Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 323

Self-Encrypting Drives (SED) Frequently Asked Questions (FAQ), Why are my backups always different?

Page 323 highlights

During normal operation, the array has the information it needs to operate SED disks. The key shares are stored across the array on the non-spare disks. If a disk fails and is replaced by a spare, the configuration generates a new set of key shares, and the original key shares are discarded. If a SED disk goes offline due to power failure, removal from the array, or disk failure, the disk is automatically locked, and any data residing in memory about that disk drive is automatically wiped. To recover the data on that disk, you must provide two of the three key shares to unlock the disk. Backing up the key shares ensures that you have current copies in case you need to recover the data on a locked disk. 1. Click Group and then expand Members. 2. Select the name of the member whose encryption key you want to back up. 3. Click the Maintenance tab. 4. In the Disk Encryption panel, click the Encryption Key Shares button. 5. Enter the administrative password in the dialog box. The Information dialog box lists the names and code string of each key share. 6. To download all three key shares (backup units) as individual text files, click Save all... and choose the location where you want to store them. All three file names have the format membername-keyshare-n, wheren stands for 1, 2, or 3. 7. Use the Copy buttons above each key share to copy the individual key share (backup unit) and paste it into a file, if desired. Select Copy all if you want to copy all three key shares to the clipboard. NOTE: If you generate a second set of key shares, the first set is not invalidated. Generating a second set of key shares, therefore, does not protect the key shares from being compromised. Self-Encrypting Drives (SED) Frequently Asked Questions (FAQ) Why are my backups always different? Although the encryption key never changes, the backup looks different each time it is generated. The three backup units are cryptographic images of the key, and are never generated the same way twice. Why is a secure-erase command not available? The command is not needed. Whenever it is safe to erase a drive, AutoSED will always do so, without intervention. A manual secureerase is never necessary, so no command is provided to perform it. NOTE: Secure-erase is also known as cryptographical erase or crypto-erase. What is the difference between a locked drive and a securely erased drive? Data that is locked is inaccessible without the SEDset key. Data that is securely erased has been cryptographically destroyed. I accidentally reset an SED array. What can I do? Nothing. Every drive in the member has been securely erased, and the data has been cryptographically destroyed. Recovery is impossible. What if the entire array is stolen? Security is compromised. The array will unlock itself when it boots, as it did before it was stolen. What if the grpadmin password is stolen? Security is compromised. The adversary can connect to the array over the network and read the data. SED is irrelevant in this case. About Self-Encrypting Drives (SEDs) and AutoSED 323

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576
  • 577
  • 578
  • 579
  • 580
  • 581
  • 582
  • 583

During normal operation, the array has the information it needs to operate SED disks. The key shares are stored across the array on
the non-spare disks. If a disk fails and is replaced by a spare, the
configuration
generates a new set of key shares, and the original key
shares are discarded.
If a SED disk goes
offline
due to power failure, removal from the array, or disk failure, the disk is automatically locked, and any data
residing in memory about that disk drive is automatically wiped. To recover the data on that disk, you must provide two of the three
key shares to unlock the disk. Backing up the key shares ensures that you have current copies in case you need to recover the data
on a locked disk.
1.
Click
Group
and then expand
Members
.
2.
Select the name of the member whose encryption key you want to back up.
3.
Click the
Maintenance
tab.
4.
In the Disk Encryption panel, click the
Encryption Key Shares
button.
5.
Enter the administrative password in the dialog box. The
Information
dialog box lists the names and code string of each key
share.
6.
To download all three key shares (backup units) as individual text
files,
click
Save all...
and choose the location where you want
to store them. All three
file
names have the format
membername-keyshare-n
, where
n
stands for 1, 2, or 3.
7.
Use the
Copy
buttons above each key share to copy the individual key share (backup unit) and paste it into a
file,
if desired.
Select
Copy all
if you want to copy all three key shares to the clipboard.
NOTE: If you generate a second set of key shares, the
first
set is not invalidated. Generating a second set of key shares,
therefore, does not protect the key shares from being compromised.
Self-Encrypting Drives (SED) Frequently Asked Questions (FAQ)
Why are my backups always
different?
Although the encryption key never changes, the backup looks
different
each time it is generated. The three backup units are
cryptographic images of the key, and are never generated the same way twice.
Why is a secure-erase command not available?
The command is not needed. Whenever it is safe to erase a drive, AutoSED will always do so, without intervention. A manual secure-
erase is never necessary, so no command is provided to perform it.
NOTE: Secure-erase is also known as cryptographical erase or crypto-erase.
What is the
difference
between a locked drive and a securely erased drive?
Data that is locked is inaccessible without the SEDset key. Data that is securely erased has been cryptographically destroyed.
I accidentally reset an SED array. What can I do?
Nothing. Every drive in the member has been securely erased, and the data has been cryptographically destroyed. Recovery is
impossible.
What if the entire array is stolen?
Security is compromised. The array will unlock itself when it boots, as it did before it was stolen.
What if the grpadmin password is stolen?
Security is compromised. The adversary can connect to the array over the network and read the data. SED is irrelevant in this case.
About Self-Encrypting Drives (SEDs) and AutoSED
323