ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Solved supporting an office of computers with full drive encryption

    IT Discussion
    17
    166
    17.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender @scottalanmiller
      last edited by

      @scottalanmiller said in supporting an office of computers with full drive encryption:

      @Dashrender said in supporting an office of computers with full drive encryption:

      @stacksofplates said in supporting an office of computers with full drive encryption:

      One thing to consider is not doing full disk means that someone can possibly modify or install a modified version of a piece of software or install a key logger on the OS disk. Then the password doesn't matter.

      which of course defeats the whole secure thing in the first place.

      How would someone by expected to install that? 99% of possible installs like that will affect an encrypted drive as much as a non-encrypted one. This is one of those "we mentioned a risk" that isn't a viable real world risk and it sounds reasonable until we apply real world risk to it.

      It's not nearly as significant as, say, missing a day of patching.

      You don't think so? Let's assume the boot partition is non encrypted, and Secure Boot is disabled. A janitor could crack it open and install a keylogger.

      is that more or less likely than being hacked because you didn't patch? OK probably a lot less likely.

      scottalanmillerS 1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @Dashrender
        last edited by

        @Dashrender said in supporting an office of computers with full drive encryption:

        It's not nearly as significant as, say, missing a day of patching.

        You don't think so? Let's assume the boot partition is non encrypted, and Secure Boot is disabled. A janitor could crack it open and install a keylogger.

        I'm not saying that he can't, but if your own staff is your concern, encryption is really not going to do anything. He's got a hundred other ways to do more damage. For example, he's install a physical keylogger that bypasses your full disk encryption because that's even easier than that. He's not bother with this method, because it's not the path of least resistance to this end game.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller
          last edited by

          In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

          In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

          stacksofplatesS 1 Reply Last reply Reply Quote 0
          • wrx7mW
            wrx7m
            last edited by

            I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

            scottalanmillerS Mike DavisM 2 Replies Last reply Reply Quote 1
            • scottalanmillerS
              scottalanmiller @wrx7m
              last edited by

              @wrx7m said in supporting an office of computers with full drive encryption:

              I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

              He was only fact finding. It's not his customer. he was trying to determine the cost to support the customer.

              1 Reply Last reply Reply Quote 1
              • stacksofplatesS
                stacksofplates @scottalanmiller
                last edited by

                @scottalanmiller said in supporting an office of computers with full drive encryption:

                In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

                In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

                That was kind of my point. If the whole drive is encrypted there isn't anything they can do on the disk itself. If the OS isn't encrypted you can essentially do anything.

                We have labels that cover the side panels that you can't pull off and reattach. So they can't put anything in the machine without it being obvious. But if the OS isn't encrypted, they could boot to a recovery and chroot into the OS and install whatever they want (assuming BIOS allows media booting, etc).

                With the full disk encryption, they can't do anything without the key.

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @stacksofplates
                  last edited by

                  @stacksofplates said in supporting an office of computers with full drive encryption:

                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                  In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

                  In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

                  That was kind of my point. If the whole drive is encrypted there isn't anything they can do on the disk itself. If the OS isn't encrypted you can essentially do anything.

                  We have labels that cover the side panels that you can't pull off and reattach. So they can't put anything in the machine without it being obvious. But if the OS isn't encrypted, they could boot to a recovery and chroot into the OS and install whatever they want (assuming BIOS allows media booting, etc).

                  With the full disk encryption, they can't do anything without the key.

                  But that was my point. If your OS was secured, you'd not be able to boot to any recovery. The only way it would be to break into the physical box and both are compromised at that point. It's not OS encryption that protects you in that case.

                  stacksofplatesS 1 Reply Last reply Reply Quote 0
                  • stacksofplatesS
                    stacksofplates @scottalanmiller
                    last edited by

                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                    @stacksofplates said in supporting an office of computers with full drive encryption:

                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                    In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

                    In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

                    That was kind of my point. If the whole drive is encrypted there isn't anything they can do on the disk itself. If the OS isn't encrypted you can essentially do anything.

                    We have labels that cover the side panels that you can't pull off and reattach. So they can't put anything in the machine without it being obvious. But if the OS isn't encrypted, they could boot to a recovery and chroot into the OS and install whatever they want (assuming BIOS allows media booting, etc).

                    With the full disk encryption, they can't do anything without the key.

                    But that was my point. If your OS was secured, you'd not be able to boot to any recovery. The only way it would be to break into the physical box and both are compromised at that point. It's not OS encryption that protects you in that case.

                    There isn't anything that protects against this other than BIOS, which isn't OS security.

                    For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                    scottalanmillerS 1 Reply Last reply Reply Quote 1
                    • scottalanmillerS
                      scottalanmiller @stacksofplates
                      last edited by

                      @stacksofplates said in supporting an office of computers with full drive encryption:

                      There isn't anything that protects against this other than BIOS, which isn't OS security.

                      For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                      If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                      stacksofplatesS 1 Reply Last reply Reply Quote 0
                      • stacksofplatesS
                        stacksofplates @scottalanmiller
                        last edited by stacksofplates

                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                        @stacksofplates said in supporting an office of computers with full drive encryption:

                        There isn't anything that protects against this other than BIOS, which isn't OS security.

                        For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                        If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                        It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                        I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @stacksofplates
                          last edited by

                          @stacksofplates said in supporting an office of computers with full drive encryption:

                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                          @stacksofplates said in supporting an office of computers with full drive encryption:

                          There isn't anything that protects against this other than BIOS, which isn't OS security.

                          For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                          If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                          It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                          I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                          Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                          stacksofplatesS 2 Replies Last reply Reply Quote 1
                          • stacksofplatesS
                            stacksofplates @scottalanmiller
                            last edited by stacksofplates

                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                            @stacksofplates said in supporting an office of computers with full drive encryption:

                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                            @stacksofplates said in supporting an office of computers with full drive encryption:

                            There isn't anything that protects against this other than BIOS, which isn't OS security.

                            For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                            If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                            It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                            I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                            Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                            Ya, I don't believe how many people I've seen use super long passwords and not password protect the boot loader. All I need is "rd.break" and I'm in.

                            I guess it also helps mitigate mistakes by admins. If you don't have fully automated builds like happens a lot in smaller environments, there are a lot of variables that can make a difference.

                            scottalanmillerS 1 Reply Last reply Reply Quote 1
                            • stacksofplatesS
                              stacksofplates @scottalanmiller
                              last edited by stacksofplates

                              @scottalanmiller said in supporting an office of computers with full drive encryption:

                              @stacksofplates said in supporting an office of computers with full drive encryption:

                              @scottalanmiller said in supporting an office of computers with full drive encryption:

                              @stacksofplates said in supporting an office of computers with full drive encryption:

                              There isn't anything that protects against this other than BIOS, which isn't OS security.

                              For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                              If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                              It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                              I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                              Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                              Which is again why Open Source is important. Things like system restore having this data would be understood.

                              Maybe it already is and I just don't know. Not a Windows admin.

                              scottalanmillerS 1 Reply Last reply Reply Quote 1
                              • scottalanmillerS
                                scottalanmiller @stacksofplates
                                last edited by

                                @stacksofplates said in supporting an office of computers with full drive encryption:

                                @scottalanmiller said in supporting an office of computers with full drive encryption:

                                @stacksofplates said in supporting an office of computers with full drive encryption:

                                @scottalanmiller said in supporting an office of computers with full drive encryption:

                                @stacksofplates said in supporting an office of computers with full drive encryption:

                                There isn't anything that protects against this other than BIOS, which isn't OS security.

                                For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                                If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                                It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                                I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                                Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                                Ya, I don't believe how many people I've seen use super long passwords and not password protect the boot loader. All I need is "rd.break" and I'm in.

                                I guess it also helps mitigate mistakes by admins. If you don't have fully automated builds like happens a lot in smaller environments, there are a lot of variables that can make a difference.

                                It's kind of a toss up in that case, the fear is that the machine will go without being patched and then be vulnerable and get compromised that way.

                                1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @stacksofplates
                                  last edited by

                                  @stacksofplates said in supporting an office of computers with full drive encryption:

                                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                                  @stacksofplates said in supporting an office of computers with full drive encryption:

                                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                                  @stacksofplates said in supporting an office of computers with full drive encryption:

                                  There isn't anything that protects against this other than BIOS, which isn't OS security.

                                  For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                                  If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                                  It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                                  I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                                  Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                                  Which is again why Open Source is important. Things like system restore having this data would be understood.

                                  Maybe it already is and I just don't know. Not a Windows admin.

                                  Yup, sounds like they are just using the wrong tool(s) for the job at hand.

                                  1 Reply Last reply Reply Quote 0
                                  • Mike DavisM
                                    Mike Davis @wrx7m
                                    last edited by

                                    @wrx7m said in supporting an office of computers with full drive encryption:

                                    I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                                    I was wondering how much time it would add to my job if I took on a client that was using full disk encryption. After a few posts it was clear that it would be additional overhead.

                                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @Mike Davis
                                      last edited by

                                      @Mike-Davis said in supporting an office of computers with full drive encryption:

                                      @wrx7m said in supporting an office of computers with full drive encryption:

                                      I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                                      I was wondering how much time it would add to my job if I took on a client that was using full disk encryption. After a few posts it was clear that it would be additional overhead.

                                      Yeah, definitely some for sure.

                                      JaredBuschJ 1 Reply Last reply Reply Quote 0
                                      • JaredBuschJ
                                        JaredBusch @scottalanmiller
                                        last edited by

                                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                                        @Mike-Davis said in supporting an office of computers with full drive encryption:

                                        @wrx7m said in supporting an office of computers with full drive encryption:

                                        I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                                        I was wondering how much time it would add to my job if I took on a client that was using full disk encryption. After a few posts it was clear that it would be additional overhead.

                                        Yeah, definitely some for sure.

                                        But potentially tiny amounts if you tell them that they must be present for any reboots you need to make.

                                        scottalanmillerS 1 Reply Last reply Reply Quote 2
                                        • scottalanmillerS
                                          scottalanmiller @JaredBusch
                                          last edited by

                                          @JaredBusch said in supporting an office of computers with full drive encryption:

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          @Mike-Davis said in supporting an office of computers with full drive encryption:

                                          @wrx7m said in supporting an office of computers with full drive encryption:

                                          I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                                          I was wondering how much time it would add to my job if I took on a client that was using full disk encryption. After a few posts it was clear that it would be additional overhead.

                                          Yeah, definitely some for sure.

                                          But potentially tiny amounts if you tell them that they must be present for any reboots you need to make.

                                          Possibly. They might be okay with that.

                                          1 Reply Last reply Reply Quote 0
                                          • 1
                                          • 2
                                          • 5
                                          • 6
                                          • 7
                                          • 8
                                          • 9
                                          • 8 / 9
                                          • First post
                                            Last post