FIPS 140-2: Data-at-Rest Encryption (D@RE)
No one ever got fired for encrypting their data!
Increasingly organizations are requiring data to be encrypted at rest to prevent data loss and theft.
Data-at-rest refers to data not actively being accessed stored on non-volatile storage such as a disk drive; and encrypting the data means the data is transformed in such a way that a third party cannot translate the data into a usable form. Encryption is usually accomplished through use of a FIPS encryption module located on a disk drive. These type of drives are known as self-encrypting drives (SED). D@RE can also be accomplished by use of encrypting controllers which encrypt data as it is written to drives and decrypts as the data is retrieved. Encrypting controllers do not require SED drives as they work with non-SED drives.
Data security and encryption is achieved through the use of a data encryption key (DEK). In addition, the DEK (key) can also be encrypted often through the use of a RSA key for multilayer security.
Encryption can be applied to an entire disk or just to the file system. Because full disk encryption uses symmetric keys, a user will need to enter a passphrase when the system boots. A pass phrase is not required for file system encryption.
Benefits of D@RE
*Prevents access to the data on the disk if for some reason the disk is lost, stolen or inadvertenly falls into the wrong hands (via salvage, disk return, etc...)
*Can satisfy security or regulatory requirements
*It can prevent data access under certain circumstances (for example, the OS/boot disk can be unencrypted, but the data stored on different disks can be encrypted thereby preventing access to the actual data)
Limitations of D@RE
*Will not protect against intruders who gain privileged access
*Can reduce I/O performance
*Under some configurations, if a passphrase is lost or a key is lost the data is lost forever.