Self Encrypting Drives - Everything You Need to Know

There’s alot of misleading information about Self Encrypting drives.

Hopefully this post can clarify that without all the fazzle. Looking at from a purely functional point of view, there are 3 types of drives out there

  • Type 1 - no encryption, no locking

  • Type 2 - encryption, no locking

  • Type 3 - encryption with locking

To expand on what the above means in a bit more detail, lets clarify the terminology

No Encryption

Data written to the controller (from the server) is the exact same data that gets written to the storage medium, in this case the raw unencrypted data its what gets written to NAND flash.

Encryption

Data written to the controller (from the server) gets encrypted by the controller typically AES 256bit, and that encrypted data is what gets written to the NAND flash.

No Locking

If someone has physical access to the disk, they can access your data regardless of weather it supports encryption or not

Locking

Even with physical access no one can access the data without the secret key. It requires a key/password to be able to “unlock” and read the contents of the disk.


Now that the terminology is clear, lets expand on the 3 different types of drives that are out there.

Type 1 - No Encryption + No Locking

No Encryption, no Locking

This is the typical old style disk. In the past disk controllers were fairly weak and not capable performance wise to encrypt data at high speed. Typically they could schedule data transfers and do wear leaving algorithms, but lacked the performance to run operations at line rate on the incoming data stream. Thus what got sent to the disk controller is what gets written to the storage media e.g magnetic platter or NAND.

Type 2 - Encryption + No Locking

What is a Self Encrypting Drive? Self-Encrypting Drives | SED Drives | Self Encrypting Drives

As you can not lock prying eyes from seeing your data, you might ask whats the point of 2)? The point is a fast and effective "deletion of data”. e.g a kill switch that runs quickly and efficiently, to delete all data.

In the past before controllers started encrypting data. to safely delete/wipe data off the disk you had to write (typically multiple times) across all of the storage media. This effectively overwrites with random bits everything on the actual storage media. To do this on a large HDD or SSD can take a long time, HDD in particular this can be double digit hours. In addition there’s no guarantee all of the storage media will be overwritten, think of SSD overprovisioning / wear leveling algorithms. You have no visibility or control on where your writing to on each NAND chip.

Because its so haphazard, government and business created standards, that require an effective way to destroy data. using disk encryption, with no locking, all that’s required to destroy the data is…. deleting the encryption keys. As the data on the storage medium is un-readable without being decrypted.

These disks are typically called “SED AES Encrypted Secure Erase”. e.g the media is encrypted, and you can delete the keys. But thats all.

If your bitcoins are on this type of drive, anyone with physical access can steal them.

Type 3 - Encryption + Locking

Finally there is encryption with locking. In the modern NVMe era these are classed as Trusted Computing Group (TCG) OPAL 2.0. the full specification in link below:

https://trustedcomputinggroup.org/wp-content/uploads/TCG_Storage-Opal_SSC_v2.01_rev1.00.pdf#page=12

In the by gone SATA era this was known as “ATA Security Erase/Lock/Frozen” feature set.

What TCG OPAL 2.0 means is the drive has a security interface that accessible from the host. FMADIO Packet Capture appliances we use the opensource utility sedutil that uses the “nvme security-send” and “nvme securtity-recv” NVMe protocol functions to interface with the security module on the drive.

Sadly there are many flavors of TCG OPAL 2.0, many marketing terms used to convince you the drive supports TCG OPAL. Many claim “AES 256bit encryption”, or “OPAL Lite” as a security feature but lack function to lock/unlock using TCG OAPL2 - choose your drives carefully!

What are the critical features? most importantly its the ability to lock the entire drive, e.g. the controller requires a key without a password to unlock the AES Encryption Key. This is what most people think of as a “SED” Self Encrypting Drive e.g. without a password to unlock the disk, then all those bitcoins on the disk are just gibberish… and your bitcoins are secure.

This type of drive what you want in the corporate and government world, TCG OPAL 2.0 disks with AES 256b Encryption and Locking. And what FMADIO devices fully support. If a malicious actor physically removes/steals/acquires the storage medium. Its useless as the data is garbage even if you de-solder, reverse engineer the controller and NAND, the bits are meaningless without the encryption key.

Summary

All FMADIO Packet Capture disks are carefully selected as Type 3) Encrypted and Locking ensuring your packet capture data is secure.

As “AES Encryption” on the packaging does not equal a secure SED disk, choose your drives carefully!

Previous
Previous

FMADIO 100G Portable Capture

Next
Next

Raspberry Pi Network Monitor in AWS