
2. Encryption Architecture & Strategies
18
• Identify methods of tracking user passwords, key passwords and monikers. If the data is
stored on a computer, make sure it is stored on a computer that enforces encryption and is
not available on a network.
• Optionally, identify a primary and secondary team, so that you have redundancy in your
encryption strategy. Although that means the information required to decrypt data is
spread across more people, it also means that restoration of encrypted data may be much
easier, and you may ultimately have more data protection given the extra layer of
coverage; for example, if a user leaves, you aren’t in a position to lose data. This returns to
your initial decisions on how tightly and in what manner to enforce security for your site.
• Run drills confirming that your data is being encrypted properly, that keys are stored
properly, and that you can recover your data efficiently. Make sure that these drills are
included with your overall organizational security strategy.
• Create procedures to handle encrypted data that has been, or may have been,
compromised. For example, you may want to take all data and decrypt it, then re-encrypt it
and store it in an alternate location. You will also need to investigate the incident
involving compromised data, and take appropriate actions if identity-related data may
have been exposed.
• Archive the Endura Decryption Utility (EDU) for emergency use, such as to recover from a
disaster. Use this utility if you have no Spectra Logic libraries on hand but need to decrypt
and write data, which you can then restore using backup software.
• If you are using Professional Edition and multiple keys, make sure that data stored to one
tape shares a common expiration date or period (e.g., fourth quarter), regardless of the
number of keys used to encrypt data written to the tape. This simplifies tape management
and re-use.
• If you are using Professional Edition, make sure that critically important data is stored
using a single key on its own tape, to simplify restoration in case of disaster recovery and
to achieve business continuity goals.
• If you are using Professional Edition, you may want to take advantage of the M-of-N
shares option. This lets you select the M-of-N (such as 2 of 3) option to split a single file of
encrypted key data into multiple parts, or shares (N, which in this example is 3), and then
requires some specified subset (M, which in this example is 2) to import the file containing
key data. This further protects data from unauthorized use.