Presentation is loading. Please wait.

Presentation is loading. Please wait.

What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd

Similar presentations


Presentation on theme: "What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd"— Presentation transcript:

1 What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd http://blogs.technet.com/steve_lamb mailto://stephlam@microsoft.com

2 What is IT Pro Momentum? A program to recruit early adopters Provides you with free support and training Share your story and influence the next wave of early adopters Rewards you with a free TechNet Direct subscription

3 More information? For more information on the IT Pro Momentum Program or to nominate someone e-mail: Steve Lamb Stephen.lamb@microsoft.com

4 “BitLocker Drive Encryption provides stronger protection for data stored on your Windows Vista ™ systems – even when the system is in unauthorized hands or is running a different or attacking OS. BitLocker does this by utilizing full volume encryption; this prevents a thief who boots another OS or runs a software disk inspection tool from breaking Vista file and system protections or even the offline viewing of data files.”

5 BitLocker Drive Encryption BitLocker Drive Encryption fully encrypts the entire Windows Vista volume. Designed specifically to prevent the unauthorized disclosure of data when it is at rest. Provides data protection on your Windows client systems, even when the system is in unauthorized hands. Designed to utilize a v1.2 Trusted Platform Module (TPM) for secure key storage and boot environment authentication BitLocker BitLocker

6 Protects secrets Performs cryptographic functions RSA, SHA-1, RNG Meets encryption export requirements Can create, store and manage keys Provides a unique Endorsement Key (EK) Provides a unique Storage Root Key (SRK) Performs digital signature operations Holds Platform Measurements (hashes) Anchors chain of trust for keys and credentials Protects itself against attacks TPM 1.2 spec: www.trustedcomputinggroup.org What is a Trusted Platform Module? It’s a Smartcard-like module on the motherboard

7 Why use a TPM 1.2 chip? The TPM solves the ‘where do we put the encryption key?’ problem Hardware can be made to be robust against attacks Certified to be tamper resistant Provides anti-hammering capabilities A TPM is an implementation of a Root-of-Trust Enables implementation of the Static Root of Trust Measurement Hardware based solution more secure than software one Difficult to root trust in software that has to validate itself

8 Static Root of Trust Measurement

9 BitLocker disk layout

10 Spectrum of Protection BitLocker offers a spectrum of protection allowing customers to balance ease-of-use against the threats they are most concerned with.

11 An integrated solution BitLocker is integrated in WMI and Group Policy Enables customizable, automated deployment BitLocker automatically escrow keys and passwords into AD Centralized storage/management keys Recovery console built into the new Vista boot architecture Recovery can occur “in the field” Windows operation can continue as normal after a recovery

12 Further information? Web Resources: Specs & Whitepapers: www.microsoft.com/technet/windowsvista/security/bitlockr.mspx TCG: www.trustedcomputinggroup.org BitLocker™ Questions or Ideas: BDEInfo@microsoft.com

13

14 ©2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.


Download ppt "What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd"

Similar presentations


Ads by Google