White Paper

Unlocking the True Value of Encryption and Key Management Modes for Military Data Storage Applications

Issue link: https://read.uberflip.com/i/1173416

Contents of this Issue

Navigation

Page 6 of 7

7 Key Management Mode Selection, Simplified Having articulated the fundamentals of encryption keys and clarifying the various encryption key mode strategies, we now turn to the final objective of this white paper. In the discussion that follows, we present a simple, easy-to-use framework to determine the optimal key management mode strategy given the requirements of a specific program in question. Readers are encouraged to reference the process flow diagram in the following discussion. It is important to note that these guidelines are provided as general references and not absolutes. When in doubt, consult with a security implementation expert. Will the data be stored on an end user device for a CSfC-approved implementation? If so, the key management mode options are limited to either Mode 1 or Mode 6. If the program is a black key program, Mode 6 is required. Data storage implementations not intended for the CSfC program require answering several additional questions: 1. Is data recovery after key purge required? The answer to this question determines whether a self-generated key (Mode 1) or a user-generated key (Modes 2 through 6) is appropriate. 2. Is the program a black key program? If so, Modes 5 and 6 are appropriate. Mode 6 includes an ATA password authentication, which is recommended unless there is a specific justification to avoid doing so. 3. If not a black key program, is automatic key purge beneficial or required for the mission? Session keys provide automatic key purge when power is removed from the device. 4. Is the added security layer of an ATA password beneficial for the specific security implementation? If unsure of the answer to this question, readers are encouraged to err on the side of caution and implement an ATA password. Does the program require or benefit from a black key implementation? Does the program require or benefit from a black key implementation? Will the program require CSfC approval? Is data recovery after key purge needed? Yes Yes No No No No No No Yes Yes Does the program require or benefit from added ATA password? Does the program require or benefit from added ATA password? Is Automatic key purge on power required? Yes Yes No Mode 6 Mode 5 Mode 4 Mode 3 Mode 2 Mode 1 Mode 1 Mode 6

Articles in this issue

view archives of White Paper - Unlocking the True Value of Encryption and Key Management Modes for Military Data Storage Applications