Encryption Guidelines for IT Workers

advertisement
UF Guidelines for IT Workers
Regarding Encryption of Stored
Data
Who Should Know This
These guidelines apply to UF IT workers who support encryption of Restricted Data [3].
IT workers should read and understand this document before supporting Users of
encryption for Restricted Data.
Definitions
Encryption, for the purpose of this document, is a process that uses a programmed
algorithm to transform data to an obscure form. It typically involves the use of an
electronic key, passcode or passphrase known only to those who are authorized to
access the data. The key, passcode or passphrase is used to both encrypt the data and
subsequently decrypt the data, returning it back to its original form when needed to be
used.
Encryption key, passcode and passphrase are terms that refer to secret codes or
strings of characters used in an encryption process. For purposes of this document, the
terms will be used interchangeably. Generally speaking, the passcode or passphrase
serves the purpose of ensuring the right user is decrypting the data, and the encryption
key serves the purpose of encrypting and decrypting the data. Depending on the
encryption product, the encryption key, passcode or passphrase may perform a different
technical function. From a general use standpoint the differences are subtle and the
terms are often used interchangeably.
Key Recovery means there is a lost or forgotten key, passcode, or passphrase
contingency feature in the product. If the user forgets the key they used to encrypt their
data, there is another secure means of decrypting his data.
Central Management means the product features key recovery and management from
a centralized process and location for all the encryption users of the product, by a
trusted organization. It also means there is the opportunity for group policy configuration
whereby Users are prevented from circumventing encryption controls on their
workstation.
Encrypts Entire Disk means the product encrypts the whole disk, even places where
temporary, page, user profile and other files (that might contain Restricted Data are
stored, unknown to the user.
Encrypts Files/Folders means the product encrypts selected data files and folders but
has no encryption coverage elsewhere on the storage medium such as places where
temporary, page, user profile and other files (that might contain Restricted Data) are
stored.
Encrypts Virtual Disk means that the product creates a file system within an encrypted
stand-alone file so it can be mounted as a real disk. The file may be mounted via
network share, CD, DVD, etc. Access to the data is only allowed when the file is
properly mounted and the appropriate key is supplied. When unmounted the file is
encrypted.
Purpose
This document provides information on encryption solutions for data at rest. It is not
intended to address encryption of data transmission. Some solutions listed below may
provide protection of data while it is in transmission, but that is not the primary focus of
this document and should not be assumed.
Some of the challenges that have deterred the use of encryption for everyday use
include:
1. Performance degradation. Additional time is needed to encrypt when saving files
and decrypt when accessing files. On current processors, the impact of
encryption/decryption processes is negligible.
2. Data loss. Data may be irretrievable if the key or passphrase, known only to the
user, is forgotten. Recovery features are improving in current products, but data loss
is still a risk.
3. Additional passwords. Encryption may add another password prompt between the
user and their data. Many current products do not require an additional password,
but for those that do, it is an acceptable trade-off for improving the security of data.
4. Encryption key management. Exchanging keys securely and efficiently among
Users sharing encrypted files adds complexity.
5. Complexity. It takes a combination of disparate products to do a complete job of
encrypting all Restricted Data on workstations, mobile computing devices and
removable media. One product solution may not work across all the platforms that a
user may use (PDA, business laptop, home computer.)
UF strongly urges encryption of Restricted Data on mobile computing devices [1] and
removable media [2] since the risk of unauthorized disclosure outweighs the challenges
of using encryption. Ramifications of unauthorized disclosure may be more severe if
data is not encrypted.
This document provides summarized feature information on a limited set of encryption
products that are broadly applicable in the UF environment. Units are not required to
select products from this document, but must employ effective encryption of Restricted
Data [3] stored on mobile computing devices and removable media.
Encryption Products
This section is informational only. It is not intended as an endorsement of these
products.
Windows desktops & laptops where Restricted Data is required and routinely stored
by the user.
o PGP WDE (Whole Disk Encryption) Professional in an unmanaged workstation
environment or PGP WDE Enterprise in a managed workstation environment:
PGP stands for Pretty Good Privacy, the name of a software company
specializing in encryption software. PGP WDE stands for Whole Disk
Encryption, which is PGP’s encryption product that can encrypt entire disks,
including boot sectors, system files and swap files, and runs as a background
process transparent to the user. Effective for securing all Restricted Data on
hard disks. Encryption does not follow data that are moved off of a Whole Disk
Encrypted hard drive, to a file share, email or to removable media for instance.
Users will have to enter a passphrase upon boot up of their computer, in
addition to entering their network/workstation logon.
July 10, 2008
2
Windows XP mobile computing devices, where Restricted Data is not required or
routinely stored by the user, and that do not have an entire disk encryption solution
already installed.
o XP version of EFS (Encrypting File System).: EFS stands for Encrypting File
System. It is the Microsoft encryption solution built into Windows 2000
Professional, Server 2000, XP Professional, 2003 Server and Vista. It is
effective for securing Users files and folders in the Windows XP environment
and has easy user activation. However, EFS does not secure all Restricted
Data under Windows (e.g. system and %systemroot%). EFS encrypted files
can still be listed or deleted, so Users should be careful about what they name
their files. EFS leverages the user’s Windows password for the encryption key
so that Users are not prompted twice from the workstation to access their
resources (desktop and data), but this puts added emphasis on the strength
and security of the user password on a Windows workstation. The Windows
2000 version of EFS cannot be relied upon for security, and is not
recommended. The XP version of EFS has improved upon the security holes
and is recommended for uses stated above. However, pay very close attention
to the Data Recovery Agent (DRA) handling prior to activating EFS XP to avoid
support issues.
Windows Vista
o Bitlocker: BitLocker is a full disk encryption solution built into Windows Vista
Ultimate and Enterprise editions. Taking a step further than EFS, it encrypts all
user and system data on the hard drive. A Trusted Platform Module (TPM) chip
included on the computer’s motherboard or USB flash drive is required to use
BitLocker. Authentication during the boot process is done using either a PIN
(TPM chip) or startup key (USB flash drive) in order to decrypt the contents of
the hard drive and load Windows.
Macs
o FileVault: FileVault is the encryption solution built into Mac OS. It is effective
for encrypting all contents of the Mac OS user’s home directory. Encryption
does not follow data transferred from a Mac to another computer, nor does it
encrypt data stored on the MAC hard drive outside of the user’s home directory.
Removable media accessible by Windows and Linux
o TrueCrypt: TrueCrypt is an Open Source encryption product that encrypts file
volumes. It is PC and OS independent, so is useful on removable media.
Installation is required on the removable media. A driver must be loaded on any
computer accessing a TrueCrypt encrypted file volume. Therefore, the IT
support group will need to include the driver in their workstation image.
Removable media accessible by Macs
o PGP Virtual Disk: PGP Virtual Disk creates a file that can be mounted as a file
volume. Any files subsequently stored in this file volume are encrypted. Files
encrypted with PGP Virtual Disk remain encrypted even if moved, for instance
to be accessed by another computer. However any computer accessing the
encrypted files will need to have PGP Virtual Disk software installed. Users will
have to enter a passphrase to access their PGP encrypted files.
o PGP SDA (Self Decrypting Archiving): PGP SDA stands for Self Decrypting
Archiving. This PGP product targets the need for securing files that need to be
transferred between computers and media, and does not require the presence
of PGP to decrypt a shared encrypted file. It features the ability to encrypt a file,
and the decryption logic is contained within the encrypted file. When the file is
July 10, 2008
3
sent or moved, it can be decrypted by another computer without the encryption
software present. Users will have to enter a passphrase to access their PGP
encrypted files.
Open source file encryption for multiple operating systems
o GPG (or GnuPG) stands for "GNU Privacy Guard", and is a free, open source,
platform-independent replacement for parts of the PGP software suite. GPG is
used to encrypt individual files or email messages, but does not support wholedisk or filesystem encryption. GPG-encrypted files and email messages are
compatible with PGP and other encryption programs that comply with the
OpenPGP standard. GPG is a good choice for encryption of individual files
when interoperability among different operating systems is required.
Table 1: Encryption product compatibility by operating systems.
Bitlocker
GPG
Operating
System

Mac OS

Microsoft
Windows
2000 SP41,
Windows
2003, and
Windows
XP

Microsoft
Vista

Linux
1
Support ends June 30, 2010.
PGP
WDE
Pro
PGP
WDE
Entrp


Product
PGP
PGP
Virtual SDA
Disk




EFS
FileVault
TrueCrypt






Table 2. Encryption product features.
Bitlocker
Feature
Entire Disk
Files/Folders
Virtual Disk
Central
Management
Key
Recovery
July 10, 2008
GPG




PGP
WDE
Pro

Product
PGP
PGP
PGP
WDE Virtual SDA
Entrp
Disk





EFS
FileVault


TrueCrypt




4
Bibliography
[1] Guidelines for IT Workers Who Support Mobile Computing Devices Used With
Restricted Data, http://www.it.ufl.edu/policies/security/documents/it-worker-mobiledevice-guidelines.pdf
[2] Guidelines for IT Workers Who Support Removable Media Used to Store Restricted
Data, http://www.it.ufl.edu/policies/security/documents/it-worker-removable-mediaguidelines.pdf
[3] UF IT Standards for Confidentiality of Restricted Data:
http://www.it.ufl.edu/policies/security/documents/restricted-data-standard.pdf
Product Links
Full Disk Encryption: http://www.full-disk-encryption.net/
PGP: http://www.pgp.com/
GPG: http://www.gnupg.org/
TrueCrypt: http://truecrypt.sourceforge.net/
Mac FileVault: http://www.apple.com/macosx/features/filevault/
Microsoft Windows XP EFS:
http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/prnb_efs_qutx.asp
http://www.microsoft.com/technet/security/smallbusiness/topics/Cryptographyetc/protect_data_efs.mspx
Microsoft Windows 2000 EFS:
http://www.microsoft.com/windows2000/techinfo/planning/security/efssteps.asp
http://cert.uni-stuttgart.de/archive/forensics/2003/06/msg00010.html
Microsoft Bitlocker: http://technet.microsoft.com/en-us/windowsvista/aa905065.aspx
July 10, 2008
5
Download