DELL EMC POWERSCALE ONEFS DATA-AT-REST ENCRYPTION - ABSTRACT

Page created by Wallace Reed
 
CONTINUE READING
DELL EMC POWERSCALE ONEFS DATA-AT-REST ENCRYPTION - ABSTRACT
Technical White Paper

 Dell EMC PowerScale OneFS Data-at-Rest
 Encryption
                         Abstract
                         Dell EMC PowerScale OneFS provides support for Data-at-Rest Encryption
                         through self-encrypting drives and a key management system.

                         June 2021

H17923.4
DELL EMC POWERSCALE ONEFS DATA-AT-REST ENCRYPTION - ABSTRACT
Revisions

Revisions
                 Date                       Description
                 August 2019                Initial release

                 October 2019               Minor updates

                 March 2020                 Updated ‘Note’ in ‘Data-at-rest encryption’ section.

                 May 2020                   Updated template and ‘Isilon’ to ‘PowerScale’ branding.

                 August 2020                Updates to FIPS certificate section and other minor updates.

                 February 2021              Minor updates

                 May 2021                   Updated for OneFS version 9.2

                 June 2021                  Minor formatting update

Acknowledgements
               This paper was produced by the following:

               Author: Aqib Kazi

The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this
publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose.

Use, copying, and distribution of any software described in this publication requires an applicable software license.

This document may contain certain words that are not consistent with Dell's current language guidelines. Dell plans to update the document over
subsequent future releases to revise these words accordingly.

This document may contain language from third party content that is not under Dell's control and is not consistent with Dell's current guidelines for Dell's
own content. When such third party content is updated by the relevant third parties, this document will be revised accordingly.

Copyright © 2021 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell
Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. [6/4/2021] [Technical White Paper] [H17923.4]

2         Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
DELL EMC POWERSCALE ONEFS DATA-AT-REST ENCRYPTION - ABSTRACT
Table of contents

Table of contents
    Revisions ..................................................................................................................................................................... 2
    Acknowledgements ...................................................................................................................................................... 2
    Table of contents ......................................................................................................................................................... 3
    Executive summary...................................................................................................................................................... 4
    1     Data-at-rest encryption .......................................................................................................................................... 5
    2     Self-encrypting drives ............................................................................................................................................ 6
    3     PowerScale OneFS encryption .............................................................................................................................. 7
    4     External key manager ............................................................................................................................................ 8
          4.1      Requirements ............................................................................................................................................... 8
          4.1.1 KMIP and PowerScale tested compatibility ................................................................................................... 8
          4.2      Configuration ................................................................................................................................................ 9
    5     SEDs cryptographic erasure ................................................................................................................................ 12
          5.1      Confirming a SED is in the ‘Replace’ state .................................................................................................. 12
          5.1.1 After a node SmartFail................................................................................................................................ 12
          5.1.2 Check by drive ........................................................................................................................................... 13
          5.2      Cryptographic erasure after the SmartFail ‘Erase’ state .............................................................................. 13
          5.3      PowerScale cluster cryptographic erasure .................................................................................................. 14
          5.4      PowerScale node cryptographic erasure..................................................................................................... 14
    6     Common SED concerns ...................................................................................................................................... 15
          6.1      Data recovery from a defective or inaccessible SED drive .......................................................................... 15
          6.2      SED performance....................................................................................................................................... 15
          6.3      SED formatting ........................................................................................................................................... 15
    7     FIPS 140-2 Certification ....................................................................................................................................... 16
          7.1      PowerScale SED certificates ...................................................................................................................... 16
    A     Technical support and resources ......................................................................................................................... 17
          A.1      Related resources ...................................................................................................................................... 17

3            Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
DELL EMC POWERSCALE ONEFS DATA-AT-REST ENCRYPTION - ABSTRACT
Executive summary

Executive summary
           Data-at-rest encryption (DARE) is a requirement for federal and industry regulations ensuring data is
           encrypted when it is stored. PowerScale OneFS provides DARE through self-encrypting drives and a key
           management system. The data on SEDs is encrypted, and the data may not be accessed if the SED is stolen
           or removed from the cluster.

4      Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
DELL EMC POWERSCALE ONEFS DATA-AT-REST ENCRYPTION - ABSTRACT
Data-at-rest encryption

1           Data-at-rest encryption
            Data-at-rest is inactive data that is physically stored on persistent storage. Encrypting data at rest with
            cryptography ensures that the data is protected from theft, in the event drives or nodes are removed from a
            PowerScale cluster. Compared to data-in-motion, where data must be reassembled as it traverses network
            hops, data-at-rest is of particular interest to malicious parties as the data is a complete structure. The files
            have names and require less effort to understand versus smaller packetized components of a file.

            However, extracting data from a drive in a PowerScale cluster is not a straight-forward process even without
            encryption, as OneFS stripes data across nodes. Each data stripe is composed of data bits. Reassembling a
            data stripe requires all of the data bits and the parity bit.

            PowerScale implements Data-at-Rest Encryption (DARE) through the use of self-encrypting drives (SEDs)
            and AES-256-bit encryption keys. The algorithm and key strength meet the National Institute of Standards
            and Technology (NIST) standard and FIPS compliance. The OneFS management and system requirements
            of a DARE cluster are no different than standard clusters.

            Note: It is recommended that a PowerScale DARE cluster be composed of only SED nodes. However, a
            cluster composed of SED nodes and non-SED nodes is supported during a transition to an all SED cluster.
            Once a cluster contains a SED node, only SED nodes may be added to the cluster.

5       Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
DELL EMC POWERSCALE ONEFS DATA-AT-REST ENCRYPTION - ABSTRACT
Self-encrypting drives

2           Self-encrypting drives
            Self-encrypting drives (SEDs) are a type of hard drive that provide full disk encryption through onboard drive
            hardware. Additional hardware external to the drive is not required to encrypt the data on the drive. As data is
            written to the drive, it is automatically encrypted, and data read from the drive is decrypted. The encryption
            and decryption process are controlled by a chipset within the drive. An onboard chipset allows for a
            transparent encryption process as system performance is not impacted, providing enhanced security, and
            eliminating dependencies on system software.

            When access is controlled by the drives’ onboard chipset, this provides security in the event of theft or a
            software vulnerability, as the data remains only accessible through the drive’s chipset. At initial setup, a SED
            creates a unique and random key for encrypting data during writes and decrypting data during reads. This key
            is referred to as the Data Encryption Key (DEK), ensuring data on the drive is always encrypted. Each time
            data is written or read from the drive, the DEK is required to encrypt and decrypt the data, as illustrated in
            Figure 1. If the DEK is not available, data on the SED is not accessible, making all data on the drive useless.

                         SED Data Encryption Key

6       Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
PowerScale OneFS encryption

3          PowerScale OneFS encryption
           PowerScale OneFS provides data-at-rest encryption using SEDs, ensuring data is encrypted during writes
           and decrypted during reads. Data stored on the SEDs are encrypted and decrypted with a 256-bit data AES
           encryption key, referred to as the Data Encryption Key (DEK). OneFS takes the standard SED encryption
           further as the DEK for each SED is wrapped in an Authentication Key (AK). Further preventing unauthorized
           access, the AKs for each drive are placed in a Key Manager (KM), stored securely in an encrypted database,
           the Key Manager Database (KMDB). The KMDB is encrypted with a 256-bit Master Key (MK), as illustrated in
           Figure 2.

           PowerScale OneFS release 9.2 supports an external key manager by utilizing a Key Management
           Interoperability Protocol (KMIP) compliant key manager server. The MK is stored in a KMIP compliant server.
           PowerScale OneFS releases prior to OneFS 9.2 retain the MK internally on the node.

                       PowerScale Master Key

           The AK is unique to each SED and ensures OneFS never knows the DEK. In the event of drive theft from a
           PowerScale node, the data on the SED is entirely useless, as the MK, AK, and consequently, the DEK, are
           required to unlock the drive. If a SED is removed from a node, OneFS automatically deletes the AK.
           Conversely, when a new SED is added to a node, OneFS automatically assigns a new AK.

           For Gen 5 Isilon nodes, the KMDB is stored on both compact flash drives in each node. For Gen 6 Isilon
           nodes, the KMDB is stored in the node’s NVRAM, and a copy is placed in the buddy node’s NVRAM. For
           PowerEdge-based nodes, the KMDB is stored in the Trusted Platform Module (TPM). Utilizing the KM and
           AKs ensures the DEKs never leave the SED boundary, as required for FIPS compliance.

           Note: The Key Manager uses a FIPS-validated crypto when the STIG hardening profile is applied to the
           cluster. For information on enabling the STIG hardening profile, refer to the Dell EMC PowerScale OneFS
           STIG Security Profile whitepaper.

           The KM and KMDB are entirely secure and cannot be compromised, as they are not accessible by any CLI
           command or script. The KMDB only stores the local drives' AKs in Gen 5 nodes, and buddy node drives in
           Gen 6 nodes. On PowerEdge-based nodes, the KMDB only stores the AKs of local drives. The KM also uses
           its encryption so that the AKs are not stored in plain text.

7      Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
External key manager

4           External key manager
            PowerScale OneFS release 9.2 provides support for an external key manager by storing the 256-bit Master
            Key (MK) in a Key Management Interoperability Protocol (KMIP) compliant key manager server. This section
            provides the configuration steps for brownfield and greenfield clusters with SEDs. Although the configuration
            in this section explains how to migrate keys to an external key manager, OneFS also supports a reverse
            migration.

4.1         Requirements
            In order to store the MK on a KMIP server, PowerScale requires the following:

                •   OneFS release 9.2 (or greater) cluster with SEDs
                •   KMIP compliant server:

                    -   KMIP version 1.2 or greater
                    -   KMIP Storage Array with SEDS Profile Version 1.0 or greater
                    -   KMIP server host/port information
                    -   X.509 PKI for TLS mutual authentication

                        >   Certificate authority bundle
                        >   Client certificate and private key

                •   NANON (Not All Nodes On Network) and NANOAN (Not all Nodes On All Networks) clusters are not
                    supported
                •   Network connectivity from each node in the cluster to the KMIP server. For SED drives to be
                    unlocked, each node in the cluster contacts the KMIP server at bootup to obtain the MK from the
                    KMIP server. Otherwise, the node bootup fails.
                •   Administrator privilege: ISI_PRIV_KEY_MANAGER

4.1.1       KMIP and PowerScale tested compatibility
            PowerScale OneFS has tested and confirmed compatibility with the following KMIPs:

                •   Thales KeySecure
                •   Thales e-Security keyAuthority
                •   IBM Secure Key Lifecycle Manager (SKLM)
                •   Dell EMC CloudLink Center

            Note: PowerScale OneFS uses the Dell Key Trust Platform as the client for establishing connectivity to the
            KMIP server. Other KMIP platforms that are compatible with the Dell Key Trust Platform should also be
            compatible with OneFS. Additionally, PowerScale OneFS should be compatible with KMIP platforms that
            meet the requirements in Section 4.1, Requirements.

8       Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
External key manager

4.2        Configuration
           Once the requirements above are met, to configure the external key manager, perform the following:

               1. Copy the KMIP Server and Client Certificates to the cluster. Make a note of the file names and
                  location.
               2. From the OneFS web interface, select Access > Key Management as illustrated in Figure 3.
                  Alternatively, from the OneFS CLI, utilize: isi keymanager kmip servers create

                       Key Management

               3. From the Key Management page, click the Key Server tab. Check the “Enable Key Management”
                  box. Enter the KMIP “Server Host” and “Server Port” information. Specify the filename and location of
                  the “Server Certificate” and “Client Certificate” locations. If the KMIP server has a client certificate
                  password, specify this in the “Client Certificate Password” field and click Submit, as illustrated in
                  Figure 4. Alternatively, from the CLI, utilize the --host, --id, --ca-cert-path, --client-
                  cert-path, and --set-client-cert-password options.

                       Key Management Server Information

9      Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
External key manager

               4. OneFS contacts the KMIP and confirms the connection or displays any errors, as illustrated in Figure
                  5.

                       Key Management confirmation

               5. Once the KMIP server is added, the keys can now be migrated. Click the Keys tab to display all
                  current Master Keys on the cluster. Click on Migrate all to migrate the keys to the KMIP server. From
                  the “Migrate all” pop-up, click Migrate to start the migration, as illustrated in Figure 6. Alternatively,
                  from the CLI, utilize the isi keymanager sed migrate server command.

                       Master Key migration

               6. The key migration process may take several minutes or more to complete depending on the cluster
                  and network utilization. During this time, a “Migration in process” message is displayed, as illustrated
                  in Figure 7. Alternatively, from the CLI, utilize the isi keymanager sed status command.

                       Migration in process

10     Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
External key manager

               7. Once the process is complete, a “Migration Successful” message is displayed, and the “Status” for
                  each “Key ID” is “Migrated,” as illustrated in Figure 8. Alternatively, from the CLI, utilize the isi
                  keymanager sed status command.

                       Migration Successful

11     Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
SEDs cryptographic erasure

5           SEDs cryptographic erasure
            During the decommissioning of a PowerScale node or during a drive replacement, a common concern with
            SEDs is confirming they are cryptographically erased. Cryptographically erasing a SED is completed by
            running SmartFail on a PowerScale node or drive.

            During the SmartFail process, OneFS issues a command to reset the DEK and delete the AK,
            cryptographically erasing the drive.

            If a SED is SmartFailed and in the ‘Replace’ state, it has been cryptographically erased. On the contrary, if a
            drive failure occurs and is in the ‘Erase’ state, the data was not cryptographically erased. However, even in
            the ‘Erase’ state, the data is completely inaccessible.

            During the SmartFail process, to ensure data on a SED is unreadable, OneFS completes at least one of the
            following:

                •   In a successful SmartFail condition, OneFS cryptographically erases data by changing the DEK and
                    blocks read/write access to existing data by deleting the AK in OneFS.
                •   In a partially successful SmartFail condition, the drive is failing to respond to SCSI commands. In this
                    case, OneFS cannot cryptographically erase the data. However, read/write access to existing data is
                    blocked by deleting the AK in OneFS.

            The explanation of each SmartFail state is summarized in Table 1.

                        SED SmartFail States
                                   DEK Erased and        AK Erased and          Cryptographic
            SmartFail State                                                                            Data Inaccessible
                                   Reset                 Reset                  Erasure
            Replace                ✓                     ✓                      ✓                      ✓
            Erase                                        ✓                                             ✓

5.1         Confirming a SED is in the ‘Replace’ state
            As explained above, OneFS attempts to place each SED into the ‘Replace’ state. This section explains how to
            confirm the SED is in the ‘Replace state.

5.1.1       After a node SmartFail
            When a node completes the SmartFail process, it reboots to the configuration wizard. At this point, break out
            of the wizard and check the /var/log/isi_sed log.

            The log contain a ‘release_ownership’ message for each drive as it goes through the SmartFail process,
            confirming it is in a ‘REPLACE’ state, as displayed in the following snippet:

            2019-01-15T22:45:56Z  H400-SED-4 isi_sed[63658]: Command:
            release_ownership, drive bays: 1
            2019-01-15T22:46:39Z  H400-SED-4 isi_sed[63658]: Bay 1: Dev da1, HITACHI
            H5SMM328 CLAR800, SN 71V0G6SX, WWN 5000cca09c00d57f: release_ownership: Success

12      Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
SEDs cryptographic erasure

5.1.2       Check by drive
            Alternatively, to check an individual drive for its current status, utilize the ‘isi_sed’ command.

            Note: Practice extreme caution when utilizing the ‘isi_sed’ command. If it is used with the incorrect syntax, it
            can destroy data and impact cluster operation. Do not use any of the command's other options without explicit
            instructions from Dell EMC PowerScale Technical Support. Prior to executing any of the commands in this
            section, double-check the command syntax for errors.

            To query a SED for its status, perform the following:

                8. View the device names of the drives in the cluster, by executing the following command:

                    isi_drivenum

                    Drive device names are displayed in the format /dev/da#, where # is a number. Make note of the
                    da# for the next step.

                9. Using the  from the previous step, query the state of a SED drive, by executing following
                   command:

                    # /usr/bin/isi_hwtools/isi_sed drive 

                    Note: This command may take 30 seconds or longer to complete.

                10. Check the Drive State and Drive Status columns:

                    a. If both columns display UNOWNED and if the line below the table states Fresh unowned drive,
                       this means the drive has been reset to factory-fresh state, and the AK is deleted from the IKM.
                    b. If both columns display a status of AUTH FAILED, the AK has been deleted for the IKM, but the
                       drive was not reset to a factory-fresh state. The data on the drive no longer accessible without the
                       AK, but to cryptographically erase the drive, proceed with Section 5.2, Cryptographic erasure
                       after the SmartFail ‘Erase’ state.

5.2         Cryptographic erasure after the SmartFail ‘Erase’ state
            After attempting the SmartFail process, if a drive is in the ‘Erase’ state and cryptographic erasure is required,
            the only remaining course of action is to manually revert the SED drive to the ‘Unowned’ state, which is a
            factory fresh state. The SEDs Physical Security ID (PSID) is required for reverting a SED to the ‘Unowned’
            state. For enhanced security, the PSID is only accessible by removing the drive and examining the drive
            label.

            The PSID is the Physical Security ID of the drive (Physical SID). It is a 32-character password assigned by
            the drive manufacturer during production. The password cannot be changed by any host system. The PSID is
            found on the drive label in a readable format and depending on the drive manufacturer may additionally be
            available in a bar code format.

            If the revert command is issued to a SED and its matching PSID is entered at the prompt, the SED will
            prepare for reinitialization by deleting its DEK and the drive access password. As a result, the SED's
            ownership state resets to ‘unowned’. Once complete, the drive is in a factory-fresh state, and any previous
            data is permanently cryptographically erased.

13      Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
SEDs cryptographic erasure

           Note: The PSID can only be used for reverting the drive; it does not grant access to any encrypted data
           present on the drive.

5.3        PowerScale cluster cryptographic erasure
           If an entire PowerScale cluster requires cryptographic erasure, either reimage or reformat the cluster. Once
           complete, all of the SEDs are cryptographically erased.

           Note: The format process on SEDs requires significantly more time than on non-encrypted drives. The format
           process takes longer, as encryption seed data is written to all sectors on the drive. If the format process is
           interrupted, by losing power or drive removal, results in the node automatically destroying the AK.

5.4        PowerScale node cryptographic erasure
           If an entire PowerScale node requires cryptographic erasure rather than individual SEDs, this is completed by
           executing a SmartFail on the node. In this process, all of the drives are released from the node, ensuring they
           are cryptographically erased.

14     Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
Common SED concerns

6         Common SED concerns
          This section covers common questions and concerns about SEDs.

6.1       Data recovery from a defective or inaccessible SED drive
          If data from a SED cannot be read due to a malfunction, accidental release, or mishandling, the data on the
          drive is permanently lost. The data on the drive remains encrypted, as the DEK is not accessible by any
          means. Recovery techniques that work on traditional drives are useless on SEDs, due to the encryption.

6.2       SED performance
          SEDs do not have a performance penalty when compared to a non-SEDs. The onboard hardware encryption
          ensures the encryption does not impact performance.

6.3       SED formatting
          SEDs take significantly more time to format when compared to a non-SED drive. The additional time required
          to format a SED is because each drive is fully overwritten with random data as part of the encryption
          initialization process.

          To confirm if the format process is still running, depending on the OneFS version, the formatting process is
          either displayed by dots or a percentage. OneFS displays a completed message once the format is complete.

          Note: If a SED format process is interrupted for any reason, all the SEDs in a node are unusable. The only
          recourse at this point is to manually revert each drive using the PSID, as explained in Section 5.2,
          Cryptographic erasure after the SmartFail ‘Erase’ state.

15    Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
FIPS 140-2 Certification

7           FIPS 140-2 Certification
            The Federal Information Processing Standard (FIPS) Publication 140-2 is a National Institute of Standards
            and Technology (NIST) and Canadian Communications Security Establishment (CSE) standard for approving
            cryptographic modules. A FIPS 140-2 certification is granted after the model is tested and validated by the
            United States and Canadian government agencies.

            A FIPS certification is not only required by federal agencies and departments, but now has a global presence
            as a best practice of security certification. For organizations that store sensitive data, a FIPS certification may
            be required based on government regulations or industry standards. As companies opt for drives with a FIPS
            certification, they are ensured the drives meet stringent regulatory requirements. A FIPS 140-2 certification is
            provided through the Cryptographic Module Validation Program (CMVP). The CMVP ensures products
            conform to the FIPS 140-2 security requirement.

            For more information on FIPS, refer to the FIPS PUB 140-2 Security Requirements For Cryptographic
            Modules. For more information on CMVP, refer to the NIST CMVP webpage.

7.1         PowerScale SED certificates
            The SEDs in a PowerScale node are validated to ensure they have been tested by the CMVP and conform to
            the FIPS 140-2 requirements. A FIPS 140-2 certificate for the SED specifies the drive name and type, as
            displayed in Figure 9.

                           FIPS 140-2 certificate example

            The FIPS certificate for each SED is available for download directly from the NIST CVMP website. For a link
            to the appropriate NIST page based on a node’s specific SEDs, send an e-mail containing the node serial
            numbers to powerscale.fips.confirmation@dell.com.

            To access a PowerScale node’s serial numbers, from the OneFS CLI, use the isi_for_array -s
            isi_hw_status -i command. The serial numbers are listed by each node in the “SerNo” field.

            The e-mail response includes a link directly to the NIST CVMP certificate page of the SED module. Under the
            “Related Files” section, click the “Consolidated Certificate” link to download the FIPS 140-2 certificate.

            Note: An e-mail response may take up to 5 business days, depending on the current queue. If a FIPS
            certificate is required by a specific date, submit the request e-mail as soon as possible.

16      Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
Technical support and resources

A          Technical support and resources
           Dell.com/support is focused on meeting customer needs with proven services and support.

A.1        Related resources
           Dell EMC PowerScale OneFS: A Technical Overview

           FIPS PUB 140-2 Security Requirements For Cryptographic Modules

           NIST CMVP webpage

           PowerScale Software Release and Patching Strategy

           Dell EMC PowerScale OneFS STIG Security Profile

           OneFS 9.2.0.0 Documentation - PowerScale Info Hub

           OneFS 9.2.0.0 Web Administration Guide

           OneFS 9.2.0.0 CLI Administration Guide

           OneFS 9.2.0.0 API Reference

           OneFS 9.2.0.0 Security Configuration Guide

17     Dell EMC PowerScale OneFS Data-at-Rest Encryption | H17923.4
You can also read