
2. Encryption Architecture & Strategies
20
Site Security Example: Low Security Site
Description of organization: Small company with 75 employees.
Security
Considerations
Security goals
Protecting company from legal liability associated with unauthorized access to data
stored on tape, both onsite and offsite, including transport to the offsite location.
Encryption principals
IT administrator, company president, corporate legal counsel.
Data to encrypt
Financial and consumer identity data.
Level of security to
implement
BlueScale Standard Edition: single key per library is sufficient.
Standard initialization mode: encryption partitions are enabled at all times.
Data sets requiring
isolation
None. A single partition for encrypted data is sufficient.
Key escrow method
Staff at company will escrow keys at a site remote from the data storage location.
Copies of each key to
store and their locations
Keep three copies of each key: one with the senior IT administrator, one with the
company president, one in a corporate safety deposit box.
Key rotation plan
Create a new key every six months.
Tracking key monikers
and passwords
On a non-networked computer that supports encryption, create one or more charts
or lists with this data, including key moniker, dates used, encryption and superuser
passwords, and password used to encrypt exported key. (Because BlueScale
prompts for the required encryption key moniker when restoring encrypted data,
this company chose not to track monikers and their relationship to media.)
Multiple encryption
teams (optional)
Deemed unnecessary given the users already identified as those responsible for
encryption.
Schedule and run drills
Formalized approach deemed unnecessary. Instead, incorporate review of data
decryption into standard six-month check to make sure that backups and restores
are working properly. This now includes a test involving data decryption.
Passwords
• Password to access encryption features: minimum of 12 characters,
including at least one number and one letter
• Password to export and import encryption keys: minimum of 30 characters,
including at least one number and one letter