Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
Protect Sensitive Data Using
Encryption Technologies
Ravi Sankar
Technology Evangelist | Microsoft Corporation
http://ravisankar.spaces.live.com/blog
Clients
• Documents
–Where do users keep their documents?
• User Profile
–Outlook, Sharepoint, Desktop, Temp, IE…
• Per-machine Data
–Search index, offline file cache, pagefile…
• Non-standard Locations
–…ISV & in-house apps
What are the data protection
options?
• BitLocker Drive Encryption
• Encrypting File System
• Rights Management Service
• But don’t forget
–Data backup
–Data minimizing
–Data classification
• Each year, hundreds of thousands of
computers without appropriate
safeguards are lost, stolen, or improperly
decommissioned around the world
System
Operating System VolumeContains:
• Encrypted OS
• Encrypted Page File
• Encrypted Temp Files
• Encrypted Data
• Encrypted Hibernation File
System Volume (1.5GB)
Contains:
• MBR
• Boot Manager
• Boot Utilities
Where’s the Encryption Key?
1. SRK (Storage Root Key) contained in TPM
2. SRK encrypts the VMK (Volume Master Key).
3. VMK encrypts FVEK (Full Volume
Encryption Key) – used for the actual data
encryption.
4. FVEK and VMK are stored encrypted on the
Operating System Volume.
FVEK
3
4
Operating
System
Volume
SRK
1
VMK
2
Disk Layout & Key Storage
BDE Protection MethodsFactors BDE Function and Remarks
TPM
• Transparently validates early boot components on OS startup
• Best ease of use
• Protects against HW-only attacks
• Vulnerable to some HW attacks
TPM
+
PIN
• User must enter 4-20 digit PIN on OS startup
• BDE validates PIN and early boot components
• Protects against software-only and many hardware attacks
• Vulnerable to TPM breaking attacks
TPM
+
Startup Key
• Looks for USB flash drive with Startup Key
• BDE validates saved key and early boot components
• Protects against many HW attacks
• Protects against TPM attacks
Startup Key
• Looks for USB with Startup Key
• BDE validates saved key
• Protects against many HW attacks
• Vulnerable to lost token and pre-OS attacks
*******
BitLocker Scenario 3
Nothing
Reformat drive
Admin wipes drive
Delete keys
Normal BitLocker™ DecommissionVs.
Encrypting File System
• Encrypts each file
• Requires NTFS
• Smart card support for user/ recovery key
Users without Office 2003 can view rights-protected files
Enforces assigned rights: view, print, export, copy/paste & time-based expiration
Secure Intranets IE w/RMA, Windows RMS
Control access to sensitive info
Set access level - view, change, print...
Determine length of access
Log and audit who has accessedrights-protected information
Secure DocumentsWord 2003, PowerPoint 2003
Excel 2003, Windows RMS
Keep corporate e-mail off the Internet
Prevent forwarding of confidential information
Templates to centrally manage policies
Secure EmailsOutlook 2003Windows RMS
• Safeguard Sensitive Information with RMS
• Protect e-mail, documents, and Web content
End User Scenarios
Federated Rights Management
Together AD FS and AD
RMS enable users from
different domains to
securely share documents
based on federated
identities
AD RMS is fully claims-
aware and can interpret AD
FS claims
Office SharePoint Server
2007 can be configured to
accept federated identity
claims
Account
Federation
Server
Resource
Federation
Server
AdatumContoso
Federation Trust
Web
SSO
Windows Vista/Server 2008
Information Protection
Scenarios BitLocker EFS RMS
Laptops
Branch office server
Local single-user file & folder protection
Local multi-user file & folder protection
Remote file & folder protection
Untrusted network admin
Remote document policy enforcement
Some cases can result in overlap. (e.g. Multi-user roaming laptops with untrusted network admins)