Transcript
Page 1: RSA Key Management with Brocade Encryption Solutions

STORAGE AREA NETWORK

RSA Key Management with Brocade Encryption Solutions Brocade and RSA® have teamed up to offer a highly integrated encryption solution that works non-disruptively with existing storage and servers. Combining RKM for the Datacenter with Brocade encryption devices creates an industry-leading solution for encrypting data-at-rest.

Page 2: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

CONTENTS Introduction........................................................................................................................................................................................................................................3

Brocade Encryption with RKM....................................................................................................................................................................................................3

Encrypting Symmetrix Storage with Brocade Encryption and RKM..............................................................................................................................5

Encrypting Tapes with Brocade Encryption and RKM.........................................................................................................................................................7

Using SRDF with Brocade Encryption and RKM.................................................................................................................................................................10

Setting up Brocade Encryption with RKM.............................................................................................................................................................................11

Conclusion........................................................................................................................................................................................................................................13

RSA Key Management with Brocade Encryption Solutions 2 of 13

Page 3: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

INTRODUCTION Most encryption experts agree that the most difficult aspect of encrypting data-at-rest is managing the Data Encryption Keys (DEKs). Brocade® and RSA®, the Security Division of EMC, have combined efforts to offer a cost-effective key management solution with hardware-based encryption. The Brocade encryption device combines 96 gigabits per second (Gbps) of encryption processing performance with the RSA Key Manager for the Datacenter (RKM) solution. RKM enables policy-driven key management for the broadest range of encryption solutions, establishing true enterprise key management. The power of the encryption hardware combined with a flexible key management system helps organizations deploy enterprise-wide solutions for securing their data.

NOTE: The term “Brocade encryption device” is used in this paper to reference both the Brocade Encryption Switch and the Brocade FS8-18 Encryption Blade.

Brocade and RSA designed an encryption solution to succeed in advanced storage environments, by integrating Brocade encryption devices with the RKM solution. Brocade understands that organizations must comply with government regulations and offers services to help customers meet the stringent requirements of state and federal mandates. Corporations have entrusted Brocade and RSA with their most valuable data for over a decade and now these same corporations can encrypt their data with Brocade products and RSA key management.

The symmetric keys used in Brocade fabric-based encryption for disk and tape are the most essential and sensitive piece of information in the solution. Not only do the keys need to be protected so that the data encrypted with these keys cannot be decrypted by unauthorized users, they also must be preserved for as long as the encrypted data is preserved. If not, the encrypted data cannot be decrypted and will therefore be unrecoverable when the key is no longer available.

The Brocade encryption devices are responsible for generating keys and wrapping those keys to ensure their integrity and security. Once generated, the keys are then vaulted to RKM, to ensure that the keys are available for decryption when and where needed.

RKM provides a highly available and resilient environment for long-term storage of encryption keys across a broad range of encryption environments. RKM ensures that keys are preserved in an environment that can support large numbers of keys, across geographic and organizational boundaries, without risk of key loss or compromise. It distributes encryption keys when and where they are needed, protecting them in transit and ensuring they are provided only to authenticated and authorized entities. Through its enterprise-grade capabilities, RKM complements the capabilities of Brocade encryption to provide the industry-leading solution for securing data on tape.

BROCADE ENCRYPTION WITH RKM The key management requirements associated with enterprise-wide deployment of encryption have a great impact on both the effectiveness of encryption and on total cost of ownership for encryption solutions. There are three major impacts of enterprise-wide decryption deployments related to key management:

1. The more that key management is split across different encryption environments, the more difficult it is to align the configuration and operation of encryption in these environments with the security policies for the business. Enterprise key management alleviates these issues. A central, unified definition of key management makes it simpler to establish and maintain consistent control of keys across all environments in which encryption is performed, including how and where keys are used.

RSA Key Management with Brocade Encryption Solutions 3 of 13

Page 4: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

2. When key management is split across environments, a larger number of individuals is required to manage keys. Often the management cost is further increased by the multiplication of key management tools, making it difficult to share expertise and resources across these environments. In addition, without enterprise key management, expensive manual processes must be put in place to propagate keys when encrypted data is shared with partners or backup sites, so that business processes are not broken.

3. When encrypted data needs to be shared among applications, groups, or infrastructure, lack of centralized management for key sharing often means that data needs to be decrypted before sending it from one point to another and then re-encrypted at the destination. This increases both the cost of data sharing and the vulnerability of the data.

Using RKM to establish an enterprise key management environment, as shown in the Figure 1, addresses these issues to ensure both the cost effectiveness and the strength of encryption solutions.

Figure 1. RSA Key Manager for the Datacenter

Establishing effective data protection is possible only if enterprise control mechanisms participate in well understood security policies that reflect an accurate understanding of the enterprise’s data, threats and risk model. Using an enterprise key management system that participates in centralized policy administration ensures that localized data protection enforcement is aligned with data protection policies. RKM can provide this alignment of encryption with enterprise security policy, helping to address the challenge of achieving effective and auditable security, while optimizing accessibility to information and minimizing cost of operations.

The integration of RKM with Brocade fabric-based encryption provides three major capabilities:

• Centralized vaulting, protection, and recoverability of keys

• Policy-based security

• Comprehensive audit capabilities

RKM provides centralized vaulting of the encryption keys for Brocade disk and tape encryption. Encryption keys are generated in the Brocade encryption device and vaulted in RKM. Those keys can then be retrieved by the Brocade encryption device when required for recovering data from a tape or when keys need to be restored to the disk encryption environment. This enables encryption deployments to scale while minimizing administrative costs and ensuring separation of duties.

RSA Key Management with Brocade Encryption Solutions 4 of 13

Page 5: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

The policy-based security in RKM ensures effective control of encryption. RKM controls how long a key is available and where it is distributed, ensuring that policies for data availability are effectively and consistently enforced. It enforces authentication and authorization of entities vaulting and requesting keys, to ensure that even an organization that has inappropriately acquired an encrypted tape will not be able to acquire the key to decrypt it. RKM security policies also control administrative access to keys, establishing separation of duties between policy management and key use essential to effective control of security.

Auditing of all encryption key activity enables organizations to ensure that key-related security policies are being followed to meet compliance requirements. Vaulting of keys, restoring keys to the Brocade encryption environment, expiration or revocation of keys and distribution of keys across the enterprise can all be tracked in a secure log. This provides both the operational control and compliance visibility to ensure that encryption is being used effectively and according to defined security policies.

ENCRYPTING SYMMETRIX STORAGE WITH BROCADE ENCRYPTION AND RKM Encrypting existing EMC storage, including Symmetrix and Clariion product lines, is a key aspect of the solutions offered by Brocade and RSA. Existing EMC storage can be converted to encrypted data selectively at the Logical Unit Number (LUN) level, so that only select LUNs are encrypted. While some LUNs remain stored in plaintext, the user-specified LUNs are encrypted at up to 96 Gbps per encryption device. Within minutes of committing the configuration, the data is encrypted according to IEEE 1619 standards for data at rest.

The basic configuration of the encryption solution is shown in Figure 2. Brocade recommends deploying encryption with redundant encryption devices and redundant RKM systems. The basic configuration of the solution includes:

• An initiator to read and write the data

• A Symmetrix storage device

• A Fibre Channel fabric that consists of two Brocade encryption switches in this example. But it could also be two FS8-18 Encryption Blades in a Brocade DCX™ Backbone chassis.

• Redundant RKM system to manage the Data Encryption Keys on separate servers

• Brocade Data Center Fabric Manager (DCFM™) to manage the fabric and encryption

• A management Local Area Network (LAN) to connect the RKM server, the management station, fabric devices (including the Brocade encryption devices), and other equipment

• A cluster LAN of Gigabit Ethernet links between the Brocade encryption devices for exchanging DEKs

In this example, LUN A of the Symmetrix is defined to be encrypted. When the encryption configuration is committed, the Brocade encryption device creates a random 256-bit DEK that is used to encrypt data. After the key has securely been stored in RKM, the encryption device creates a virtual target and initiator as shown in Figure 1. The virtual initiator reads the LUN in 256kB blocks, encrypts the data using AES256-XTS encryption algorithm, and writes it back to the same location as shown in data exchange 1 (blue). With up to 96 Gbps of encryption processing power, terabytes of data can be encrypted in a matter of minutes.

RSA Key Management with Brocade Encryption Solutions 5 of 13

Page 6: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

When the configured host writes data to the LUN, the host sends the request to the virtual target as shown in data flow 2 (green) of Figure 2. The data is encrypted by the Brocade encryption device and sent from the virtual initiator to the target as shown in data flow 3 (also green). The virtual target and initiator have their own Fibre Channel address and are instantiated in the redundant Brocade encryption device if the current encryption device fails. The virtualization of the host and target enable transparent migration between the encryption devices. Every host needs to be configured for the encryption procedure to ensure that all data that is written to the LUN is encrypted.

Figure 2. Encrypting disk data

RSA Key Management with Brocade Encryption Solutions 6 of 13

Page 7: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

Looking at the Brocade encryption device in more detail, Figure 3 shows how traffic is routed to the virtual initiators and targets with the encryption engine between them. The cleartext (unencrypted data) is sent to the encryption engine that resides inside the Federal Information Processing Standard 140-2 (FIPS 140-2 Level 3) security boundary (red dashed line). Within the boundary, the encryption engine combines the DEK with the cleartext to create the ciphertext. The security boundary ensures the integrity of the DEKs and the encryption process. The DEKs are always encrypted when they leave the FIPS security boundary and when they are stored in RKM. The ciphertext is placed in Fibre Channel frames and sent from the virtual initiator to the target. Many encryption engines work in parallel to support 96 Gbps of encryption processing power.

Figure 3. Brocade encryption device internals

ENCRYPTING TAPES WITH BROCADE ENCRYPTION AND RKM The Brocade-RSA encryption solution also encrypts data stored to tape via EMC Networker and other backup applications. A significant exposure of corporate data occurs when tapes are transported to remote tape vaults. Exposing up to a terabyte of plaintext data on a single tape during this transfer to the vault motivates many companies to transport tapes with expensive lockdown procedures that include auditing every step of the journey. If the tapes are encrypted with the Brocade-RSA solution, the tapes can be transported via low-cost overnight carriers.

A simple scenario shows the process of tape backup with EMC Networker backup servers. To begin the tape backup process, the Networker backup server reads the data from a storage device in data flow 1 in Figure 4. If the data is encrypted on the disk drive, the Brocade encryption device decrypts it and sends it to the Networker server in plaintext. The Networker backup server then writes the data to the virtual target as shown in data flow 2. Finally, the virtual initiator writes the encrypted data to the tape as shown in data flow 3. The DEKs for tape encryption can be associated with individual tape media or tape pools. Most implementations lean toward having one DEK per tape, though large implementation may choose to implement one DEK per tape pool.

RSA Key Management with Brocade Encryption Solutions 7 of 13

Page 8: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

Figure 4. Encrypting tapes

If the encrypted tapes are transported to a remote site as shown in Figure 5, the DEKs need to be exchanged between the Brocade encryption devices for the tapes to be read. The encrypted DEKs and the key policies are exchanged between the RKMs at both sites (shown as orange keys), but the encrypted DEKs are unreadable to Brocade encryption device 2.

RSA Key Management with Brocade Encryption Solutions 8 of 13

Page 9: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

Figure 5. Key exchange between sites

To decrypt the DEKs and thus the tapes, Brocade Encryption Device 1 and Brocade Encryption Device 2 must establish a trusted link and a key encryption key. The key encryption key is used by Brocade Encryption Device 1 to encrypt the tape DEKs and send the encrypted, or wrapped, DEKs (shown as the green key) over the cluster LAN to Brocade Encryption Device 2. Brocade Encryption Device 2 uses the key encryption key to decrypt the wrapped DEK in the Brocade encryption within the FIPS 140-2 Level 3 security boundary to obtain the cleartext DEK. The tape can now be decrypted at the second site after the secure key exchange.

Figure 6. Key encryption between Brocade encryption devices

RSA Key Management with Brocade Encryption Solutions 9 of 13

Page 10: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

USING SRDF WITH BROCADE ENCRYPTION AND RKM Users need to share sensitive, encrypted data and Brocade and EMC enable sharing encrypted data between sites with Symmetrix Remote Data Facility (SRDF). SRDF is a crucial application for large enterprises that span multiple sites.

Since the Symmetrix storage does not know that the data is encrypted, it synchronizes the data between the two arrays without decrypting the data. The hosts at each site must be configured to encrypt writes and decrypt reads. The RKM at the primary site must also be configured to send keys to an RKM at the secondary site. The Symmetrix array at the secondary site can then use the key identifier for the encrypted data to locate the corresponding encryption key in RKM. Together, the Symmetrix storage environments can support both disaster recovery scenarios and demanding enterprise requirements for high-throughput solutions.

Figure 7. SRDF mirroring of encrypted data

RSA Key Management with Brocade Encryption Solutions 10 of 13

Page 11: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

SETTING UP BROCADE ENCRYPTION WITH RKM Because RKM takes advantage of the enterprise key management interface provided by Brocade encryption, deploying RKM with Brocade encryption is simple to set up. The Brocade encryption switches vaulting keys to RKM or requesting archived keys from RKM are configured to communicate with an RKM, as shown in Figure 8.

Figure 8. Configuring Brocade encryption to use RKM

A backup or secondary RKM is defined for recovery purposes. Alternatively, highly available environments can be configured as shown in Figure 9. In that case, the IP address for the load-balanced RKM servers is specified at a given site, relying on the replication between RKM servers to synchronize keys across sites.

Figure 9. Brocade encryption and RKM

RSA Key Management with Brocade Encryption Solutions 11 of 13

Page 12: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

Additional information about RKM is required during setup, as the Brocade encryption device needs to know how to access RKM. The additional information is the IP Address of the RKM Server, the TCP port to access the services on the RKM (usually 443), and the Public Key Infrastructure (PKI)-based credentials used to gain access to RKM. Use of these credentials by Brocade encryption devices and RKM ensures that attacks, such as man-in-the-middle and injection, are prevented.

Once the setup is completed, communication between the Brocade encryption environment and RKM is transparent. When a Brocade encryption device creates an encryption key for disk encryption or tape backup, the key is wrapped with the key encryption key for that Brocade encryption device. The wrapped key is then immediately vaulted to RSA to ensure its availability for subsequent use, as shown in Figure 10.

Figure 10. Vaulting keys to RKM for the Datacenter

Similarly, when a tape is mounted for data restoration, the Brocade encryption device identifies the DEK required for decrypting that tape and requests the DEK from RKM. Using RKM ensures that DEKs will be available without operator intervention or action.

RKM writes additional audit information to its own log file, in addition to that provided by Brocade encryption. Information written to the log file includes:

• DEK-related events, such as generation of a DEK, generation of a new DEK, or location of a requested DEK.

• Key distribution events, such as a request, are received for a new DEK or a DEK is sent to a client.

• Administrator events, such as initiation or termination of access to RKM, creation of a new key class , creation of a new key policy, or creation of a new client entity .

In addition to this RKM server log, additional auditing information is provided by log files managed by related components, such as the database manager for the RKM repository. Combined with the Brocade log files, the RKM audit capabilities provide a comprehensive view of key management activity in the Brocade encryption environment.

RSA Key Management with Brocade Encryption Solutions 12 of 13

Page 13: RSA Key Management with Brocade Encryption Solutions

Storage Area Network Technical Brief

CONCLUSION Brocade and RSA offer secure encryption solutions for the highest-performing data center applications in the world. At 96 Gbps of encryption processing power per Brocade encryption device, customers can easily deploy this powerful solution for multiple applications. With RKM providing cost-effective, policy-based key management, the needs of multiple organizations can be addressed with one application. Together, the Brocade encryption device and RSA Key Manager for the Datacenter form an unmatched solution for securing large amounts of customer data.

The service divisions of both RSA and Brocade can provide needed assistance in deploying encryption solutions. From evaluating what data should be encrypted to meet government regulations to configuring key policies, the experts in both companies can lead customers to a safe and secure encryption solution. The complex nature of securing sensitive information is made much easier when RSA and Brocade become part of the solution.

© 2008 Brocade Communications Systems, Inc and RSA, the Security Division of EMC.

All Rights Reserved. 10/08 GA-TB-131-00

Brocade, Fabric OS, File Lifecycle Manager, MyView, and StorageX are registered trademarks and the Brocade B-wing symbol, DCFM, DCX, and SAN Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands, products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their respective owners.

RSA, RSA Security and the RSA logo are either registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. EMC is a registered trademark of EMC Corporation.

Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government.

RSA Key Management with Brocade Encryption Solutions 13 of 13


Top Related