BitLocker™ Drive Encryption A look under the covers Steve Lamb Technical Security Advisor, Microsoft UK

Slides:



Advertisements
Similar presentations
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Advertisements

Rambling on the Private Data Security
Rodney Buike IT Pro Advisor, Microsoft Canada
Craig Ashley | Sr. Product Manager Michael Raymond | SDET II.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
BitLocker: deep details, improvements and benifits
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
More Control and Flexibility Vitalis Konopelec Technology Solution Professional Microsoft Slovakia s.r.o.
Security and Policy Enforcement Mark Gibson Dave Northey
Michael Kleef Technology Advisor | Microsoft Australia
SEC316: BitLocker™ Drive Encryption
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Kalpesh Patel Ramprabhu Rathnam
BitLocker™ Drive Encryption Hardware Enhanced Data Protection
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
Making Identity and Access Management Real – The Early Days Brian Lauge Pedersen Senior Technology Specialist.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
Jeremy Chapman – Deployment and Management Baldwin Ng – Assessment
Secure Startup Hardware-Enhanced Security Peter Biddle Product Unit Manager Windows Security Microsoft Corporation Stacy Stonich Program Manager Windows.
Virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar│ Technology Evangelist │Microsoft Corporation Blog:
Johan Arwidmark Chief Technical Architect WCL315.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Windows Vista: Deployment. What Will We Cover? Managed Deployment Advantages Windows Imaging Windows Preinstallation Environment Application Compatibility.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
BitLocker Enterprise Deployment
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Week #7 Objectives: Secure Windows 7 Desktop
Windows XP to Windows 7 using P2V Migration. Agenda Deploying Local P2V Migration for SA Retro Mode Scripts Customize MDT 2010 with Disk2VHD Windows Virtual.
Ed Martinez Principal Development Manager Microsoft Dynamics CRM DEV302.
Richard Smith Senior Consultant – Management, Operations and Deployment Microsoft UK Exploring the User State Migration Toolkit (USMT) 4.0.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Welcome. Welcome to this TechNet Event URL for on-line feedback is in your reminder No Planned Fire Drills Please turn your Mobile Phones off To.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Active Directory design recommended practices Mark Cribben Consultant.
Endpoint Encryption Methodologies Ed Underwood Dell Data Protection.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Building Complete Web Application Using ASP.NET 3.5 & Visual Studio 2008 Omar Khan Group Program Manager Visual Studio.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Systems Architecture Microsoft BitLocker -> securing data on mobile devices Johannes Marotzke
Reporting Services Futures: Report Authoring for Information Workers Ciprian Jichici Microsoft Regional Director for Romania General Manager, Genisoft.
UNM Encryption Services in Development
Configuring Encryption and Advanced Auditing
Microsoft Virtual Academy
Deployment Planning Services
Microsoft Virtual Academy
תרגול 9 – Windows Security
The Microsoft 365 Powered Device
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Twenty Windows Tools You Never Knew Existed
Modern Windows 10 device 12/2/2018 E3 E3 P E3 P P P P E3 E3 P P P P P
{ Security Technologies}
Microsoft Virtual Academy
Top OS Deployment Issues With Answers from Experts
Microsoft Virtual Academy
One Marketing Template
Deploying and Managing Windows To Go
Microsoft Virtual Academy
Microsoft Virtual Academy
Pass-the-Hash.
Microsoft Virtual Academy
{ How to Deploy and Manage the Desktop & What’s in SP1}
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Presentation transcript:

BitLocker™ Drive Encryption A look under the covers Steve Lamb Technical Security Advisor, Microsoft UK

Agenda Is EFS Dead? A quick review What threats does it mitigate? What threats ARE NOT mitigated Vista SP1 To Gain Access We Need Deployment Considerations Resources

Is EFS Dead? ?

A Quick Review BitLocker BitLocker

What threats does it mitigate? rest Over-riding Access Controls

What threats ARE NOT mitigated? Stupid User! Stupid Admin! Removable Media Weak Passwords

SP1 Multi-volume support Key Rolling

What Is A Trusted Platform Module ? TPM 1.2 spec:

Secure the pre-boot environment Measure EVERYTHING

What do we measure?

To gain access we need Full Volume Encryption Key Volume Master Key Multiple places to store it

Volume Master Key – option 1 TPMAccess

Volume Master Key – option 2 TPMPINAccess

Volume Master Key – option 3 TPM Startup Key Access

Volume Master Key – option 4 Recovery Key Startup Key Access

Volume Master Key – option 5 Recovery Password Access

BitLocker Encryption Hello, World! (Plaintext) Full-Volume Encryption Key (FVEK) Derive Sector Key Diffuser (“Elephant”) AES Uryyb, Jbeyq! (Encrypted Sector)

Keys and Protectors (“Authenticators”) DATA 1 FVEK 2 VMK 3 TPM 4 TPM+USB TPM+PIN USB Key (Recovery or Non-TPM) Recovery Password (48 Digits) Where’s the Encryption Key? 1.Data is encrypted with the FVEK 2.The FVEK is encrypted with the VMK and then stored in the volume metadata. 3.The VMK is encrypted by one or more key protectors, then stored in the volume metadata. 4.The Trusted Platform Module will not decrypt the VMK if the system integrity check fails.

Disk Configuration Partitioning guidelines: Disk ConfigurationPartition 1Partition 2Partitions 3 WinRE and BitLocker on separate partitions BitLocker Type 0x7 1.5GB (Active) Windows RE Type 0x27 1GB Windows Vista Type 0x7 Windows RE and BitLocker on same partition Windows RE/BitLocker Type 0x7 1.5GB (Active) Windows Vista Type 0x7 Not needed

You can measure the BIOS too

Deployment Considerations

Windows Vista Security Guide provides customers with best practices and automated tools to help them quickly and easily deploy Windows Vista, and provides tested guidance to balance their needs for security and functionality SOLUTIONACCELERATORS Act faster. Go further. Tested guidance by Windows Vista Security Experts Preconfigured, customizable security settings Unique GPO Accelerator tool deploys security configurations in minutes vs. hours Understanding the Options with the Windows Vista Security Guide

Please fill in your Evaluation Form

Resources Data Encryption Toolkit for Mobile PCs Bitlocker Drive Encryption Technical Overview Keys to Protecting Data with Bitlocker Drive Encryption Developing Credential Providers for Windows Vista Create Custom Login Experiences With Credential Providers For Windows Vista Create Custom Login Experiences With Credential Providers For Windows Vista

Resources Visit TechNet in the ATE Pavilion and get a FREE 60-day subscription to TechNet Plus! Technical Communities, Webcasts, Blogs, Chats & User Groups Microsoft Learning and Certification Microsoft Developer Network (MSDN) & TechNet Trial Software and Virtual Labs

© 2007 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.