Configuring hardware-based encryption
Lenovo hardware-based encryption supports full-disk encryption (FDE) of data as it is written. The data cannot be read without an encryption key stored on the firmware. The encryption key, in turn, is accessible only to an authenticated node.
Understanding Lenovo hardware-based encryption
A node authenticates itself to a self-encrypting drive using an authentication key retrieved from an external key management server or Onboard Key Manager:
The external key management server is a third-party system in your storage environment that serves keys to nodes using the Key Management Interoperability Protocol (KMIP). It is a best practice to configure external key management servers on a different storage system from your data.
The Onboard Key Manager is a built-in tool that serves authentication keys to nodes from the same storage system as your data.
You can use Lenovo Volume Encryption with hardware-based encryption to “double encrypt” data on self-encrypting drives.
When to use KMIP servers
Although it is less expensive and typically more convenient to use the onboard key manager, you should set up KMIP servers if any of the following are true:
Your encryption key management solution must comply with FIPS 140-2 level 2 or higher.
You need a multi-cluster solution, with centralized management of encryption keys.
Your business requires the added security of storing authentication keys on a system or in a location different from the data.
Support details
The following table shows important hardware encryption support details. See the Lenovo Storage Interoperation Center (LSIC) for the latest information about supported KMIP servers, storage systems, and disk shelves.
Resource or feature | Support details |
---|---|
Non-homogeneous disk sets |
|
Drive type |
|
10 Gb network interfaces | KMIP key management configurations support 10 Gb network interfaces for communications with external key management servers. |
Ports for communication with the key management server | You can use any storage controller port for communication with the key management server. Depending on the storage controller model, certain network interfaces might not be available during the boot process for communication with key management servers. |
MetroCluster (MCC) |
|