Tape Encryption Solutions
Download
Report
Transcript Tape Encryption Solutions
IBM System Storage™
IBM Tape Encryption
and
TKLM v2.0.1
© 2012 IBM Corporation
IBM System Storage®
Agenda
Tape Encryption Overview
TKLM – Tivoli Key Lifecycle Manager
TKLM
v2.0.1 Enhancements
Implementation Considerations
Demo
Page 2
© 2012 IBM Corporation
IBM System Storage®
IBM Tape Data Encryption
LTO6 / LTO5 / LTO4 Tape Drive
Standard feature on all FC & SAS LTO6/5/4 Tape Drives
Supports
“traditional” and “encrypted” modes of operation
TS1140 / TS1130 / TS1120 Tape Drive
Standard feature on all new TS11xx Tape Drives
Supports “traditional” and “encrypted” modes of operation
TKLM – Tivoli Key Lifecycle Manager
AIX, Sun, Linux, Windows and z/OS
Serves keys
ISKLM – IBM Security Key Lifecycle Manager
z/OS
Page 3
Tivoli Key
Lifecycle
Manager
© 2012 IBM Corporation
IBM System Storage®
FIPS 140-2 Certification
FIPS – Federal Information Processing Standard
Cryptographic Service Providers - certified
CE2 Card
IBM Java Cryptographic Extensions (JCE)
Tape Drives
TS1120 – Certified
TS1130 – Certified
TS1140 – In process
LTO4 – Certified
LTO5 - Certified
http://csrc.nist.gov/groups/STM/cmvp/validation.html
Page 4
© 2012 IBM Corporation
IBM System Storage®
Tivoli Key Lifecycle Manager
Encryption Methods
Library-Managed________
TS3500, TS3400, TS3310_________
TS3200, TS3100, 3494________
Policy
System-Managed________
z/OS, AIX, Solaris__________
Windows & Linux_________
Application-Managed
(TSM, NBU, et. al.)
Page 5
Policy
Policy
© 2012 IBM Corporation
IBM System Storage®
Library Managed Encryption Components
Open Systems
Host
Fibre
• TKLM/drive key exchange
occurs over the LDI and
TCP/IP paths
Host – zOS, AIX, Linux,
Windows, Solaris
Key Store
TKLM
Crypto Services
LDI
Host – zOS, AIX, Linux,
Windows, Solaris
Key Store
Proxy
TKLM
Crypto Services
Page 6
© 2012 IBM Corporation
IBM System Storage®
AME / LME Comparison
LME
AME
Allows
TSM control
Transparent
–Device Class
to Backup application
– No TSM Admin required
– No TSM Upgrade required
3584
Transparent Encryption
feature code not required
Keystore
TKLM
Will
not required
FIPS
is encrypted
140-2 certified
work with other end points
– Tape, Disk, SAN, HBAs
Keys encrypted in transit to tape
drives
Allows
Not
for separation of duties
limited to TSM Backup/Archive
only
Page 7
© 2012 IBM Corporation
IBM System Storage®
System Managed Encryption Components – zOS
zOS
Java Virtual Machine
Key Store
ISKLM
Crypto Services
Host - AIX, Linux,
Windows, Sun
TCP/IP
And/Or
Key Store
FICON/ESCON Proxy
TCP/IP
TKLM
Crypto Services
SMS Policy
DFSMS
Data Class
FICON/ESCON
Fibre
• TKLM/drive key exchange
occurs over the fibre and
FICON/ESCON paths
• Encryption Policy defined by
SMS policy, DD statement
Control Unit
Page 8
© 2012 IBM Corporation
IBM System Storage®
System Managed Encryption – TS7700
Host - zOS, AIX, Linux, Windows, Sun
Host
Key Store
TKLM
Crypto Services
FICON
Network
Host - zOS, AIX, Linux, Windows, Sun
TS7700
Key Store
TKLM
Proxy
Page 9
The proxy in the
TS7700 provides the
bridge between the
drive FC and the
network for TKLM
exchanges.
Crypto Services
Encryption policy is based on
Storage Pool which is controlled
through Advanced Policy
Management (APM): Storage
Group and Management Class
© 2012 IBM Corporation
IBM System Storage®
Symmetric Encryption
Private Key, Secret Key, Data Key
User Data Encryption
Keystore Encryption
TKLM Backup Encryption
Page 10
© 2012 IBM Corporation
IBM System Storage®
Asymmetric Encryption
Public Key, Public/Private Key Pair, Key Encrypting Key
Drive authentication
Session security
Encrypting Data Keys
SSL between TKLM and device
SSL between TKLMs
TKLM web GUI communications
Page 11
© 2012 IBM Corporation
Built-in AES 256-bit data
encryption engine
<1% performance and capacity
impact
Authentication: TKLM queries
drive certificate and uses public
key to authenticate exchanges
FC Port 0
Drive
Firmware
Host Interface DMA
ear
Compression
Decompression
AES
Encryption
AES
Decryption
@MA8%w*q03!k3iKm4*^Fj&fgtrSIaasl
Look-aside decryption &
decompression help assure data
integrity.
FC Port 0
#*4msW Clear Clear
TS11xx and LTO
Encryption
Clear Clear Clear
IBM System Storage®
Processor
Code
Memory
w*q03!k3iKm4Aw^1*
Application Specific Integrated Circuit
Buffer
ECC and Format Encoding
Read/Write Electronics
Read/Write Head
Drive
Certificate
with
Drive’s Public
Key
Tape Drive with Private Key
Tape Media
Page 12
© 2012 IBM Corporation
IBM System Storage®
LTO Consortium based format
Standard LTO media
Entire volume is encrypted or non-encrypted
Common scratch pool with full re-format between encrypted and non-encrypted
Control Volume
Structures Label
Encrypted Host Records and/or
File Marks
End of
Data
EOT
BOT
cartridge memory
“KeyIdentifier” generated from Key Label/Alias or
provided by the application is encoded in each
Host Data Record & format recording element per
LTO specification.
Page 13
Data area
symmetric
encryption
AES-256
with DK
© 2012 IBM Corporation
IBM System Storage®
TS11xx Media Format Elements
Standard 3592 media
Entire volume is encrypted or non-encrypted
Common scratch pool with full re-format between encrypted and non-encrypted
Full support for wrapping keys
Simplifies key management and DR/ BP scenarios
Two Wrapped Key Structures (EEDKs) may be active on a cartridge
Control Volume
Structures Label
EEDK1/2
Encrypted Host Records and/or
File Marks
End of
Data
EEDK1/2
"wrapped keys" KEK[DK]
Asymmetric encryption
RSA-2048 with KEK
Page 14
EOT
BOT
cartridge memory
Data area
symmetric
encryption
AES-256
with DK
© 2012 IBM Corporation
IBM System Storage®
Agenda
Tape Encryption Overview
TKLM – Tivoli Key Lifecycle Manager
TKLM
v2.0.1
Implementation Considerations
Demo
Page 15
© 2012 IBM Corporation
IBM System Storage®
Tivoli Key Lifecycle Manager (TKLM)
IBM Licensed Program
Serves data keys to drive
TS11xx
LTO
DS8000
Runs on the same or
different server than the
tape application
AIX
TKLM
Other OS
Other OS
Page 16
IP
Fibre Channel
SAS
FICON
© 2012 IBM Corporation
IBM System Storage®
TKLM OS Support
AIX 5.3 or later
AIX 6.1 or later
Red Hat Enterprise Linux 4.0 (32 bit)
Red Hat Enterprise Linux 5.0 (32 bit and 64 bit)
SuSE Linux 9 (32 bit)
SuSE Linux 10 (32 bit and 64 bit)
Solaris 9 Sparc
Solaris 10 Sparc
Windows Server 2003 (32 bit and 64 bit)
Windows Server 2008 (32 bit and 64 bit)
z/OS 1.9, 1.10, 1.11 (TKLM v1 only)
Page 17
© 2012 IBM Corporation
IBM System Storage®
Release History
EKM (z/OS and Open)
Sept
2006
– Bundled with IBM Java
TKLM 1.0 (z/OS and Open)
Nov
2008
– DB2 and browser based GUI
TKLM 2.0 (Open only)
Aug
2010
– RBAC
– KMIP 1.0
Page 18
ISKLM 1.1 (z/OS only)
Apr
–
–
–
–
2011
Built on EKM for z/OS
No DB2 or Websphere
New device support
Service path for EKM for
z/OS
TKLM 2.0.1
Oct
2012
– Automatic cloning
– KMIP 1.1
– HSM support
© 2012 IBM Corporation
IBM System Storage®
Automated clone replication
Up to 5 Clones
Clones
Keystore
DB2
tables
Config file
Replication is encrypted
Master and clone systems must be identical
Page 19
© 2012 IBM Corporation
IBM System Storage®
KMIP v1.1 support
Device Credentials – how does a consumer of keys identify itself
Serial number identifying the client or device
Network address
Instance or volume identifier
Group
Shared secret
Device Credentials are used:
• To help with PCI-DSS compliance, only serve keys to known devices
• Ease of use for deployment – can use certificates as a right to connect rather than
managing a certificate per device
Improved asymmetric key support
• Major contributions from PGP and RSA
• Will be the basis for managing the key material in certificates
Grouping of keys
• Default and fresh attributes now supported
• Useful for pools of shared media
• Useful for key rotation
Page 20
© 2012 IBM Corporation
IBM System Storage®
TKLM Resources
TKLM Website: www.ibm.com/software/tivoli/products/key-lifecycle-mgr
TKLM
Info Center
TKLM Installation and Configuration Guide
Flash Demos
– Information Infrastructure Security with IBM
– TKLM GUI demo
TKLM Data Sheet
ftp://ftp.software.ibm.com/common/ssi/pm/sp/n/tid14031usen/TID14031US
EN.PDF
White Paper: Simplifying Key Management with Tivoli Key Lifecycle Manager
ftp://ftp.software.ibm.com/common/ssi/sa/wh/n/tiw14026usen/TIW14026US
EN.PDF
Red Book: IBM System Storage Tape Encryption Solutions
http://www.redbooks.ibm.com/abstracts/sg247320.html?Open
Red Paper: ISKLM for z/OS
http://www.redbooks.ibm.com/redpapers/abstracts/redp4646.html?Open
Page 21
© 2012 IBM Corporation
IBM System Storage®
Today’s Cryptographic Environment
Enterprise Cryptographic Environments
Collaboration &
Content Mgmt
Systems
Portals
Production
Database
Disk
Arrays
Enterprise
Applications
CRM
Backup
System
WAN
LAN
VPN
Replica
File Server
Backup
Disk
eCommerce
Applications
Business
Analytics
Staging
Dev/Test
Obfuscation
Email
Key
Management
System
Key
Management
System
Key
Management
System
Page 22
Backup
Tape
Key
Management
System
Key
Management
System
Key
Management
System
Key
Management
System
Key
Management
System
© 2012 IBM Corporation
IBM System Storage®
KMIP Overview
Key Management Interoperability Protocol (KMIP)
Key-management to encryption client protocol
Enables key lifecycle management
Generation, submission, retrieval, and deletion
Supports
Symmetric keys
Asymmetric keys
Digital certificates
http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=kmip
Page 23
© 2012 IBM Corporation
IBM System Storage®
TKLM v2 Supported Devices
IBM Tape Drives
LTO4
/ LTO5 / LTO6
TS1120
/ TS1130 / TS1140
IBM Tape Libraries
3494
DS5000
DS3000
Emulex
– OneSecure HBAs
TS3400
Brocade
TS3310
/ TS3100
TS2900
Non-IBM Tape Libraries
Quantum
(ADIC) i2000
Quantum (ADIC) i500
Page 24
DS8000
KMIP Supported Devices
TS3500
TS3200
IBM Disk Drives
(IBM OEM)
– IBM SAN32B-E4 (2498-E32)
– FC: 3895 - Encryption Blade
NetApp
–FAS2040
–FAS3200
–FAS6200
© 2012 IBM Corporation
IBM System Storage®
Agenda
Tape Encryption Overview
TKLM – Tivoli Key Lifecycle Manager
Implementation Considerations
Design Considerations
TS3500 (3584) Implementation
Demo
Page 25
© 2012 IBM Corporation
IBM System Storage®
TKLM Design Considerations
What Operating System?
Server sizing?
Dedicated Server or LPAR?
Dedicated LPAR or Shared LPAR?
TKLM - Local or Remote?
How implement HA?
Moving keys offsite
What to Encrypt?
Key rotation?
Number of Keys?
Page 26
© 2012 IBM Corporation
IBM System Storage®
What Operating System?
AIX
Keystore and
Crypto Services
Linux
Solaris
Windows
z/OS
TKLM
Drive Table
Configuration
Page 27
© 2012 IBM Corporation
IBM System Storage®
What Size Server?
CPU
Memory
Disk
Page 28
© 2012 IBM Corporation
IBM System Storage®
High Availability
Keystore and
Crypto Services
Keystore and
Crypto Services
TKLM
Page 29
TKLM
Drive Table
Drive Table
Configuration
Configuration
© 2012 IBM Corporation
IBM System Storage®
Dedicated Server or LPAR?
Option 1
Option 2
Option 3
Option 4
TKLM
TKLM
Other Apps
TKLM
Tape
Application
Page 30
TKLM
Tape
Application
Tape
Application
Tape
Application
© 2012 IBM Corporation
IBM System Storage®
TKLM – Local or Remote?
TKLM
Option 1
Tape
Application
TKLM
Tape
Application
TKLM
Tape
Application
Option 2
Tape
Application
TKLM
TKLM
Tape
Application
Page 31
Tape
Application
© 2012 IBM Corporation
IBM System Storage®
TKLM Deployment – DR Site
Main Site
Disaster Recovery site
Second production site
• Cold DR site:
- 2:0, Go to 0:2 after disaster
• Hot DR site:
- 1:1 or 1:2 If you have high network availability
- 2:1 or 2:2 If you have concerns about network outages.
Page 32
© 2012 IBM Corporation
IBM System Storage®
Moving Keys Offsite
DR
Keystore
TS11xx
LTO
Page 33
(Using TKLM
Backup/Restore)
Business
Partner
Public Key
EEDK w Hashed
Key Label
Keystore
Public Key
(Using TKLM
Backup/Restore)
- tklmkeyexport
© 2012 IBM Corporation
IBM System Storage®
What to Encrypt?
Selective Encryption
Encrypt All
Recovery
Page 34
AES
xR%pW@7
=
© 2012 IBM Corporation
IBM System Storage®
Key Rotation
My_2012_Key
My_2013_Key
My_2014_Key
My_1Q-2012_Key
My-2Q-2012-Key
My-3Q-2012-Key
Page 35
© 2012 IBM Corporation
IBM System Storage®
Internal or External Perform Resource?
IBM Implementation Services for tape systems - tape encryption and key
management
Tasks Performed
Planning
session meeting
Architecture
and Design
Implementation
Procedure
Skills
Development
transfer
IBM Benefits
Proven
methodology
Support
Basic
from IBM’s dedicated storage specialists
skills instruction for client staff
Accelerated
Page 36
implementation
© 2012 IBM Corporation
IBM System Storage®
Agenda
Tape Encryption Overview
Tape Encryption Process
Tape Encryption Implementation
Design
Considerations
TS3500
(3584) Implementation
Demo
Page 37
© 2012 IBM Corporation
IBM System Storage®
TS3500 Library Implementation
Install or upgrade tape drives
Upgrade drive firmware
Update TS3500 firmware
Enable drives for encryption (LME)
Set up TKLM IP address
Update drive encryption method
Setup Barcode Encryption Policy (Optional)
Run Key Path Diagnostic Test
Enable drives for encryption (SME)
Page 38
Update drive encryption method
© 2012 IBM Corporation
IBM System Storage®
Questions?
Page 39
© 2012 IBM Corporation
IBM System Storage®
Demo
Page 40
© 2012 IBM Corporation