{"id":1220,"date":"2011-10-23T18:12:35","date_gmt":"2011-10-23T23:12:35","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=1220"},"modified":"2012-05-02T23:29:06","modified_gmt":"2012-05-03T04:29:06","slug":"enterprise-storage-encryption-an-administrator%e2%80%99s-input-output","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=1220","title":{"rendered":"Enterprise Storage Encryption: An Administrator\u2019s &#8230;"},"content":{"rendered":"<blockquote><p>Storage encryption has historically proven unpopular because of the issues of managing the keys used in various encryption methods, and the system performance burden that encryption\/decryption placed on systems hardware. These issues have been iteratively surmounted in a number of advances. Faster CPUs, disk controllers and host bus adapters (HBAs) and tough-to-break encryption now reduce the burden once placed on subsystem, disk, and device encryption.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/h30565.www3.hp.com\/t5\/Feature-Articles\/Enterprise-Storage-Encryption-An-Administrator-s-Guide\/ba-p\/603\">Enterprise Storage Encryption: An Administrator\u2019s &#8230; &#8211; Input Output<\/a>.<\/p>\n<p>This is a pretty good article.\u00a0 Here&#8217;s one more blurb.<\/p>\n<blockquote><p>Subsystems are encrypted at the hardware level or at the device group level. Subsystems can also be encrypted by the use of third-party software packages designed specifically for this purpose. Subsystem encryption usually means that a single encryption key is used for the group, and that the private encryption key is stored in hardware or in system firmware. This type of protection means that a drive \u201cstolen\u201d or otherwise removed from the group of storage media can\u2019t be decrypted, even by examining the disk using an identical system, as the identical system would be missing the key that unlocks the data by decrypting it.<\/p><\/blockquote>\n<p>This seems like a rather high level of security.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Storage encryption has historically proven unpopular because of the issues of managing the keys used in various encryption methods, and the system performance burden that encryption\/decryption placed on systems hardware. These issues have been iteratively surmounted in a number of &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=1220\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[286],"tags":[208,75,101],"class_list":["post-1220","post","type-post","status-publish","format-standard","hentry","category-storage","tag-it","tag-san","tag-security"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/1220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1220"}],"version-history":[{"count":5,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/1220\/revisions"}],"predecessor-version":[{"id":3976,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/1220\/revisions\/3976"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1220"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}