30.06.2014 Views

Momentus 5400 FDE.2 Hard Drive and DriveTrust: Best-in ... - Seagate

Momentus 5400 FDE.2 Hard Drive and DriveTrust: Best-in ... - Seagate

Momentus 5400 FDE.2 Hard Drive and DriveTrust: Best-in ... - Seagate

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Technology Paper<br />

<strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> <strong>Hard</strong> <strong>Drive</strong><br />

<strong>and</strong> <strong>Drive</strong>Trust: <strong>Best</strong>-<strong>in</strong>-Class Data<br />

Protection for Laptops<br />

Abstract<br />

This white paper describes how <strong>Seagate</strong> ® <strong>Momentus</strong> ® <strong>5400</strong> <strong>FDE.2</strong><br />

hard drives provide best-<strong>in</strong>-class data protection for lost or stolen<br />

laptops. The paper also <strong>in</strong>troduces <strong>Drive</strong>Trust technology—the<br />

foundation for <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drives with full-disk<br />

encryption—<strong>and</strong> presents a bus<strong>in</strong>ess case for hardware-based<br />

security throughout the enterprise.<br />

Mobile Comput<strong>in</strong>g Increases Data Security Risks<br />

A laptop computer is st<strong>and</strong>ard issue for today’s <strong>in</strong>formation<br />

worker. But while mobile comput<strong>in</strong>g is a boon for productivity,<br />

the number of large data security breaches has dramatically<br />

<strong>in</strong>creased as a result. The reason is simple: laptops are more easily<br />

lost or stolen than desktop systems. And as laptop disk drives grow<br />

<strong>in</strong> capacity, these systems can carry vast amounts of potentially<br />

sensitive <strong>in</strong>formation.<br />

In response to these trends, federal <strong>and</strong> state governments<br />

<strong>in</strong> the United States have implemented legislation with costly<br />

penalties for companies that lose unencrypted personal data.<br />

As of January 2007, thirty-four U.S. states require companies<br />

to publicly disclose data security breaches or notify affected<br />

customers. The U.S. government enforces the Sarbanes-Oxley Act<br />

<strong>and</strong> the Health Insurance Portability <strong>and</strong> Accountability Act (HIPAA),<br />

putt<strong>in</strong>g pressure on publicly traded companies, <strong>and</strong> firms that do<br />

bus<strong>in</strong>ess with them, to shore up data management. Governments<br />

outside the United States have implemented similar measures.<br />

These government regulations, together with grow<strong>in</strong>g public<br />

awareness about data security <strong>and</strong> privacy, mean that a lost<br />

or stolen laptop could cost a company millions of dollars <strong>and</strong><br />

significantly harm its br<strong>and</strong> image. Industry experts estimate


<strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> <strong>Hard</strong> <strong>Drive</strong><br />

<strong>and</strong> <strong>Drive</strong>Trust: <strong>Best</strong>-<strong>in</strong>-Class Data<br />

Protection for Laptops<br />

a s<strong>in</strong>gle data security breach costs an average<br />

of US$14 million <strong>in</strong> direct expenses (such as<br />

legal fees <strong>and</strong> customer notification), <strong>in</strong>direct<br />

costs (such as lost productivity) <strong>and</strong> opportunity<br />

costs (such as customer loss <strong>and</strong> customer<br />

recruitment).<br />

Benefits of <strong>Hard</strong>ware-Based Full-Disk<br />

Encryption<br />

<strong>Seagate</strong> addresses the issue of laptop data<br />

security with the <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard<br />

drive, which comb<strong>in</strong>es a Serial ATA <strong>in</strong>terface <strong>and</strong><br />

capacities up to 160 GB with full-disk encryption.<br />

Because encryption is recognized as a best<br />

practice for protect<strong>in</strong>g private data, many states<br />

offer a “safe harbor” to companies that can<br />

prove the data on lost or stolen hard drives was<br />

encrypted. <strong>Seagate</strong> <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard<br />

drives help companies comply with privacy laws<br />

because encryption is always on <strong>and</strong> cannot be<br />

circumvented by users, as <strong>in</strong> many softwarebased<br />

products.<br />

From a technical st<strong>and</strong>po<strong>in</strong>t, the <strong>Momentus</strong> <strong>5400</strong><br />

<strong>FDE.2</strong> hard drive’s encryption solution is more<br />

secure than software-based encryption solutions<br />

because it is sealed off from other elements of<br />

the comput<strong>in</strong>g system. Where software-based<br />

products rely on the computer operat<strong>in</strong>g system,<br />

full-disk encryption uses specialized hardware<br />

circuitry with<strong>in</strong> the drive. This isolation makes<br />

it nearly impossible for data thieves to exploit<br />

operat<strong>in</strong>g system vulnerabilities to compromise<br />

the encryption. And even if data thieves have<br />

physical access to the disk, they cannot locate<br />

the key, because it is never stored <strong>in</strong> the clear.<br />

Rather, the key is mixed with user credentials <strong>and</strong><br />

stored <strong>in</strong> that form <strong>in</strong> hidden memory on the drive.<br />

The <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive offers<br />

a compell<strong>in</strong>g laptop data security solution from<br />

both a technical <strong>and</strong> bus<strong>in</strong>ess st<strong>and</strong>po<strong>in</strong>t. The<br />

ma<strong>in</strong> benefits <strong>in</strong>clude:<br />

• Transparent encryption—<strong>Momentus</strong> <strong>5400</strong><br />

<strong>FDE.2</strong> hard drive encryption is easy to use <strong>and</strong><br />

requires m<strong>in</strong>imal setup. When turn<strong>in</strong>g on their<br />

computer—before the operat<strong>in</strong>g system boots<br />

up—users simply submit their credentials <strong>and</strong><br />

the drive automatically encrypts all data<br />

written to it. (Credentials can <strong>in</strong>clude<br />

passwords, USB tokens or biometrics.) Users<br />

never need to th<strong>in</strong>k about us<strong>in</strong>g the encryption<br />

solution because it runs cont<strong>in</strong>uously <strong>and</strong><br />

encrypts all hard-drive data, not just particular<br />

files or folders. And unlike software-based<br />

products, <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive<br />

encryption does not require labor-<strong>in</strong>tensive<br />

<strong>in</strong>stallation, <strong>in</strong>itial encryption processes or<br />

configuration.<br />

• Strong authentication—The <strong>Momentus</strong> <strong>5400</strong><br />

<strong>FDE.2</strong> hard drive comb<strong>in</strong>es the most advanced<br />

cryptographic technologies to protect data,<br />

<strong>in</strong>clud<strong>in</strong>g st<strong>and</strong>ards published by the U.S.<br />

National Institute of St<strong>and</strong>ards <strong>and</strong> Technology.<br />

Secure Hash Algorithm-1 (SHA-1) is used<br />

for authentication <strong>and</strong> RSA for public-key<br />

encryption. To encrypt data <strong>and</strong> render it<br />

unreadable by potential thieves, the <strong>Momentus</strong><br />

<strong>5400</strong> <strong>FDE.2</strong> hard drive uses the 128-bit<br />

Advanced Encryption St<strong>and</strong>ard<br />

(AES) algorithm.<br />

• No performance penalty—Unlike softwarebased<br />

encryption products that rely on the<br />

central process<strong>in</strong>g unit to encrypt data,<br />

the <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive uses a<br />

specialized chip <strong>in</strong>side the hard drive to encrypt<br />

data at full <strong>in</strong>terface speed so there is no<br />

noticeable performance penalty.<br />

• Lowest total cost-of-ownership compared<br />

with software-based encryption—the<br />

<strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive enhances<br />

exist<strong>in</strong>g data security frameworks without<br />

add<strong>in</strong>g extensive adm<strong>in</strong>istrative burdens<br />

for corporate IT departments. Because it is<br />

seamless to <strong>in</strong>tegrate <strong>and</strong> requires m<strong>in</strong>imal<br />

configuration, the <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong><br />

hard drive helps save time <strong>and</strong> money. The<br />

drive supports cryptographic key-management<br />

<strong>and</strong> password-management tasks, <strong>and</strong><br />

also works with <strong>Seagate</strong> partner solutions<br />

for advanced enterprise-management needs.<br />

And because <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard<br />

drives offer fast cryptographic erase, they<br />

elim<strong>in</strong>ate complicated <strong>and</strong> expensive<br />

disposal processes.


<strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> <strong>Hard</strong> <strong>Drive</strong><br />

<strong>and</strong> <strong>Drive</strong>Trust: <strong>Best</strong>-<strong>in</strong>-Class Data<br />

Protection for Laptops<br />

<strong>Drive</strong>Trust Br<strong>in</strong>gs Laptop Security<br />

to a New Level<br />

The <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive takes<br />

advantage of <strong>Drive</strong>Trust technology from <strong>Seagate</strong>,<br />

which implements security on the hard drive itself<br />

to offer a best-<strong>in</strong>-class data protection solution<br />

compared to software-based products. With<br />

<strong>Drive</strong>Trust, the drive <strong>in</strong>troduces a number<br />

of unprecedented features that strengthen<br />

enterprise data security at its weakest po<strong>in</strong>ts<br />

<strong>and</strong> simplify IT adm<strong>in</strong>istration.<br />

• Cryptographic erase—Government entities<br />

<strong>and</strong> large corporations spend millions of<br />

dollars to ensure that sensitive data is not<br />

recovered from discarded or repurposed hard<br />

drives. By simply chang<strong>in</strong>g the encryption<br />

key on a <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive,<br />

IT adm<strong>in</strong>istrators <strong>in</strong>stantaneously render<br />

all stored data un<strong>in</strong>telligible. Compared to<br />

traditional overwrite <strong>and</strong> erase techniques, the<br />

drive’s cryptographic erase function is much<br />

simpler, dramatically faster, more secure, less<br />

expensive <strong>and</strong> less prone to human error.<br />

• Pre-Boot Authentication—Because it is<br />

not dependent on the computer operat<strong>in</strong>g<br />

system, the <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard<br />

drive engages its security function before the<br />

operat<strong>in</strong>g system boots up. Users have five<br />

chances to enter the correct password. (Thirdparty<br />

solutions can easily replace password<br />

authentication with smart card readers or<br />

biometrics.) Upon the fifth failure, the drive<br />

shuts down <strong>and</strong> the user must restart the<br />

computer to try aga<strong>in</strong>. Because the computer<br />

operat<strong>in</strong>g system will not boot up without<br />

authentication, potential data thieves cannot<br />

exploit software vulnerabilities to compromise<br />

security.<br />

• Emergency Password Recovery—Password<br />

management for encryption is cited by IT<br />

leaders as a major barrier to the adoption of<br />

full-disk encryption solutions. The <strong>Momentus</strong><br />

<strong>5400</strong> <strong>FDE.2</strong> hard drive offers centralized<br />

management capabilities to ease adm<strong>in</strong>istrative<br />

tasks <strong>in</strong> case of upgrades, repurpos<strong>in</strong>g or lost<br />

passwords. Besides the ability to create a<br />

master password, the drive supports escrowed<br />

passwords so that data recovery services<br />

can retrieve data from the drive. In addition,<br />

the <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive works<br />

with third-party solutions that make it easy for<br />

adm<strong>in</strong>istrators <strong>and</strong> users to create <strong>and</strong> back<br />

up passwords.<br />

• Enterprise Management Tools—<strong>Seagate</strong><br />

provides <strong>in</strong>dependent software vendors<br />

(ISVs) with a software development kit<br />

(SDK) they can use to take advantage of<br />

<strong>Drive</strong>Trust technology <strong>in</strong> their applications. For<br />

example, these applications <strong>in</strong>clude security<br />

management software solutions that simplify<br />

enterprise deployments <strong>and</strong> make it easier for<br />

IT adm<strong>in</strong>istrators to manage hard-drive usage<br />

policy <strong>and</strong> security sett<strong>in</strong>gs.<br />

• Security providers—Every hard drive reserves<br />

a portion of its disk capacity for <strong>in</strong>ternal system<br />

memory. <strong>Drive</strong>Trust uses some of this space<br />

to create security providers (secure partitions)<br />

that are both logically <strong>and</strong> physically separated<br />

from the rest of the disk drive memory, with<br />

strong conditional access controls. The<br />

<strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive uses these<br />

exclusive security providers to store sensitive<br />

data, <strong>in</strong>clud<strong>in</strong>g cryptographic keys. <strong>Drive</strong>Trustequipped<br />

disk drives can make security<br />

providers exclusively available to applications<br />

that present the proper credentials. ISVs can<br />

make use of this capability to build strong<br />

authentication functions <strong>in</strong>to their applications.<br />

Trusted Comput<strong>in</strong>g for the Enterprise<br />

<strong>Seagate</strong> believes that ground<strong>in</strong>g security<br />

functions where data lives—<strong>in</strong> the disk drive—can<br />

make enterprise data security stronger <strong>and</strong> easier<br />

to manage. Look<strong>in</strong>g beyond full disk encryption<br />

for laptops, <strong>Seagate</strong> believes <strong>Drive</strong>Trust holds<br />

the potential to improve security for networked<br />

storage, portable storage devices, desktops<br />

<strong>and</strong> other computers that utilize disk drives. In<br />

each of these scenarios, <strong>Drive</strong>Trust-equipped<br />

disk drives act as a toolbox of hardware-based<br />

security functions, or what security experts dub<br />

a “cryptographic service provider.” In short,<br />

<strong>Drive</strong>Trust takes advantage of the hard drive’s<br />

isolated operations to serve as a platform for<br />

hardware-based security.


<strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> <strong>Hard</strong> <strong>Drive</strong><br />

<strong>and</strong> <strong>Drive</strong>Trust: <strong>Best</strong>-<strong>in</strong>-Class Data<br />

Protection for Laptops<br />

<strong>Seagate</strong> is a pioneer <strong>in</strong> storage-based security,<br />

but is not alone <strong>in</strong> its efforts. <strong>Seagate</strong> is an<br />

active board member <strong>and</strong> leader <strong>in</strong> the Trusted<br />

Comput<strong>in</strong>g Group (TCG), a not-for-profit<br />

<strong>in</strong>dustry organization help<strong>in</strong>g to develop <strong>and</strong><br />

promote open, vendor-neutral trusted comput<strong>in</strong>g<br />

st<strong>and</strong>ards. <strong>Seagate</strong> developed <strong>Drive</strong>Trust<br />

technology <strong>in</strong> conjunction with the company’s<br />

work as chair of the TCG’s Storage Work Group.<br />

<strong>Drive</strong>Trust is consistent with the TCG’s Core<br />

Storage Specification, which is currently <strong>in</strong><br />

f<strong>in</strong>al draft form. This consistency helps ensure<br />

<strong>Drive</strong>Trust-enabled drives like the <strong>Momentus</strong><br />

<strong>5400</strong> <strong>FDE.2</strong> hard drive will fit <strong>in</strong>to broader, trusted<br />

comput<strong>in</strong>g efforts.<br />

In addition to its st<strong>and</strong>ards work, <strong>Seagate</strong><br />

is collaborat<strong>in</strong>g with ISVs <strong>and</strong> technology<br />

providers on applications that take advantage<br />

of <strong>Drive</strong>Trust technology. For example, <strong>Drive</strong>Trustequipped<br />

disk drives allow applications to store<br />

cryptographic keys on the disk drive, elim<strong>in</strong>at<strong>in</strong>g<br />

the need for key escrow<strong>in</strong>g <strong>and</strong> simplify<strong>in</strong>g<br />

credential management. Us<strong>in</strong>g the <strong>Seagate</strong>provided<br />

SDK mentioned earlier, enterprise IT<br />

departments <strong>and</strong> third-party software developers<br />

can <strong>in</strong>tegrate the <strong>Drive</strong>Trust platform <strong>in</strong>to<br />

their solutions. <strong>Seagate</strong> envisions <strong>Drive</strong>Trustequipped<br />

disk drives work<strong>in</strong>g with BIOS software,<br />

biometrics <strong>and</strong> companies’ exist<strong>in</strong>g <strong>in</strong>vestments<br />

<strong>in</strong> the TCG’s Trusted Platform Module. Some<br />

potential applications of <strong>Drive</strong>Trust technology<br />

<strong>in</strong> an enterprise sett<strong>in</strong>g <strong>in</strong>clude:<br />

• <strong>Hard</strong>ware-based security for biometric<br />

authentication data—Biometric authentication<br />

is cutt<strong>in</strong>g-edge technology that verifies users,<br />

but what happens if these biometric credentials<br />

are compromised? <strong>Drive</strong>Trust technology<br />

allows software applications to store biometric<br />

data <strong>in</strong> security providers on hidden portions of<br />

the hard drive for the best possible security.<br />

• Secure credentials <strong>and</strong> user data for multiuser<br />

computers—By tak<strong>in</strong>g advantage of the<br />

security providers on <strong>Drive</strong>Trust-equipped disk<br />

drives, organizations can securely manage<br />

user accounts for shared computers. For<br />

example, a f<strong>in</strong>ancial <strong>in</strong>stitution could provide<br />

an entire office access to a shared computer<br />

while stor<strong>in</strong>g each user’s account <strong>in</strong>formation<br />

separately <strong>and</strong> securely.<br />

• Centralized authentication <strong>and</strong> credential<strong>in</strong>g<br />

for <strong>Drive</strong>Trust-equipped drives <strong>in</strong> multipledrive<br />

environments—The TCG Storage Work<br />

Group is develop<strong>in</strong>g st<strong>and</strong>ards that will<br />

allow enterprises to implement policy-driven<br />

authentication across their networked or<br />

array-based storage <strong>in</strong>frastructure, backed<br />

with <strong>Drive</strong>Trust hardware-based security. This<br />

base-level protection will complement other<br />

security measures implemented higher up the<br />

storage architecture.<br />

• Enterprise management of USB-attached<br />

external hard drives through drive pair<strong>in</strong>g <strong>and</strong><br />

encryption—USB-attached external hard drives<br />

pose a serious risk to IT security because<br />

people can discretely copy <strong>and</strong> walk away<br />

with gigabytes of data <strong>in</strong> a matter of m<strong>in</strong>utes.<br />

IT departments can utilize drive-pair<strong>in</strong>g<br />

functionality, enabled through <strong>Drive</strong>Trust,<br />

so that department computers only work<br />

with authorized external hard drives.<br />

Conclusion<br />

Laptop security is the weak l<strong>in</strong>k <strong>in</strong> overall<br />

enterprise data security. Without an always-on,<br />

full-disk encryption solution to protect data on<br />

lost or stolen laptops, organizations risk los<strong>in</strong>g<br />

millions of dollars <strong>in</strong> legal fees <strong>and</strong> customer<br />

notifications, not to mention customer goodwill.<br />

The <strong>Seagate</strong> <strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> hard drive<br />

offers an easy-to-manage, cost-effective solution<br />

to the laptop security challenge.<br />

Moreover, the <strong>in</strong>novative <strong>Drive</strong>Trust security<br />

platform enables organizations to take advantage<br />

of hardware-based security functions that<br />

strengthen exist<strong>in</strong>g security frameworks. With<br />

security functions rooted <strong>in</strong> the hard drive,<br />

potential data thieves can no longer exploit<br />

software vulnerabilities to compromise security.<br />

<strong>Seagate</strong> cont<strong>in</strong>ues to pioneer drive-based<br />

security <strong>and</strong> make the technology available to<br />

ISVs <strong>and</strong> solution providers with the goal of<br />

mak<strong>in</strong>g the overall comput<strong>in</strong>g environment more<br />

secure for bus<strong>in</strong>ess.


<strong>Momentus</strong> <strong>5400</strong> <strong>FDE.2</strong> <strong>Hard</strong> <strong>Drive</strong><br />

<strong>and</strong> <strong>Drive</strong>Trust: <strong>Best</strong>-<strong>in</strong>-Class Data<br />

Protection for Laptops<br />

Resources<br />

To learn more about the <strong>Seagate</strong> <strong>Momentus</strong> <strong>5400</strong><br />

<strong>FDE.2</strong> hard drive, visit: www.seagate.com/www/<br />

en-us/products/laptops/momentus/momentus_<br />

<strong>5400</strong>_fde.2/.<br />

To read about the TCG Storage Work Group,<br />

visit: www.trustedcomput<strong>in</strong>ggroup.org/groups/<br />

storage/.<br />

For more <strong>in</strong>formation about <strong>Drive</strong>Trust technology,<br />

read these white papers:<br />

• <strong>Drive</strong>Trust Technology: A Technical Overview:<br />

www.seagate.com/docs/pdf/whitepaper/<br />

TP564_<strong>Drive</strong>Trust_Oct06.pdf.<br />

• <strong>Seagate</strong> <strong>Drive</strong>Trust Technology: Enabl<strong>in</strong>g<br />

Bus<strong>in</strong>esses to Comply with Data Encryption<br />

Legislation: www.seagate.com/docs/pdf/<br />

whitepaper/tp566_drivetrust.pdf<br />

• <strong>Seagate</strong> <strong>Drive</strong>Trust Technology Enables<br />

Robust Security With<strong>in</strong> the <strong>Hard</strong> <strong>Drive</strong>:<br />

www.seagate.com/docs/pdf/whitepaper/<br />

TP565_<strong>Drive</strong>TrustOverview_Oct06.pdf.<br />

AMERICAS <strong>Seagate</strong> Technology LLC 920 Disc <strong>Drive</strong>, Scotts Valley, California 95066, United States, 831-438-6550<br />

ASIA/PACIFIC <strong>Seagate</strong> Technology International Ltd. 7000 Ang Mo Kio Avenue 5, S<strong>in</strong>gapore 569877, 65-6485-3888<br />

EUROPE, MIDDLE EAST AND AFRICA <strong>Seagate</strong> Technology SAS 130–136, rue de Silly, 92773, Boulogne-Billancourt Cedex, France 33 1-4186 10 00<br />

Copyright © 2007 <strong>Seagate</strong> Technology LLC. All rights reserved. Pr<strong>in</strong>ted <strong>in</strong> USA. <strong>Seagate</strong>, <strong>Seagate</strong> Technology <strong>and</strong> the Wave logo are registered trademarks of <strong>Seagate</strong> Technology<br />

LLC <strong>in</strong> the United States <strong>and</strong>/or other countries. <strong>Drive</strong>Trust <strong>and</strong> <strong>Momentus</strong> are either trademarks or registered trademarks of <strong>Seagate</strong> Technology LLC or one of its affiliated<br />

companies <strong>in</strong> the United States <strong>and</strong>/or other countries. All other trademarks or registered trademarks are the property of their respective owners. One gigabyte, or GB, equals<br />

one billion bytes when referr<strong>in</strong>g to hard drive capacity. Accessible capacity may vary depend<strong>in</strong>g on operat<strong>in</strong>g environment <strong>and</strong> formatt<strong>in</strong>g. <strong>Seagate</strong> reserves the right to change,<br />

without notice, product offer<strong>in</strong>gs or specifications. Publication Number: TP578.1-0707US, July 2007

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!