Content deleted Content added
→Removable Hard Drive FDE: MOS:HEAD |
Ira Leviton (talk | contribs) Fixed references. Please see Category:CS1 errors: unsupported parameter. |
||
Line 17:
HDD FDE is made by HDD vendors using the [[Opal Storage Specification|OPAL]] and Enterprise standards developed by the [[Trusted Computing Group]].<ref>{{cite web |url=http://www.trustedcomputinggroup.org/solutions/data_protection |title=Trusted Computing Group Data Protection page |publisher=Trustedcomputinggroup.org |date= |access-date=2013-08-06 |url-status=dead |archive-url=https://www.webcitation.org/65fUDqdql?url=http://www.trustedcomputinggroup.org/solutions/data_protection |archive-date=2012-02-23 }}</ref> [[Key management]] takes place within the hard disk controller and encryption keys are 128 or 256 [[bit]] [[Advanced Encryption Standard]] (AES) keys. [[Authentication]] on power up of the drive must still take place within the [[Central processing unit|CPU]] via either a [[software]] [[pre-boot authentication]] environment (i.e., with a [[Disk encryption software|software-based full disk encryption]] component - hybrid full disk encryption) or with a [[BIOS]] password.
[[Hitachi]], [[Micron Technology|Micron]], [[Seagate Technology|Seagate]], [[Samsung]], and [[Toshiba]] are the disk drive manufacturers offering [[Trusted Computing Group
=== Enclosed hard disk drive FDE ===
Line 49:
==={{anchor|Crypto erase}}Disk sanitisation===
[[Crypto-shredding]] is the practice of 'deleting' data by (only) deleting or overwriting the encryption keys.
When a cryptographic disk erasure (or crypto erase) command is given (with proper authentication credentials), the drive self-generates a new media encryption key and goes into a 'new drive' state.<ref>{{cite web |title=10 Reasons to Buy Self-Encrypting Drives
When [[Cryptographic key|keys]] are self-generated randomly, generally there is no method to store a copy to allow [[data recovery]]. In this case protecting this data from accidental loss or theft is achieved through a consistent and comprehensive data backup policy. The other method is for user-defined keys, for some Enclosed hard disk drive FDE,<ref>{{cite web |title=Eclypt Core Encrypted Internal Hard Drive |url=https://www.viasat.com/products/cybersecurity/data-at-rest-encryption/ |website=Viasat.com |publisher=Viasat |accessdate=2021-02-17 |date=2020}}</ref> to be generated externally and then loaded into the FDE.
Line 61:
When a computer with a self-encrypting drive is put into [[sleep mode]], the drive is powered down, but the encryption password is retained in memory so that the drive can be quickly resumed without requesting the password. An attacker can take advantage of this to gain easier physical access to the drive, for instance, by inserting extension cables.<ref name="sed-attacks" />
The firmware of the drive may be compromised<ref>{{cite magazine | url = https://www.wired.com/2015/02/nsa-firmware-hacking/ | title = How the NSA's Firmware Hacking Works and Why It's So Unsettling | first = Kim | last = Zetter | date = 2015-02-22 | magazine = Wired }}</ref><ref>{{cite web | url = https://www.theregister.co.uk/2015/02/17/kaspersky_labs_equation_group/ | title = Your hard drives were
=== Criticism ===
Hardware solutions have also been criticised for being poorly documented{{citation needed|date=April 2014}}. Many aspects of how the encryption is done are not published by the vendor. This leaves the user with little possibility to judge the security of the product and potential attack methods. It also increases the risk of a [[vendor lock-in]].
In addition, implementing system wide hardware-based full disk encryption is prohibitive for many companies due to the high cost of replacing existing hardware. This makes migrating to hardware encryption technologies more difficult and would generally require a clear migration and central management solution for both hardware- and software-based [[Disk encryption#Full disk encryption|full disk encryption]] solutions.<ref>{{cite
==See also==
|