Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This content has moved.

Please see: https://security.utexas.edu/iso-policies/approved-encryption-methods

The Information Secure Office (ISO) has approved several methods of complying with policy for encrypting sensitive data on laptops.  The preferred method of accomplishing this is using WinMagic SecureDoc, the enterprise whole disk encryption product available through ITS.

The ISO strongly believes that the following features are important in an encryption product:

  1. Industry-standard, well-tested encryption algorithms.
  2. Encryption key escrow/recovery in case the keys are lost, forgotten, or otherwise unavailable to a department.
  3. Support for multiple platforms, especially Windows and Mac (both of which currently make up the majority of portable devices on campus).
  4. The ability to demonstrate the device was encrypted in the event it is lost or stolen, in order to better comply with the Texas Identity Theft Protection and Enforcement Act and other related laws.

SecureDoc best satisfies all of these requirements.  There may, however, be cases where it is not possible to use SecureDoc.  In such instances, end-users, in consultation with their local IT support staff, can choose from another approved product in Table 1.  For products that do not support their own method of escrow/recovery, the ISO recommends the use of Stache.

If you have questions about these products, or satisfying policy, please do not hesitate to contact the ISO at security@utexas.edu.

Table 1: Approved Encryption Methods

...

Encryption Technology

...

Escrow Method

...

Operating System(s) Supported

...

Whole-Disk Encryption?

...

Cost

...

More Information

...

WinMagic SecureDoc

...

SecureDoc Enterprise Server

...

Windows, Mac OS X, Linux

...

Yes

...

None

...

http://www.utexas.edu/its/encrypt/

...

Microsoft Bitlocker

...

Active Directory (in some cases), Stache

...

Windows Vista / Windows 7

...

Yes

...

None

...

http://technet.microsoft.com/en-us/library/dd548341%28WS.10%29.aspx

...

Stache

...

Mac OS X 10.7+

...

Partition

...

None

...

http://support.apple.com/kb/HT4790

...

Apple FileVault (2)

...

Stache

...

Mac OS X 10.3-10.6

...

No

...

None

...

Linux Unified Key Setup (LUKS) Encryption

...

Stache

...

Redhat Enterprise 6

...

Yes

...

None

...

http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption.html

...

TrueCrypt with pre-boot authentication (3)

...

Stache

...

Windows 7/Vista/XP

...

Windows only

...

Open-Source

...

http://www.truecrypt.org/

...

Self-Encrypting Drive (SED) (4)

...

SecureDoc Enterprise Server, Stache

...

Windows, Mac OS X, Linux

...

Yes

...

Depends on size, storage technology, and vendor.

...

The SED chosen must be compliant with the OPAL specification.  Check with the vendor to ensure compliance.

(1) FileVault 2 encrypts partitions, not entire drives. It is strongly recommended that that you do not escrow recovery keys with Apple and instead utilize Stache for this purpose.

(2) FileVault for OS X 10.3 to 10.6 can only encrypt a user's home directory or selected disk images; it does not encrypt the operating system partition and is therefore not considered whole disk encryption.  Secure virtual memory must also be enabled for FileVault to be considered an acceptable encryption method.  SecureDoc is recommended over FileVault for Macs that are not running 10.7 or higher.

(3) TrueCrypt can only perform whole disk encryption (i.e. pre-boot authentication) on Windows systems; the Mac and Linux versions of TrueCrypt do not currently support this feature.

(4) Self-Encrypting Drives provide low-latency, hardware-level encryption and are available from a number of manufacturers.  In order to ensure minimum standards are met, only SEDs that meet the OPAL specification are approved.  Seagate, Hitachi, and Toshiba are a few examples of manufacturers that make OPAL compliant SEDs.  Check with your vendor to ensure compliance.
Copyright © 2001-2011 Information Technology Services. All rights reserved.