ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Hard disk encryption without OS access?

    Scheduled Pinned Locked Moved IT Discussion
    57 Posts 6 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @Obsolesce
      last edited by

      @Obsolesce said in Hard disk encryption without OS access?:

      @Dashrender said in Hard disk encryption without OS access?:

      @Obsolesce said in Hard disk encryption without OS access?:

      My main point and concern was in regard to end-user devices where the most relevant cases are lost or stolen devices (laptops/phones/etc.).

      Sure, but that was really the point of the OP

      @JasGot

      @JasGot said in Hard disk encryption without OS access?:

      The software product they use for running their business is the only app on the server and the software vendor will not allow access to the server OS.

      This is primarily a server encryption discussion.

      Yes I get that. But I was really just responding in regard to the "just stealing your computer" bit. That moreso implies personal computer, at least to me. Maybe he meant breaking into a datacenter and just stealing a server, but that didn't seem like that's what he meant. 🤷

      No, we were specially talking about people having to just steal a server instead of taking the time to remove all of the hard drives and reassmble them with the same RAID without taking the chassis or RAID device with them. It's generally less effort to steal the server than to remove all of the drives.

      1 Reply Last reply Reply Quote 0
      • JaredBuschJ
        JaredBusch @Obsolesce
        last edited by

        @Obsolesce said in Hard disk encryption without OS access?:

        Yes, in the server space I'm with you 100%.

        Which is the point of this thread.

        1 Reply Last reply Reply Quote 0
        • J
          JasGot @scottalanmiller
          last edited by

          @scottalanmiller said in Hard disk encryption without OS access?:

          We use ProxMox. KVM is definitely the leader on the hypervisor side. Which package you use for it is up to you. We've had great luck with ProxMox now, though. We are running a LOT of them

          I have been reading about ProxMox, specifically the backup system. It looks like I need to install a client, but I can't install anything on the server managed by others. What other options do I have? Just shut down the VM and make a backup of the Virtual Disk holding the VM?

          DashrenderD scottalanmillerS 3 Replies Last reply Reply Quote 0
          • ObsolesceO
            Obsolesce
            last edited by Obsolesce

            @scottalanmiller on the other hand, it's a hell of a lot harder and questionable walking out the door with a full server than it is with a / some hard drives. Same with virtual disks, can't copy them to another system and extract data if they are encrypted. I'd still err towards encrypting data at rest (full disk encryption). Also, why aren't servers physically secured?

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @JasGot
              last edited by

              @JasGot said in Hard disk encryption without OS access?:

              @scottalanmiller said in Hard disk encryption without OS access?:

              We use ProxMox. KVM is definitely the leader on the hypervisor side. Which package you use for it is up to you. We've had great luck with ProxMox now, though. We are running a LOT of them

              I have been reading about ProxMox, specifically the backup system. It looks like I need to install a client, but I can't install anything on the server managed by others. What other options do I have? Just shut down the VM and make a backup of the Virtual Disk holding the VM?

              So you have access to the hypervisor allowing you to turn off the VM, but you can't replace the hypervisor yourself?

              J 2 Replies Last reply Reply Quote 0
              • J
                JasGot @Dashrender
                last edited by JasGot

                @Dashrender said in Hard disk encryption without OS access?:

                So you have access to the hypervisor allowing you to turn off the VM, but you can't replace the hypervisor yourself?

                I'm not sure what you are asking..... I have no access inside what will be the running VM. I may be able to mount the offline VM and inject software or new users, but that may upset the 3rd party vendor.

                1 Reply Last reply Reply Quote 1
                • J
                  JasGot @Dashrender
                  last edited by

                  @Dashrender said in Hard disk encryption without OS access?:

                  So you have access to the hypervisor allowing you to turn off the VM, but you can't replace the hypervisor yourself?

                  Oh. I see what you are asking. It is a physical machine right now. It is not a hypervisor. What we are talking about is making it a VM under our hypervisor to give us a Full Disk Encryption and the ability to maintain our own backup.

                  1 Reply Last reply Reply Quote 1
                  • scottalanmillerS
                    scottalanmiller @Obsolesce
                    last edited by

                    @Obsolesce said in Hard disk encryption without OS access?:

                    Also, why aren't servers physically secured?

                    They normally are, significantly, as are drives, so that makes the risk of either super low and is a key reason why encryption rarely provides protection as the risk it protects against often effectively doesn't exist.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @JasGot
                      last edited by

                      @JasGot said in Hard disk encryption without OS access?:

                      @scottalanmiller said in Hard disk encryption without OS access?:

                      We use ProxMox. KVM is definitely the leader on the hypervisor side. Which package you use for it is up to you. We've had great luck with ProxMox now, though. We are running a LOT of them

                      I have been reading about ProxMox, specifically the backup system. It looks like I need to install a client, but I can't install anything on the server managed by others. What other options do I have? Just shut down the VM and make a backup of the Virtual Disk holding the VM?

                      1. All backups of live systems require clients. All, no expections (see my book, it covers this.) ProxMox uses similar agents to VMware and Windows itself - system tools, but has to interface with the hypervisor.
                      2. You can't do live backups, given your limitations that's off the table regardless of platform. For true backups, you have to power down. That's a given with the chosen software solution. At least with ProxMox you have a mechanism to do that. How do you even attempt an offline backup with a physical server (you can but damn is it a pain.)
                      1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @JasGot
                        last edited by

                        @JasGot said in Hard disk encryption without OS access?:

                        Just shut down the VM and make a backup of the Virtual Disk holding the VM?

                        Exactly, no matter what here, until you can get access not ONLY to the OS but also to the application, that's your only option.

                        1 Reply Last reply Reply Quote 0
                        • 1
                        • 2
                        • 3
                        • 1 / 3
                        • First post
                          Last post