Bitlocker on RAID a good thing?

ICBM

Member
Aug 17, 2000
78
0
0
I haven't found alot of information pertaining to this exact topic here or elsewhere. I am just curious if it is safe(or a good idea) to use Window's Bitlocker on a RAID array.

On the current system I am working on I have a RAID1 array setup. Lets say the machine is stolen, Bitlocker should keep my data relatively safe. What if I have a drive go down, can I just let the controller rebuild itself with Bitlocker not caring one way or the other? Are there any other downsides to using Bitlocker on a small server? Performance is not a big concern. I look forward to input.
 

theevilsharpie

Platinum Member
Nov 2, 2009
2,322
14
81
What if I have a drive go down, can I just let the controller rebuild itself with Bitlocker not caring one way or the other?

Yes.

Are there any other downsides to using Bitlocker on a small server? Performance is not a big concern. I look forward to input.

If the operating system stops functioning, BitLocker (or any full-disk encryption application, for that matter) will prevent you from using third party tools to recover any data stored on the encrypted volume. Consequently, backups are critical; however, this data needs to be secured as well.
 

Fayd

Diamond Member
Jun 28, 2001
7,970
2
76
www.manwhoring.com
I'd go with truecrypt instead of bitlocker, but it's fine. the array doesnt care what's on it, the encrypted volume doesnt care what it's on.
 

0roo0roo

No Lifer
Sep 21, 2002
64,795
84
91
bitlocker is for machines that are not physically secure. for a server or regular machine you are better off making sure the thing can't be carried away
 

theevilsharpie

Platinum Member
Nov 2, 2009
2,322
14
81
bitlocker is for machines that are not physically secure. for a server or regular machine you are better off making sure the thing can't be carried away

"Servers" are increasingly being run inside virtual machines, which can be considered an insecure environment.
 

yinan

Golden Member
Jan 12, 2007
1,801
2
71
"Servers" are increasingly being run inside virtual machines, which can be considered an insecure environment.


Why are VMs considered insecure? You have to take all the same precautions as you would a physical box. This is more FUD that security folks like to spread.
 

imagoon

Diamond Member
Feb 19, 2003
5,199
0
0
Why are VMs considered insecure? You have to take all the same precautions as you would a physical box. This is more FUD that security folks like to spread.

In theory, you can security exploit a VM and compromise the running VM server processes, which then be used to exploit other machines that the VM server hosts.

Thing is, you need to exploit a VM enough to get it to run the attack on the hypervisor in such a way that it doesn't bomb the VM and the hypervisor and then still exploit the other VM's again with out bombing the whole system. Also once you get down to the hypervisor you still need to break out of the VM's process (VM's are basically processes) in to the hardware's core then hop back in to another VM process.

I would generally guess there is a much more direct and less intensive attack than this....

There is also the "shared memory" path but that is also a long shot because most hypervisors do memory scrubbing to reduce the memory load of the VM's themselves.
 

imagoon

Diamond Member
Feb 19, 2003
5,199
0
0
Which isn't any different than say a root kit on a machine. Also so can the baseband management controllers on most servers can also do this. Running on the hardware isn't automatically more secure, just a different attack vector.
 

theevilsharpie

Platinum Member
Nov 2, 2009
2,322
14
81
Which isn't any different than say a root kit on a machine. Also so can the baseband management controllers on most servers can also do this. Running on the hardware isn't automatically more secure, just a different attack vector.

The security issues with virtualization don't look any different because you're viewing it strictly from a technical perspective.

Virtualization's big advantage is its economies of scale due to the pooling of IT resources. From the perspective of an individual organization, this may involve moving sensitive data from a server that they maintain to a centralized IT organization that they may not trust. Full-disk encryption can provide security for data when the virtual infrastructure and/or the people that manage it aren't trusted.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |