Full-Disk Encryption (FDE)
Secure sensitive information through full-disk encryption
- Private/sensitive data stored in a device need to be protected from access by unauthorized persons.
Before proceeding with full-disk encryption, the client should have the root credentials to the device, and make a backup of all data.
Make the client aware of the risks. Note the following concerns:
The client should keep in mind that malware could defeat the encryption by waiting to copy files off of their computer until after booting, when they enter the decryption password.
The encrypted data is only protected when the computer is off. If an adversary gets access to the computer while it is on, in sleep mode, or hibernated, there are several techniques that can be used to extract data.
Encryption is only as good as the encryption password. If the attacker has the user’s device, they have all the time in the world to try out new passwords.
While encryption can prevent casual access, the client should preserve truly confidential data by keeping it hidden to prevent any physical access, or cordoned away on a much more secure machine. The client should not trust their encrypted machine implicitly.
What follows is a list of full-disk encryption tools, listed by device type and operating system:
An included option for Windows Ultimate and Enterprise editions of Windows Vista and Windows 7, the Pro and Enterprise editions of Windows 8 and Windows 8.1, and Windows Server 2008, Windows 10,and later.
An included option for Windows Home edition of Windows 8.1 and Windows 10 on devices with TPM 2.0 and Modern Standby (also known as Connected Standby and InstantGo) hardware support. Device Encryption is the same as Bitlocker, with the limitation that users have no option to configure it and there is no preboot-authentication.
BitLocker Device Encryption is enabled automatically so that the device is always protected. This page outlines how this happens.
BitLocker and Device Encryption are not available in all Windows versions. If the version running on the client’s operating system does not include Bitlocker or Device Encryption, we can suggest them to create an encrypted folder for sensitive files with VeraCrypt, or to use Diskcryptor following the instructions in Article #78: FDE with DiskCryptor on Windows.
An included option with Mac OS X Lion and later. Please review Article #104: Full-Disk Encryption on Mac with FileVault 2 for more details and links to end-user guides.
For older versions - Mac OS X Leopard and Mac OS X Snow Leopard - clients can use FileVault.
Full-disk encryption is usually an option that can be enabled during the installation of the system.
If the client is using Ubuntu (or another Debian-based distribution), and full-disk encryption hasn’t been enabled during the installation, please review Article #77: Ubuntu - Linux - FDE after OS installation for recommendations on disk encryption after installation.
In Android 6.0 Marshmallow and later versions, full-disk encryption is enabled by default. To double-check that it is enabled, follow the steps listed below for older Android versions.
In Android 4.0 Ice Cream to Android 5.0 Lollipop device encryption is an option. To enable it, go to: Settings -> Personal -> Security -> Encryption. Before enabling device encryption, however, a screen lock password needs to be set up.
Note: Before starting the encryption process, ensure the phone is fully charged and plugged into a power source.
iPhones with iOS 8 and higher are encrypted by default, but if the client is concerned, we can double-check that it is enabled.
Encryption is an option available on devices running iOS 4 to iOS 7, but it is not enabled by default. To enable it, follow these steps:
- Tap Settings > Passcode (or Touch ID and Passcode) > Turn Passcode On.
- Follow the prompts to create a passcode.
- After the passcode is set, scroll down to the bottom of the screen and look for the phrase “Data protection is enabled”.
- From the same window you should set the “Require passcode” option to “Immediately”, so that your device isn’t unlocked when you are not using it.
If the client is using the iTunes option to back up the device on their computer, it will be necessary to choose the “Encrypt backup” option on the Summary tab of the device in iTunes. All data will be encrypted by iTunes before it’s saved on the computer.
If the client backs up to iCloud, according to Apple, the data is encrypted. Apple holds the encryption keys. Use a long passphrase to protect the data, and keep that passphrase safe.
Finally, if the client has critical data on the device and is concerned about loss or theft, setting the device to wipe all data after 10 failed passphrase attempts is an option, as is remote erasure of the data. The client will need to activate the auto backup option first.
In this post, Bruce Schneier explains why using Bitlocker is a reasonable solution on Windows.