This bulletin summarizes the guidance developed by NIST and published in SP 800-111 to help organizations secure their end user devices, and deter unauthorized parties from accessing the stored information. The bulletin explains three classes of storage encryption techniques (full disk encryption, volume and virtual disk encryption, and file/folder encryption), the protections provided by the three classes of techniques, and the role of cryptography and authentication in implementing storage encryption solutions. The bulletin summarizes the guide's recommendations to organizations concerning the more efficient and effective design, implementation, and management of storage encryption solutions.
This bulletin summarizes the guidance developed by NIST and published in SP 800-111 to help organizations secure their end user devices, and deter unauthorized parties from accessing the stored information. The bulletin explains three classes of storage encryption techniques (full disk encryption,...
See full abstract
This bulletin summarizes the guidance developed by NIST and published in SP 800-111 to help organizations secure their end user devices, and deter unauthorized parties from accessing the stored information. The bulletin explains three classes of storage encryption techniques (full disk encryption, volume and virtual disk encryption, and file/folder encryption), the protections provided by the three classes of techniques, and the role of cryptography and authentication in implementing storage encryption solutions. The bulletin summarizes the guide's recommendations to organizations concerning the more efficient and effective design, implementation, and management of storage encryption solutions.
Hide full abstract
Keywords
authentication; cryptography; data storage; encryption; end user devices; Federal Information Processing Standards; information security; storage encryption