Self-encrypting Drives (SED) Overview
Self-Encrypting Drive Use Cases: Lost, Stolen, Re-purposed, End-of-Life, Warranty Repair: Whenever the Stored Data Leaves the Owners Control.
Self-encryption is superior to Software-based Solutions.
- Transparency: No system or application modifications required; encryption key generated in the factory by on-drive random number process; drive is always encrypting
- Ease of management: No encryption key to manage; software vendors exploit standardized interface to manage SEDs, including remote management, pre-boot authentication, and password recovery
- Disposal or re-purposing cost: With an SED, erase on-board encryption key
- Re-encryption: With SED, there is no need to ever re-encrypt the data
- Performance: No degradation in SED performance; hardware-based
- Standardization: Whole drive industry is building to the TCG/SED Specifications
- Simplified: No interference with upstream processes