Are you one of those people who think just because you have a strong password for your device, your data is safe? If yes, then you might want to go through this blog.
Data protection is becoming a major concern in the modern world. Whether it is your private files or highly confidential corporate data, if it reaches the wrong guys then the result would be devastating.
From all this, it is pretty clear how important data protection is and the first step towards data protection is data encryption.
Data encryption simply means the encoding of meaningful data into a non-readable format. Encryption is always based on a key so that only authorized personnel with the key can access the data. The primary idea of encryption is that even if data is breached and falls into the wrong hands, it would be useless without the key.
Data encryption can be categorized based on different criteria like the type of algorithm used, type of encryption key used, and so on. One of the most common and important ones is based on what part of a drive/disk is encrypted. In this category, there are two types:
- Full-disk encryption (FDE)
- File-based encryption (FBE)
What is Full-disk encryption or FDE?
Encryption of an entire disk drive is referred to as full-disk encryption. In the case of full-disk encryption, every piece of data in the disk is encrypted using a single encryption key.
Full-disk encryption is useful for protecting data that is at rest. This means that FDE can protect data that is stored in a device but cannot protect data in motion or use. When FDE is enabled in a device, data gets encrypted as it is stored in the device.
When an FDE-enabled device is locked, all the data in it is encrypted and it can be accessed only by entering a valid encryption key. Once the device is unlocked all the data in it gets decrypted and can be accessed by the user.
Full-disk encryption is normally done using tools provided by the operating system provider itself. Windows devices can be encrypted using BitLocker, whereas Mac devices are encrypted using FileVault.
BitLocker
BitLocker is the full-disk encryption tool provided by Microsoft for Windows devices. Encryption is done using AES algorithm having a block size of 128-bit. The key used here can be 128-bit or 256-bit.
Remote configuration of BitLocker is possible using UEMs like Hexnode. Using Hexnode, BitLocker for multiple devices in an organization can be configured very easily. Another huge advantage of remote configuration is that no user interaction is required.
FileVault
Similar to BitLocker for Windows devices, FileVault is the full-disk encryption tool for Mac devices provided by Apple. FileVault also uses an AES encryption algorithm with a block size of 128-bit and a key size of 256-bit.
FileVault can also be configured remotely using Hexnode UEM. Apart from remotely enforcing FileVault, Hexnode allows multiple other configurations such as choosing the type of key, escrowing personal key, and so on.
Featured resource
Hexnode Windows Management Solution
Get started with Hexnode’s Windows Management solution to improve security, increase productivity, save time and overhead costs of managing your corporate devices.
Download datasheetBenefits of full-disk encryption
Full-disk encryption can ensure that no meaningful data can be extracted from a device without the device password/encryption key, whichever is used to lock the device. Thus, FDE can ensure the safety of device data at rest.
Data in drives/disks locked with a password can be accessed if the drive is put in another system. Data cannot be extracted from disks encrypted with FDE even if the disk is put on another system.
One of the most important features of full-disk encryption is that once it is enabled on a device, all data that is written on the disk is automatically encrypted. Similarly, the decryption process also happens automatically as the data is read from the disk.
Drawbacks of full-disk encryption
Full-disk encryption is not a fool-proof technique to ensure data security. Once the device is unlocked pretty much anyone can access any piece of data in the device. In this modern age, hacking a device password might not be the hardest job there is.
It can take hours to initially set up full-disk encryption on a device based on the amount of data that is already stored in the device. FDE tends to take up a bit of device resources making the device performance a bit slower.
What is file-based encryption or FBE?
Just as the name suggests, file-based or file-level encryption is a type of encryption where individual files or even small groups of files on a disk are encoded. Unlike full-disk encryption, each file in a disk/drive can be encrypted with a different key.
Files that are encrypted using FBE require the key to be decrypted even if the device is unlocked. Encrypted files sent to other devices will stay encrypted till the encryption password/key is entered. So, this keeps data in motion as well as in rest secured.
File-based encryption is normally achieved using third-party tools that are commercially available.
Benefits of file-based encryption
File-based encryption gives granular control to device admins on what data is to be encrypted and what data is to be left unencrypted. Individuals who use personal devices for work purposes can make the most use out of this. Personal files which the individual finds unimportant can be left unencrypted while critical work files can be encrypted.
Using FBE, each file in a device can be encrypted using a unique encryption key. This is very useful because even if someone cracks the key to any one of the files, it cannot be used to access any other data on the device.
Files that are encrypted using FBE can be safely transferred to other devices because even in other devices the password/encryption key would be required to open the file. In this way, file-based encryption can protect data in transit.
The main highlight of FBE is that even if a device is compromised or the device password is cracked using brute force attacks, the files remain encrypted, thereby ensuring data security.
Drawbacks of file-based encryption
Keeping track of encrypted and non-encrypted files might become a difficult task if too many files are encrypted. Also, if every file in a disk is encrypted using a different key/password, then keeping track of this might also become a tedious task for the device owner.
File-based encryption is normally done using a third-party software, unlike FDE. When using such software, there is a possibility of compatibility issues since these are not made exactly for particular operating systems.
Backing up encrypted files is a common practice. However, when there are too many files, backing up can become a hectic process.
Comparing FDE and FBE
When it comes to data protection, full-disk encryption is the bare minimum you can do to secure data in a device. FDE is more like a device password with superpowers. Full-disk encryption can ensure one thing – data in the drive would be useless without the device password.
As mentioned before, one of the major drawbacks of FDE is that once the device is unlocked, pretty much all the data in it is accessible. Assume a simple scenario where you leave your unlocked devices somewhere, then anyone can access the data stored in them.
Weak device passwords can be bypassed or even cracked using brute force attacks. This can be avoided by making use of strong and complex passwords. IT admins can enforce strong password policies to be used in devices with a UEM solution like Hexnode. IT admins can specify requirements of passwords like password length, complexity, age, and so on.
This is where file-based encryption can help you. File-based encryption can act as an extra layer of security for files stored on your device. Even if a device is compromised, FBE can ensure that data is useless without encryption.
So, instead of using one type of encryption as a replacement for the other, consider using both of the encryptions together.
Layering of full-disk encryption along with file-based encryption is always considered a great practice when data security is considered. This is because both of the encryptions cover the flaws of the other as much as possible.
Sign up for a free trial
Sign up for a 14-day free trial with Hexnode and explore the data security features offered by Hexnode.
Sign up
Share your thoughts