![Seagate 10K.3 - Savvio 300 GB Hard Drive Brochure Download Page 3](http://html.mh-extra.com/html/seagate/10k-3-savvio-300-gb-hard-drive/10k-3-savvio-300-gb-hard-drive_brochure_1221958003.webp)
Instant Secure Erase Without Managing Keys
The Self-Encrypting Drive provides instant data
destruction via cryptographic erase. When
the SED is in normal use, its owner need not
maintain authentication keys (otherwise known
as credentials or passwords) in order to access
the drive’s data. The SED will encrypt data being
written to the drive and decrypt data being read
from it, all without requiring an authentication key
from the owner.
When it’s time to retire or repurpose the drive,
the owner sends a command to the drive to
perform a cryptographic erase. Cryptographic
erase simply replaces the encryption key inside
the encrypted drive, making it impossible to ever
decrypt the data encrypted with the deleted key.
(A more detailed explanation of how secure erase
works appears in Appendix A.)
Self-Encrypting Drives reduce IT operating
expenses by freeing IT from both drive control
headaches and disposal costs. The SED’s
government-grade data security helps ensure
Safe Harbor for data privacy compliance without
hindering IT efficiency. Furthermore, SEDs
simplify decommissioning and preserve hardware
value for returns and repurposing by:
•
Eliminating the need to overwrite or destroy the
drive
•
Securing warranty and expired lease returns
•
Enabling drives to be repurposed securely
Auto-Locking Self-Encrypting Drives With
Key Lifecycle Management
Beyond using a Self-Encrypting Drive for instant
secure erase at retirement, the drive owner
may also choose to employ that same SED in
the auto-lock mode to help secure active data
against theft. Insider theft or misplacement is a
growing concern for businesses of all sizes; in
addition, managers of branch offices and small
businesses without strong physical security face
greater vulnerability to external theft.
Utilizing the SED in auto-lock mode simply
requires securing the drive during its normal use
with an authentication key. When secured in this
manner, the drive’s data encryption key is locked
whenever the drive is powered down. In other
words, the moment the SED is switched off or
unplugged, it automatically locks down the drive’s
data.
When the SED is then powered back on, the
SED requires authentication before being able to
unlock its encryption key and read any data on
the drive, thus protecting against misplacement
and insider or external theft.
The lifecycle of authentication keys can be
managed by the IBM Tivoli Key Lifecycle
Manager (formerly Encryption Key Manager),
which is a Java-based software program
that centrally generates, protects, stores and
backs up authentication keys. It is a unified
key management service that will support the
key management requirements for all forms of
storage (as well as other security applications).
IBM, LSI and Seagate will support the Key
Management Interoperability Protocol submitted
to OASIS for advancement through their open
standards process. With its platform neutrality,
IBM Tivoli Key Lifecycle Manager offers a simple
and effective method for managing the growing
number of encryption keys across the enterprise.
The auto-lock mode of Self-Encrypting Drives and
IBM Tivoli Key Lifecycle Manager is discussed in
detail in Appendix A.
The owner of a Self-Encrypting Drive is able to
use the SED first in secure erase-only mode, and
then later change that SED to auto-lock mode.
Later, after performing an instant secure erase
and repurposing the drive, the drive may then go
back to being used in secure erase-only mode.
So, initially, the drive owner may choose to leave
the SED in secure erase only mode during normal
operation, intending to just perform an instant
secure erase when needed. Later, perhaps
due to growing concerns over theft, the owner
may elect to use the SED in auto-lock mode for
the remainder of the owner’s use of the drive,
by simply creating an authentication key that
wraps the existing encryption key. Subsequently,
once the SED has been securely erased and
repurposed, its new owner may decide to not put
the drive in auto-lock mode and use the drive in
secure erase-only mode to securely erase the
drive at the end of its useful life.
Self-Encrypting Drives for
Servers, NAS and SAN Arrays
3