ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Solved supporting an office of computers with full drive encryption

    IT Discussion
    17
    166
    17.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @stacksofplates
      last edited by

      @stacksofplates said in supporting an office of computers with full drive encryption:

      @scottalanmiller said in supporting an office of computers with full drive encryption:

      In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

      In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

      That was kind of my point. If the whole drive is encrypted there isn't anything they can do on the disk itself. If the OS isn't encrypted you can essentially do anything.

      We have labels that cover the side panels that you can't pull off and reattach. So they can't put anything in the machine without it being obvious. But if the OS isn't encrypted, they could boot to a recovery and chroot into the OS and install whatever they want (assuming BIOS allows media booting, etc).

      With the full disk encryption, they can't do anything without the key.

      But that was my point. If your OS was secured, you'd not be able to boot to any recovery. The only way it would be to break into the physical box and both are compromised at that point. It's not OS encryption that protects you in that case.

      stacksofplatesS 1 Reply Last reply Reply Quote 0
      • stacksofplatesS
        stacksofplates @scottalanmiller
        last edited by

        @scottalanmiller said in supporting an office of computers with full drive encryption:

        @stacksofplates said in supporting an office of computers with full drive encryption:

        @scottalanmiller said in supporting an office of computers with full drive encryption:

        In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

        In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

        That was kind of my point. If the whole drive is encrypted there isn't anything they can do on the disk itself. If the OS isn't encrypted you can essentially do anything.

        We have labels that cover the side panels that you can't pull off and reattach. So they can't put anything in the machine without it being obvious. But if the OS isn't encrypted, they could boot to a recovery and chroot into the OS and install whatever they want (assuming BIOS allows media booting, etc).

        With the full disk encryption, they can't do anything without the key.

        But that was my point. If your OS was secured, you'd not be able to boot to any recovery. The only way it would be to break into the physical box and both are compromised at that point. It's not OS encryption that protects you in that case.

        There isn't anything that protects against this other than BIOS, which isn't OS security.

        For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

        scottalanmillerS 1 Reply Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller @stacksofplates
          last edited by

          @stacksofplates said in supporting an office of computers with full drive encryption:

          There isn't anything that protects against this other than BIOS, which isn't OS security.

          For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

          If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

          stacksofplatesS 1 Reply Last reply Reply Quote 0
          • stacksofplatesS
            stacksofplates @scottalanmiller
            last edited by stacksofplates

            @scottalanmiller said in supporting an office of computers with full drive encryption:

            @stacksofplates said in supporting an office of computers with full drive encryption:

            There isn't anything that protects against this other than BIOS, which isn't OS security.

            For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

            If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

            It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

            I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @stacksofplates
              last edited by

              @stacksofplates said in supporting an office of computers with full drive encryption:

              @scottalanmiller said in supporting an office of computers with full drive encryption:

              @stacksofplates said in supporting an office of computers with full drive encryption:

              There isn't anything that protects against this other than BIOS, which isn't OS security.

              For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

              If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

              It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

              I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

              Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

              stacksofplatesS 2 Replies Last reply Reply Quote 1
              • stacksofplatesS
                stacksofplates @scottalanmiller
                last edited by stacksofplates

                @scottalanmiller said in supporting an office of computers with full drive encryption:

                @stacksofplates said in supporting an office of computers with full drive encryption:

                @scottalanmiller said in supporting an office of computers with full drive encryption:

                @stacksofplates said in supporting an office of computers with full drive encryption:

                There isn't anything that protects against this other than BIOS, which isn't OS security.

                For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                Ya, I don't believe how many people I've seen use super long passwords and not password protect the boot loader. All I need is "rd.break" and I'm in.

                I guess it also helps mitigate mistakes by admins. If you don't have fully automated builds like happens a lot in smaller environments, there are a lot of variables that can make a difference.

                scottalanmillerS 1 Reply Last reply Reply Quote 1
                • stacksofplatesS
                  stacksofplates @scottalanmiller
                  last edited by stacksofplates

                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                  @stacksofplates said in supporting an office of computers with full drive encryption:

                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                  @stacksofplates said in supporting an office of computers with full drive encryption:

                  There isn't anything that protects against this other than BIOS, which isn't OS security.

                  For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                  If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                  It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                  I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                  Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                  Which is again why Open Source is important. Things like system restore having this data would be understood.

                  Maybe it already is and I just don't know. Not a Windows admin.

                  scottalanmillerS 1 Reply Last reply Reply Quote 1
                  • scottalanmillerS
                    scottalanmiller @stacksofplates
                    last edited by

                    @stacksofplates said in supporting an office of computers with full drive encryption:

                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                    @stacksofplates said in supporting an office of computers with full drive encryption:

                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                    @stacksofplates said in supporting an office of computers with full drive encryption:

                    There isn't anything that protects against this other than BIOS, which isn't OS security.

                    For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                    If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                    It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                    I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                    Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                    Ya, I don't believe how many people I've seen use super long passwords and not password protect the boot loader. All I need is "rd.break" and I'm in.

                    I guess it also helps mitigate mistakes by admins. If you don't have fully automated builds like happens a lot in smaller environments, there are a lot of variables that can make a difference.

                    It's kind of a toss up in that case, the fear is that the machine will go without being patched and then be vulnerable and get compromised that way.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @stacksofplates
                      last edited by

                      @stacksofplates said in supporting an office of computers with full drive encryption:

                      @scottalanmiller said in supporting an office of computers with full drive encryption:

                      @stacksofplates said in supporting an office of computers with full drive encryption:

                      @scottalanmiller said in supporting an office of computers with full drive encryption:

                      @stacksofplates said in supporting an office of computers with full drive encryption:

                      There isn't anything that protects against this other than BIOS, which isn't OS security.

                      For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                      If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                      It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                      I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                      Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                      Which is again why Open Source is important. Things like system restore having this data would be understood.

                      Maybe it already is and I just don't know. Not a Windows admin.

                      Yup, sounds like they are just using the wrong tool(s) for the job at hand.

                      1 Reply Last reply Reply Quote 0
                      • Mike DavisM
                        Mike Davis @wrx7m
                        last edited by

                        @wrx7m said in supporting an office of computers with full drive encryption:

                        I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                        I was wondering how much time it would add to my job if I took on a client that was using full disk encryption. After a few posts it was clear that it would be additional overhead.

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @Mike Davis
                          last edited by

                          @Mike-Davis said in supporting an office of computers with full drive encryption:

                          @wrx7m said in supporting an office of computers with full drive encryption:

                          I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                          I was wondering how much time it would add to my job if I took on a client that was using full disk encryption. After a few posts it was clear that it would be additional overhead.

                          Yeah, definitely some for sure.

                          JaredBuschJ 1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @scottalanmiller
                            last edited by

                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                            @Mike-Davis said in supporting an office of computers with full drive encryption:

                            @wrx7m said in supporting an office of computers with full drive encryption:

                            I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                            I was wondering how much time it would add to my job if I took on a client that was using full disk encryption. After a few posts it was clear that it would be additional overhead.

                            Yeah, definitely some for sure.

                            But potentially tiny amounts if you tell them that they must be present for any reboots you need to make.

                            scottalanmillerS 1 Reply Last reply Reply Quote 2
                            • scottalanmillerS
                              scottalanmiller @JaredBusch
                              last edited by

                              @JaredBusch said in supporting an office of computers with full drive encryption:

                              @scottalanmiller said in supporting an office of computers with full drive encryption:

                              @Mike-Davis said in supporting an office of computers with full drive encryption:

                              @wrx7m said in supporting an office of computers with full drive encryption:

                              I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                              I was wondering how much time it would add to my job if I took on a client that was using full disk encryption. After a few posts it was clear that it would be additional overhead.

                              Yeah, definitely some for sure.

                              But potentially tiny amounts if you tell them that they must be present for any reboots you need to make.

                              Possibly. They might be okay with that.

                              1 Reply Last reply Reply Quote 0
                              • 1
                              • 2
                              • 5
                              • 6
                              • 7
                              • 8
                              • 9
                              • 9 / 9
                              • First post
                                Last post