Sec ecur urity ity Fea eatures ures for
- r SSD
Sec ecur urity ity Fea eatures ures for or SSD Why Storage - - PowerPoint PPT Presentation
Sec ecur urity ity Fea eatures ures for or SSD Why Storage Security is Important ? Dilemma emmas ! A secret known by two is no longer a secret : https://www.symantec.com/about/newsroom/press-kits#
P2P, Web, FTP, etc
Data in Motion ion Data at Rest Data in Use
data from a cloud server or data is in transit while being shared, that’s data in motion. When that same data is simply existing in the cloud or on an endpoint device, the data is at rest.
for cyber criminals, who can position themselves between where data is stored and where it’s going to syphon
motion is not encrypted, there’s nothing stopping the cyber criminal from gaining access.
more secure than data in motion; the truth is they’re both vulnerable. Outside of physical device theft, where any unsecured data at rest could become vulnerable, if data at rest isn’t
stopping an end user from downloading an app and unwittingly providing it permission to access that file on their device.
from a file being copied between folders to files being edited to data being transferred from a laptop to a thumb drive. While it might be easier to steal data in motion, data in use (and data at rest) must always be secure as well.
laptop or storage device
자료출처 : https://cloud.google.com/security/encryption-at-rest/default-encryption/
Cloud Platform. Either distributed file system encryption or database and file storage encryption is in place for almost all files; and storage device encryption is in place for almost all files.
Management Service (KMS) to retrieve the unwrapped data encryption key (DEK) for that data chunk.
SED SED (Self lf Encryp rypti ting Drive)
▪ The Best-Kept Secret in Storage Device Encryption Security ▪ TCG Opal(Client) / TCG Enterprise(Enterprise) ▪ Encrypts Multi-ranges with Key Management scheme
ATA Securi rity ty
▪ Security mode feature set ▪ The storage device allows read/write access to the user data only after the required authority is proven ▪ User password / Master password ▪ Frozen mode supply : The storage device will abort all read/write commands until it is unlocked
FDE (Full l Disk Encryp ryptio ion)
▪ Encrypts an entire disk(1 Global range) ▪ One Key(Media Encryption Key) encrypts/decrypts the whole device
Micro rosoft eDriv ive
▪ MS Windows manages eDrive ▪ No additional Key Management solution to deploy eDrive
▪ With th User-data Encry ryptio ion TCG Pyri rite te
▪ TCG Security Subsystem Class ▪ Pyrite SSC does not specify encryption of user data
▪ With thout User-data Encry ryptio ion
Encry ryptio ion Manag nagem ement nt Applic plicatio ion AES 128/ 28/256 56-bit bit Hardw rdware are Encry ryptio ion n Engin ine TCG OPAL2 L2.0 IEEE1 E166 667 Prot
AES256
FDE Drive ve Host st
Boot Process
Encr cryp ypte ted Data ta Plain inte text xt Data ta
Accessing Data
OS OS Cryp ypto togra raphic ic S/W drive iver FDE User r Files/ les/Apps
▪ Encryp ryptio ion perf rformed rmed by the OS ▪ FDE Soft ftwar ware
▪ PROS
▪ CONS CONS
SED SED Secu curi rity ty Commands Host st Encrypte crypted Data ta Plain ainte text xt Data ta OS OS Cryp ypto togra raphic ic H/W in SED User r Files/ les/Apps SED SED
SED types
TCG SWG Standards Microsoft Standard OPAL OPALite Enterprise Pyrite eDrive
▪ Hardware AES engin ine ▪ Encryp ryptio ion perf rformed rmed by the driv iver control rolle ler ▪ SED security = SED + ISV application ▪ Provide more Secure Solution than FDE ▪ Protect against to Malware ▪ PROS
▪ CONS CONS ?
Performance Comparison
자료출처 : : https: ps://www.trust usted edst strat ateg egies. es.com/
Truste sted Platf tform Module le PC PC Clien ient Embedded Syste tems Truste sted Netwo twork Connect ct Virtu tuali lize zed Platf tform Mobil ile Infra frastru structu cture re Soft ftwa ware re Stack ck Storag rage Serve rver Truste sted Multi lti-ten tenant Infra frastru structu cture re
TCG Members (Storage Work Group) TCG SWG
자료출처 : www.t .trust rustedco computin tinggro roup.o .org rg
Genera ral Docum cument Secu curi rity ty Sub ubsyste system Class ss Featu ture re Sets ts
TCG Storage Specifications TCG SWG Motivation
TCG OPAL/Enterprise SSCs address the DAR problem
lost laptop or storage device
authentication
With TCG OPAL SED
▪ Compared to S/W-based encryption solutions, SEDs offer many benefits to user
TCG OPAL SED
Encrypted Data Plaintext Data
Drive States
Power off
De De-authenti ticate te
Power off
De De-authenti ticate te
Power off
De De-authenti ticate te
lock/unlock the drive
▪ Syste tem Area
▪ Shadow MBR
▪ User Data Area
with different MEK
TCG OPAL SED Layout
PBKDF DF2(Pa (Passwo ssword rd-Base sed Key y Deri riva vatio tion Functio ction 2) with th SHA256
TCG OPAL SED Operation flow
자료출처 : www.truste .trustedcomp computing tinggroup up.o .org
▪ Digitally Signed Firmware Binaries ▪ All vendor unique commands or other abilities, including for debug, must be protected ▪ Security versioning, logging, etc.
Firmware binary
SHA-256 HASH
Secu cure re Boot t & Down wnlo load
RSA signature (decrypted)
Firmware binary
SHA-256 HASH
RSA public key.
SHA-256 HASH
Firmware binary
SHA-256 HASH
If same, continue boot or download current firmware binary.
SHA-256 HASH
?
Firmware binary Firmware binary
SHA-256 HASH
Firmware binary
RSA private key
RSA signature (encrypted)
SHA-256 HASH
Firmwa ware re Sign ignin ing Key y Genera rato tor
RSA private key
(secret)
RSA public key
(stored at protection area of Storage device)
Signed Firmware ware Image
Firmware binary
RSA signature (encrypted)
SHA-256 HASH