Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 315

Is it safe to discard or return a locked SED?, Can I add SEDs to a non-SED array, or vice versa?

Page 315 highlights

Is it safe to discard or return a locked SED? Yes. Any data that you have written to the drive will be locked and inaccessible. When you return a drive to Dell, the only information that remains readable are its operating statistics (S.M.A.R.T. data), its RAID type, and its hardware error logs. Can I add SEDs to a non-SED array, or vice versa? No. Do not mix SEDs and non-SEDs in the same array. If mixed drives are detected while the array is booting, the array will halt until the incorrect drives are removed. If mixed drives are detected while the array is operating, the incorrect drives will be shown as unauthorized. Does a SED system also use RAID? Yes. Each drive in a SED-equipped array is managed by both AutoSED and RAID. The SEDset governs the locking of data, and the RAIDset governs the data itself. Does SED encrypt my volumes? No. SEDs cannot be used to encrypt volumes, in the sense of securing each iSCSI volume with its own key. AutoSED operates at the level of the physical disk drives within an individual member. If I create a new set of backup units, does the new set invalidate the previous set of backup units? No. Generating a new set of backup units does not affect previously created backup sets. Self-Encrypting Drives (SED) Examples 1. SED array is operating normally. Then, a drive is removed (or fails). Security is not compromised. The drive immediately locks itself. Its contents are inaccessible without the SEDset key. The SEDset also resecures itself to exclude the removed drive. Therefore, the drive can be safely repurposed, discarded, or returned to Dell. 2. SED array is operating normally. First, drive #1 is removed (or fails). Later, drive #2 is removed (or fails). Security is not compromised. When drive #1 is removed, the drive locks itself, and the SEDset is resecured to exclude drive #1. When drive #2 is removed, it also locks itself, and the SEDset is resecured again to exclude drive #2. As a result, both drives now exclude each other. Both drives can be safely repurposed, discarded, or returned to Dell. 3. SED array is operating normally. Then, half of the drives are removed one at a time. Security is not compromised. As in Example 2, each drive immediately locks itself upon removal, and the SEDset resecures itself each time. As a result, all the removed drives exclude each other, and cannot be used to construct an intact SEDset despite having enough drives to do so. 4. SED array is operating normally. Then, half of the drives are removed at the same time. Security is compromised. Although the removed drives immediately lock themselves, the adversary now possesses enough drives to construct an intact SEDset, which will unlock itself when booted in an appropriate array. Removal of half of the drives always causes the array to stop functioning and alert the administrator, with one exception. A RAID-10 configuration remains operational if one drive from each mirror pair remains in the array. 5. SED array is powered off. Then, half the drives are removed one at a time. Security is compromised. Because the array is not operating, the SEDset cannot resecure itself. The adversary now possesses enough drives to construct an intact SEDset. 6. Two SED arrays, X and Y, are operating normally. A drive is moved from array X to array Y. About Self-Encrypting Drives (SEDs) and AutoSED 315

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Is it safe to discard or return a locked SED?
Yes. Any data that you have written to the drive will be locked and inaccessible. When you return a drive to Dell, the only information
that remains readable are its operating statistics (S.M.A.R.T. data), its RAID type, and its hardware error logs.
Can I add SEDs to a non-SED array, or vice versa?
No. Do not mix SEDs and non-SEDs in the same array. If mixed drives are detected while the array is booting, the array will halt until
the incorrect drives are removed. If mixed drives are detected while the array is operating, the incorrect drives will be shown as
unauthorized.
Does a SED system also use RAID?
Yes. Each drive in a SED-equipped array is managed by both AutoSED and RAID. The SEDset governs the locking of data, and the
RAIDset governs the data itself.
Does SED encrypt my volumes?
No. SEDs cannot be used to encrypt volumes, in the sense of securing each iSCSI volume with its own key. AutoSED operates at the
level of the physical disk drives within an individual member.
If I create a new set of backup units, does the new set invalidate the previous set of backup
units?
No. Generating a new set of backup units does not
affect
previously created backup sets.
Self-Encrypting Drives (SED) Examples
1.
SED array is operating normally. Then, a drive is removed (or fails).
Security is not compromised. The drive immediately locks itself. Its contents are inaccessible without the SEDset key. The
SEDset also resecures itself to exclude the removed drive. Therefore, the drive can be safely repurposed, discarded, or returned
to Dell.
2.
SED array is operating normally. First, drive #1 is removed (or fails). Later, drive #2 is removed (or fails).
Security is not compromised. When drive #1 is removed, the drive locks itself, and the SEDset is resecured to exclude drive #1.
When drive #2 is removed, it also locks itself, and the SEDset is resecured again to exclude drive #2. As a result, both drives
now exclude each other. Both drives can be safely repurposed, discarded, or returned to Dell.
3.
SED array is operating normally. Then, half of the drives are removed one at a time.
Security is not compromised. As in Example 2, each drive immediately locks itself upon removal, and the SEDset resecures itself
each time. As a result, all the removed drives exclude each other, and cannot be used to construct an intact SEDset despite
having enough drives to do so.
4.
SED array is operating normally. Then, half of the drives are removed at the same time.
Security is compromised. Although the removed drives immediately lock themselves, the adversary now possesses enough
drives to construct an intact SEDset, which will unlock itself when booted in an appropriate array.
Removal of half of the drives always causes the array to stop functioning and alert the administrator, with one exception. A
RAID-10
configuration
remains operational if one drive from each mirror pair remains in the array.
5.
SED array is powered
off.
Then, half the drives are removed one at a time.
Security is compromised. Because the array is not operating, the SEDset cannot resecure itself. The adversary now possesses
enough drives to construct an intact SEDset.
6.
Two SED arrays, X and Y, are operating normally. A drive is moved from array X to array Y.
About Self-Encrypting Drives (SEDs) and AutoSED
315