the pool (and all of its
volumes) are now secure.
Back Up a Self-Encrypting Drive (SED) Key
The AutoSED machinery remains functional even when severe failures have taken the array
offline.
The backup is needed only in
exceptional circumstances, such as the loss of more than half the drives from an array.
The SED key is never explicitly revealed as part of the backup process. Rather, it is encrypted into a set of three unique backup units.
Any two backup units from the same backup set can be combined to decode the key. Although the key never changes (unless the
member is reset), each backup set is unique. No two sets are alike, and backup units from
different
sets cannot be combined.
The array automatically creates and presents a backup set during initial setup, when the RAID policy is
configured.
Additional backup
sets can be manually requested at any time.
About Self-Encrypting Drives (SEDs) and AutoSED
313