PGP Whole Disk Encryption Training

advertisement
PGP Whole Disk Encryption
Training
Agenda
• WDE Overview
• Licensing
• Universal Server &
Client Basics
• Installation
• Password Recovery
• OS Maintenance
• Support
• Questions
2
Whole Disk Encryption
•
•
•
•
•
•
Protects against: personal
computer loss / theft /
compromise / improper
disposed
Reduces risk of data and loss
of PII (personally identifiable
information)
Protects against loss of
reputation
Encrypts desktops, laptops,
and removable media
Enables business continuity
without disrupting user
productivity
Demonstrates compliance to
regulatory standards
3
Full Disk vs. File Encryption
Unsecured
File Encryption
Encrypts individual files / folders
Requires authentication to decrypt and access files
Full Disk Encryption
Encrypts entire hard drive
Replaces Master Boot Record
with pre-boot environment
Decrypts automatically as files are accessed
4
Notebook with Sensitive Info
• Protected threat: theft or loss
• Whole disk encryption
– Best guarantee of protecting data
– Only protects on that drive (encryption doesn’t
follow the file when it is moved)
– New login prompt on boot
How it Works
• Encrypts entire drive
– Block by block (including unused space)
– Passphrase for key (or token)
• Boot sector replaced with encryption
authentication process
• Drive decrypts and encrypts on read/write
– Key is in memory while running, wiped on
sleep
6
PGP BootGuard
7
Doesn’t protect from'
•
•
•
•
•
Hacking
Malware
Social engineering
Users leaving computer unlocked
Mishandling of sensitive information
8
Disk Encryption Policy
• Restricted
– SSN, CCN, ePHI, PII,
legally/contractually
protected
• Confidential
– Access limited to a
select group of
employees, but not
meeting restricted
definition
• Required
– Portable with restricted
– Desktop with >500
restricted
• Recommended
– Portable with
confidential
– Desktop with <500
restricted
http://policies.emory.edu/5.12
9
Licensing Details
• Emory currently owns 1,501 PGP licenses.
• Many units have already committed to an initial license
purchase.
• Each license is $45.50. Licensed per computer and not per
user.
• Additional licenses may be purchased by sending a
Remedy ticket or an email to securityteaml@listserv.emory.edu containing the following information:
– School/Division/Business Unit name.
– Requestor’s contact information.
– Number of licenses being purchased.
– Smart Key number.
10
Server & Client Basics
• Server
– Linux based soft
appliance provided by
PGP.
– Maintains copies of any
user keys.
– Provides encryption
verification and
auditing.
– Assigns user policies
based on AD group
membership.
• Client
– Most users will never
interact with the client
except to enroll.
– Client communicates
with the server to
report encryption
status, synchronize any
keys, reset recovery
tokens, etc.
– Features can be
enabled or disabled by
policy.
11
Architecture
EHC Domain
Emoryunivad Domain
LDAP Proxy
PGP Server 1
PGP Server 2
F5 Load Balancer VIP
`
Clients
12
Available Features
• WDE
• PGP Shredder – securely erases files.
• PGP Zip – create encrypted zip files and
self-extracting executables.
• PGP Virtual Disk – create virtual encrypted
volumes (similar to TrueCrypt).
13
PGP Policies
• Assigned using LDAP attributes
– We will focus on AD groups
• Per user, not per computer
• Client configuration
– Available features
– Automatic or manual disk encryption
– Can end users create keys
– Can end users encrypt/decrypt other things
14
Administrative Access
• Aladdin USB eTokens
– Windows only
– ~$40 each from CDW
• Add local user manually
• Whole disk recovery tokens
– Retrieved from server
– One-time use
• Admin password (future version)
15
Supported OS’s
• Windows
– 2000, XP, Vista, 7 – both 32 and 64 bit
– Use of PGP on Windows Server is not
recommended
• Mac OS X
– 10.4-10.6
• Linux
– PGP v10 supports some variants of Linux, but
this has not been tested at Emory
16
Installation Overview
• Create policies on PGP server, associated with
(emoryunivad, EHC) AD groups
• Installed via simple Windows MSI or Mac pkg installer
• Run chkdsk.exe /R on Windows clients
• Install on client, let end user “enroll”
• Client grabs policy associated with end user (based on
AD group membership)
• Disk encryption starts automatically (if configured by
policy)
• Additional users can be added to the system as
necessary by adding a new “passphrase user”
17
Installation Caveats
• Active Directory groups must be created
and associated with a policy prior to
deployment. Do you need a delegated
OU?
• The initial encryption process will find bad
sectors if they exist. May also uncover
failing disks. Run chkdsk.exe /R first.
• Make sure that the end user enrolls their
system with the server - don’t user your
credentials.
18
A Word on Groups'
• Be careful not to place users into multiple
groups that control PGP policy enrollment.
• If you’re creating a new group, please include
PGP, your unit, and a descriptive item in the
group name. E.g. EC-PGP-WDE Only, SOMDOM-PGP-All Features.
• Be careful with users that you think might be
using PGP in other schools (think faculty with
dual appointments).
19
Password Recovery
• Unique, one time use recovery token for
forgotten passphrases (Whole Disk Recovery
Tokens)
• See documentation for full WDRT and forgotten
passphrase steps.
20
OS Repair/Upgrades
• Special steps are required to upgrade the
OS on systems encrypted with PGP.
– Decrypt boot drive.
– Uninstall PGP.
– Perform upgrade.
– Reinstall PGP and re-encrypt the boot drive.
• Any operation that makes a change to the
MBR will require special planning.
21
Dual Booting
• OK as long as both OS’ support PGP and
both have PGP Desktop installed. (Ex.
Windows XP & Windows 7 on the same
box)
• If dual booting Windows & Linux, the Linux
partition must remain unencrypted (as of
version 9).
• Neither of these scenarios has been
tested and should probably be avoided if
possible.
22
Getting the Software
• E-mail securityteaml@listserv.cc.emory.edu, or submit a
Remedy ticket with the following
information:
– Full path of the AD group(s) that you will use
to manage PGP policy enrollment.
– Which policy features you want enabled.
• You will receive a reply confirming that
your policy has been configured, along
with a link to download the client software.
23
Where to go for Help
• Submit a Remedy ticket to the UTS Security Team
to:
– Gain access to client installation software
– Request PGP policy changes
– Associate AD groups with policies
– Tier II troubleshooting
– Request WDRT administrator privileges
• Submit a Remedy ticket to the UTS Identity
Management Team to:
– Request a delegated active directory OU
• In Health Care, contact Mike Chilcott or Mickey
McKinney.
24
?
25
Download