Most of us know by now that encryption of mobile laptops should be considered mandatory. However, encryption of the direct attached storage used in fixed desktops and servers hasn’t been a priority because of their relative lack of mobility.
However, this overlooks the significant issue of data leakage when devices are retired. This point was driven home in a documentary last night on PBS last night titled “Ghana: Digital Dumping Ground – Dirty little secrets of the e-waste trade”. From the synopsis:
Hard drives that can be salvaged are displayed at open-air markets. Off camera, Ghanaians admit that organized criminals sometimes comb through these drives for personal information to use in scams.
As part of the investigation, one of the students buys a number of hard drives to see what is on them, secretly filming the transaction to avoid the seller’s suspicions.
The drives are purchased for the equivalent of US$35.
The students take the hard drives to Regent University in the Ghanaian capital and ask computer scientist Enoch Kwesi Messiah to help read what is on them.
Within minutes, he is scrolling through intimate details of people’s lives, files left behind by the hard drives’ original owners.
There is private financial data, too: credit card numbers, account information, records of online transactions the original owners may not have realized were even there.
“ I can get your bank numbers and I retrieve all your money from your accounts,” Messiah says. “If ever somebody gets your hard drive, he can get every information about you from the drive, no matter where it is hidden.”
Rather than depend on a data wiping process when our machines are disposed (which isn’t foolproof with a single pass and which may or may not be performed), why don’t we simply strongly encrypt the data and make sure the keys aren’t stored on the hard drive when it is retired?
Do you know for certain all of your retired machines have been disposed of safely? Check again to be sure. And then again.
One of the drives the team has purchased contains a $22 million government contract.
It turns out the drive came from Northrop Grumman, one of America’s largest military contractors. And it contains details about sensitive, multi-million dollar U.S. government contracts. They also find contracts with the defense intelligence agency, NASA, even Homeland Security.
The data on a well-encrypted hard drive without the key is as unrecoverable as a multi-pass data wiping process. Oh, and there’s the added benefit of protection from direct theft from an office (an issue for organizations with lots of distributed locations with little security at the remote sites) and for protection for machines in transit as they are shipped from one location to another.
Cost? Sure – but the cost of full drive encryption is rapidly dropping. Prices for software-based solutions are dropping and vendors are building this as a standard capability into the hard drives, into the OS and into the motherboard itself. Multi-pass data wiping has a cost too, especially if you can’t sleep at night knowing for sure whether this was performed or not.
Overhead? Sure – there’s a slight impact to encryption (more if software-based, less if in the drive controller or hard drive itself). Either way, Moore’s law gives us more and more processing power each year. Let’s use some of that additional processing power for a no-brainer like encrypting all desktop and server hard drives moving forward.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.