sSE04 - Full Disk Encryption For IBM Disk
sSE04 - Full Disk Encryption For IBM Disk
sSE04 - Full Disk Encryption For IBM Disk
Agenda
Why use Full Disk Encryption (FDE)? DS8000 Key Servers
TKLM Tivoli Key Lifecycle Manager ISKLM IBM Security Key Lifecycle Manager
Active authentication mechanisms in place while Storage in use This disappears when equipment is removed from environment (and no one should be authorized access to this data)
In the case where returned HDD's are handled by a third party, IBM requires such third party to follow specific guidelines for handling and protecting information. IBM Business Practices/Contracts and Negotiations Section Re: Data Security Procedure of Returned Magnetic Media
2011 IBM Corporation
RAID10 4+4 RAID10 3+3 RAID5 7+P RAID5 6+P Minimum Logical Volume size, one extent=1GB(binary)=4096 strips
Simplest Case
D D
D D
D D
D D
RAID10 4+4
Logical Volumes (what the Host sees) are made up of extents
This includes
Disk Metadata
Strip 1 Strip 5 Strip 9 .
. .
Extent 1
Strip 4093
. . .
Extent N
Extents are spread across the physical disks in the Rank Unless the file is smaller than a strip, unlikely a whole file is visible Records and portions of files are certainly visible.
As long as extents are available in the extent pool, logical volumes can be created Logical Volumes can also be deleted, returning the extents to the extent pool for volume creation
Dirty Extents marked as reusable, customer data remains
Means there may be data on the physical disk that no host can access Strategies to counter dirty extents (what you can do).
Upon LUN / logical volume creation, previous data is initialized (cleaned-up)
Define volumes on all extents in every extent pool
Array creation performs disk initialization too (MKARRAY) Or use Full Disk Encryption
Although normal operations now will skip over the bad sector(s) data previously written remains in this area.
Image reproduced by permission of Hitachi Global Storage Technologies. Unauthorized use not permitted.
4/2/2010 Rick Ripberger IBM System Storage DS8000 Disk Encryption Implementation and Usage Guidelines http://www.redbooks.ibm.com/abstracts/redp4500.html?Open IBM System Storage Data Encryption Redbook SG24-7797-00 http://www.redbooks.ibm.com/abstracts/sg247797.html?Open This presentation is an overview of these papers and the IBM Announcements concerning DS Full Disk Encryption features
Cryptography 101
Encryption is encoding data with an encryption key Decryption requires a key Encrypted data is called Ciphertext Non-encrypted data is called plaintext or cleartext If done correctly, it is prohibitively difficult to derive cleartext from ciphertext without the decryption key A strong Cipher requires resolution by key or brute force Properly encrypted data is securely secret from anyone who does not have the decryption key An encryption/decryption key is preferably random numbers of a bit length specified by the encryption algorithm
Clear Text
Data that is not encrypted is referred to as clear text Clear text is encrypted by processing with a key and an encryption algorithm
Several standard algorithms exist, include DES, TDES and AES
Triple DES is expected to be broken in about the year 2030 (via Brute Force) Advanced Encryption Standard (AES) hasnt seen its end date yet. (i.e. AES is considered stronger than TDES).
Considered a Block Cipher (128-bit block size and 128,192, or 256-bit keys)
Asymmetric keys use different (but mathematically related) keys for encryption and decryption
These keys are referred to as private/public key pair Provides a method to transfer key securely between parties
Symmetric Encryption
Data that is not encrypted clear text Clear text is encrypted by processing with a key and an encryption algorithm Keys are bit streams
128, 192, 256 bit key length
Asymmetric Encryption
The key used to encrypt is often referred to as the Public key, eg. the KEKs used to wrap the DK and create the EEDKs. The Public key may be made widely available without fear of compromise. The Key used to decrypt is referred to as the Private key. Private Keys must be secured against unauthorized access. Public / Private encryption is widely used for exchange of data between organizations.
2011 IBM Corporation
IBM Encrypting Storage uses a Key Server to store wrapping keys The agent that stores or has access to the encrypted data keys is a storage device Only when the Key Server is united with the proper storage device(s) can the ciphertext become cleartext.
Key Servers
To preserve access to encryption keys more that one Key Server needs access to any single piece of information needed to determine the encryption key (redundant key servers, consistent key stores). These redundant Key Servers use independent communication paths to the storage devices Backups of each Key Servers data are maintained. Failure of any Key Server or any network does not prevent storage devices from obtaining access to data keys required to access data (worst case, data must be restored to a new Key Server). Redundancy is also provided on the storage media by providing multiple copies of the encrypted data key
Encryption Process
DS8000 Host
Apps
H A
D A
Encrypted Disk
HMC
Clear text
TKLM
2011 IBM Corporation
(TKLM Version 1, hosted in the System Services Runtime Environment for z/OS)
Lifecycle functions
Notification of certificate expiry Automated rotation of groups of keys
Same TKLM can be used with IBM DS8000, DS5000, and IBM Tape
2011 IBM Corporation
TKLM continued
The keys used by TKLM are a public/private asymmetric key pair referred to as the public Key Encrypting Key (KEK) and the private Key Encrypting Key (KEK), respectively. The key generation and propagation processes on the TKLM, associate a Key Label to each wrap/unwrap pair This Key Label is a user specified text string and retained with each wrap/unwrap pair Key negotiation and authentication between TLKM and the DS8000 take place at DS8000/DS5000 power on. One TKLM key server can easily handle multiple DS8000s and DS5000s, the network traffic requirement is small
Supports cryptographic erasure of data (change of encryption key) Key attack vectors being addressed:
Disk removed (repair, or stolen) Box removed (retire, or stolen)
IBM procedure to sign a Customer Agreement and to activate Encryption function on each SFI
Encrypting Disks
2011 IBM Corporation
.. Non-Encrypting Disks
Bands with encrypted customer data are locked by DS8000 before any customer data is stored on band Bands with unencrypted customer data are not locked by DS8000
Encrypting disks have band encryption key set, band unlocked, and data pre-initialized at factory so do not have to re-initialize when band is locked
2011 IBM Corporation
StoragePlex DS8000 Storage Facility Storage Facility Image StoragePlex SFI Server SFI Server HMC
Dual HMCs Recommended
3 DSGUI / DS-CLI
Configure TKLM Ports 2 DS8000 Encryption Group
HMC
Customer Network
Get New Data Key
TKLM GUI
Configure TKLM Devices & Key Labels
User
TKLM
HSM
TKLM
HSM
Key Repository
DS8000
30 2011 IBM Corporation
TKLM
HSM
TKLM
HSM
Key Repository
DS8000
31 2011 IBM Corporation
TKLM
HSM
TKLM
HSM
Key Repository
DS8000
32 2011 IBM Corporation
TKLM
HSM
TKLM
HSM
Key Repository
DS8000
33 2011 IBM Corporation
TKLM
HSM
TKLM
HSM
Key Repository
DS8000
34 2011 IBM Corporation
TKLM
HSM
TKLM
HSM
Key Repository
DS8000
35 2011 IBM Corporation
TKLM
HSM
TKLM
HSM
Key Repository
DS8000
36 2011 IBM Corporation
TKLM
HSM
Key Repository
TKLM
HSM
TKLM
HSM
Key Repository
TKLM
HSM
TKLM
HSM
Key Repository
DS8000
39 2011 IBM Corporation
TKLM
HSM
TKLM
HSM
Key Repository
1) Request Unwrap Symmetric Key sending both Key Label 1 and 2 wrapped keys
40 2011 IBM Corporation
DS8000
TKLM
HSM
TKLM
HSM
Key Repository
2) Unwrap Symmetric Key associated with Key Label that this Key Server has the private key for
41 2011 IBM Corporation
DS8000
TKLM
HSM
TKLM
HSM
Key Repository
TKLM
HSM
Key Repository
Multi-Site zSeries/Disk Encryption at R4.2 with xSeries IKS All Key Servers in Clear Key Mode
Site 1
System z Key Store Backup replicated cross site by Disk Mirror Restore Mirror At Secondary Site to Replicate Key Stores TKLM Export/Import to Copy from zSeries Key Store to IKS No Support for System z ICSF secure key mode, Single Key Label on DS8000 Series z CEC Series x IKS
Clear Key KS TKLM General Key Servers (GKSs) Manual Key-Pair LPAR Push TKLM
Site 2
Series z CEC
General Key Servers (GKSs) Manual Key-Pair Push
Series x IKS
Clear Key KS TKLM
LPAR LPAR
LPAR LPAR
LPAR
TKLM
Key Repository
Clear Key KS
Clear Key KS
Key Repository
DS8000
44 2011 IBM Corporation
DS8000
Non-Encrypting
DS8000
Non-Encrypting
DS8000
Multi-Site zSeries/Disk Encryption at R5.0 with Secure Key zSeries HSM and Clear Key xSeries IKS
System z HSM in Secure Key mode, DS8000 with Two Key Labels and Recovery Key System z to System z HSM Replication through ICSF System x to System x Replication via TKLM Backup Restore TKLM Export/Import to Copy Public Keys Between zSeries and IKS Key Stores
Site 1
Series x IKS
Clear Key KS TKLM
Series z CEC
Secure Key KS x/z Manual GKS Public Key LPAR Pushes TKLM
Series z CEC
Secure Key KS
Site 2
Series x IKS x/z Manual Public Clear Key Key KS Pushes TKLM
Key Repository
Key Repository
Recovery Key w/Dual Control
DS8000
DS8000
Customer configures one or more encryption capable ranks in an extent pool that is configured for encryption group.
Ranks and extent pools have an encryption group attribute: Encryption Group 0 designates No Encryption Encryption Group 1, designates Encryption DS8000 locks data bands on encryption disks that are configured in an extent pool that is configured for encryption group 1
Deleting a rank causes SFI to reset the encryption key on the disks in the rank causing cryptographic erasure.
Disks are reinitialized whenever a rank is deleted (encrypting or non-encrypting)
Copy services functions are performed in the clear encryption does not affect
2011 IBM Corporation
47
48
Deadlock Prevention
One Critical Consideration with using a key server implementation is that all code and data objects required to make the key server operational must not be stored on a storage device dependent on any key server to be accessed. Potential for all encrypted data managed by Key Servers to be permanently lost Examples of a deadlock: TKLM server boot disk located on encryption enabled drive TKLM Data Base / program code located on encryption enabled drive TKLM backup on encryption enabled tape For DS80000, use of an Isolated Key Server is required Key Server backups cant reside on encrypted media DS8000 Feature Code #1760 will provide Isolated Key Server Hardware and pre-installed TKLM software
Layers of Virtualization can make it difficult to know where data resides Transparent Data Relocation Consolidation of Servers and Storage Difficult to determine if deadlock exists without power cycling the storage complex Servers supporting SAN Boot (and not supporting internal boot)
Encryption Environment must be managed to a high standard of care to prevent deadlock occurrence
Maximum security is achieved when the key material is stored securely using the services of a Hardware Secure Module (HSM)
IBM provides this level of capability on System z using ICSF and the CryptoExpress 2 HSM
2011 IBM Corporation
Each DS5000 encryption enabled subsystem should be password protected to prevent unauthorized creation of the security file
2011 IBM Corporation
Customer personnel need to review Customer Encryption documentation annually. Anyone who:
Implements or configures TLKM key servers or encrypted storage products Responsible for Key Server Backups
Review and update Systems Management processes related to configuration and change management of key servers and encrypted storage.
2011 IBM Corporation
Entire Storage Facility is encryption-capable or not encryption capable. Applications continue to work unchanged. TKLM unwraps single key stored on DS8000 to unlock the entire Storage Facility Image.
DS8000 MUST be connected to at least 2 TKLM Servers. One of the two TKLM servers must be dedicated/isolated.
Designed to address confidentiality of data when single disks are removed for repair, and when the entire Storage Facility Image is discontinued or re-purposed READ IBM Encrypted Storage Overview and Customer Requirements
http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/WP101479
2011 IBM Corporation
Contact Us
stgls@us.ibm.com or visit ibm.com/systems/services/labservices
Go to:
http://ibmtechu.com
and complete the form
sSE04