Encryption of Data At-Rest Step-by-step Checklist

webinar

Author(s)/Presenter(s):

Storage Security Technical Work Group

Library Content Type

Technical White Paper

White Paper

Library Release Date

Focus Areas

Data Governance & Security

Abstract

Public disclosures of data “indiscretions” have become regular enough and embarrassing enough that many organizations are exploring encryption options to simply stay out of the headlines. However getting the most out of encryption involves much more than purchasing a device with encryption features and connecting it to an existing storage infrastructure. Existing management and control structures will need to evolve, information locations changed, and support is even required from the legal department! This paper defines a nine-step process that should be performed to effectively implement at-rest data encryption. While not all steps will be needed in all cases, they each merit consideration in every case