The Whole Drive
More and more companies are using full-drive encryption (FDE) as a way to protect their data.
- By Joern Wettern
Barely a day goes by without a news story about a lost or stolen notebook computer. As a result of several high-profile incidents, there has been an increase in legislation requiring companies to take costly steps if personally identifiable data is compromised.
Many companies are now looking at full-drive encryption (FDE) as a primary method of protecting data on notebook computers against unauthorized access. Selecting the right FDE solution for your situation can be a tedious process, though. You need to know your choices and what capabilities to look for when evaluating products.
While any encryption process will slow down disk access somewhat, it's unlikely that it would be enough to be noticeable during everyday computing. If top-notch performance is an important issue, run some tests with your standard applications using different FDE products.
Most FDE systems include the same components. After starting the computer, but before booting the operating system, there's a pre-boot authentication (PBA) process. For this step, the computer boots into a small proprietary operating system, often a hardened minimal version of Linux. The user is prompted for a username and password, or a smartcard or token with a certificate. The offered credentials are compared against the PBA database.
If authentication is successful, the PBA mechanism loads the disk encryption key into memory and starts Windows from the encrypted partition, using a
Windows driver to decrypt each disk sector as needed. Once the pre-boot authentication mechanism has handed control over to Windows, the computer's operations are essentially identical to a non-encrypted computer.
If authentication fails, the encryption key remains inaccessible and the Windows partition remains encrypted. Additionally, the PBA mechanism may block any further authentication attempts after a certain number of failed authentications.
One important factor when considering an FDE product is the type of authentication mechanisms it offers. The typical choices are username and password or some type of two-factor authentication using certificates, tokens or a biometric mechanism. Two-factor authentication provides a higher level of security, but may require significant administrative overhead. If you decide to go this route, base your choice on usability and manageability. Also, try to find a mechanism you can use for other authentication needs, like remote access.
Out of Sight
Security should be transparent to users, and not something that unnecessarily complicates their experience. Adding PBA could potentially do just that. To simplify the startup process, most FDE software integrates with the Windows log-on process to automatically supply your pre-boot credentials to Windows. As long as your credentials are valid for both PBA and the Windows log-on, a single sign-on takes care of both.
Keeping single sign-on working reliably can take some extra care. Full-drive encryption with single sign-on functionality generally monitors password changes in Windows and automatically changes the pre-boot password to keep the two synchronized. However, if you change your password on another computer, the pre-boot database may not be updated and the passwords get out of sync.
Other schemes include:
Hardware-based encryption: Seagate and other storage vendors have recently introduced notebook computer hard drives with built-in encryption hardware. Encrypting the drive in the hardware can increase performance and may make encryption easier to use and manage. Many of these drives, however, don't provide a robust mechanism for central password recovery or two-factor authentication.
File-based encryption: Some products only encrypt specific files instead of an entire drive. After all, many files on your hard drive, like operating system files, don't contain confidential information. You can get better performance by encrypting only those files that need to be protected. Also, by leaving the disk structure and system files unencrypted, you can use most disk repair and disaster recovery tools on your computer.
However, file-based encryption depends on users or software to make decisions about which files should be encrypted. Those decisions can leave confidential data unencrypted. Also, without PBA protection, malicious software can infect the computer when it's started from removable media. These factors make FDE a better choice than file-based encryption, in most cases.
BIOS or ATA password: Many notebook computers let you configure a password in the BIOS that you need in order to access the hard drive. BIOS passwords don't actually encrypt data. They activate a lockout feature in the drive's firmware. However, there are several tools available to bypass this protection.
Some of the biggest differences among FDE products lie in the simplicity of central management. Before comparing different products, it makes sense to create a complete list of expected management tasks, from automated installation to remote unlocking for users who forget a password or lose a smartcard. You should also evaluate how easy it is for multiple users to share the same computer or add new users to the PBA database.
Finally, if you remotely manage computers, evaluate whether you can still start a computer remotely without human intervention to perform maintenance or install software. To allow this, the FDE solution needs to have a mechanism to temporarily turn off the PBA.
FDE solutions also differ in how they let you access your data in case something does go wrong with the disk, such as an accidental erasure of the partition table or physical damage manifesting itself as bad sectors. If you don't store important data on an encrypted drive, disaster recovery may simply consist of replacing and re-imaging a damaged disk.
If you ever need to recover data from an encrypted drive, you first need to remove the encryption before you can use most disk repair or data recovery tools. Most FDE products let you remove encryption from a disk partition, but only some let you recover data when part of the partition has become unreadable or when the partition table is missing.
Choosing the right FDE product can be a challenge, but making the right decision is much easier when you know what to look for. To ensure that you get the protection you need, insist on integrated PBA and evaluate whether or not you need two-factor authentication.
More InformationJust How Secure Is Full-Drive Encryption?
In February, a group of researchers at Princeton University published a study
that described a serious vulnerability of virtually all software-based full-drive
encryption products: Disk encryption keys held in RAM are not immediately erased
when you turn a computer off. Residual electrical charges are held by RAM chips
for a short time afterwards.
In the "cold-boot attack" demonstrated by the Princeton researchers,
they were able to read or reconstruct encryption keys by powering a computer
back on and looking for data that remained in RAM. Using these keys, they could
then decrypt all data on the drive.
Attackers can successfully use a cold-boot attack to defeat all software-based
FDE schemes, and even other types of encryption. However, it's relatively difficult
to perform and surprisingly easy to protect against.
Since RAM chips quickly lose their electrical charge, the attacker has to get
his hands on your computer while it's turned on or within about a minute after
it has been turned off. The attacker also needs to immediately boot into a different
operating system. Most scenarios for laptop loss don't allow someone to complete
an attack within this short time frame. (The time window for a successful attack
can be extended, though, by chilling the chips to subzero temperatures.)
Fortunately, you can easily and effectively defend yourself by always turning
your computer off or placing it into hibernation before you let go of it. A
cold-boot attack won't be successful against a computer that you've powered
off for even a few moments, as long as pre-boot authentication protects the
encryption key. This authentication must be present both when the computer is
powered on and when it resumes operation after hibernation.
Any full-drive encryption software that doesn't perform pre-boot authentication
after power-on and hibernation doesn't protect your data sufficiently. You can
find the Princeton research paper and additional background information at http://citp.princeton.edu/memory.
Joern Wettern, Ph.D., MCSE, MCT, Security+, is the owner of Wettern Network Solutions, a consulting and training firm. He has written books and developed training courses on a number of networking and security topics. In addition to helping
companies implement network security solutions, he regularly teaches seminars and speaks at conferences worldwide.