The Lenovo Storage® V7000 Gen2 system supports optional encryption of data at rest. This support protects against the potential exposure of sensitive user data and user metadata that is stored on discarded, lost, or stolen storage devices. To use encryption on the system, an encryption license is required for each enclosure that supports encryption.
Encryption-capable refers to the ability of the system to optionally encrypt user data and metadata by using a secret key.
Encryption-disabled describes a system where no secret key is configured.
Encryption-enableddescribes a system where a secret key is configured and used. The key must be used to unlock the encrypted data enabling access control.
Access-control-enabled describes an encryption-enabled system that is configured so that an access key must be provided to authenticate with an encrypted entity, such as a secret key or flash module, to unlock and operate that entity. The system permits access control enablement only when it is encryption-enabled. A system that is encryption-enabled can optionally also be access-control-enabled to provide functional security.Protection-enabled describes a system that is both encryption-enabled and access-control-enabled. An access key must be provided to unlock the system so that it can transparently perform all required encryption-related functionality, such as encrypt on write and decrypt on read.
The Protection Enablement Process (PEP) transitions the system from a state that is not protection-enabled to a state that is protection-enabled. The PEP requires that the customer provide a secret key to access the system. This secret key must be resiliently stored and backed up externally to the system; for example, on USB flash drives. PEP is not merely activating a feature using the management GUI or CLI. To avoid loss of data that was written to the system before the PEP occurs, the customer must move all of the data to be retained off the system before the PEP is initiated. After PEP has completed, the customer must move the data back onto the system. The PEP is performed during the system initialization process, if encryption is activated. The system does not support AME.
Application-transparent encryptionis an attribute of the encryption architecture, referring to the fact that applications are not aware that encryption and protection is occurring.This is in contrast to Application Managed Encryption (AME), which is not transparent to applications, and where an application must serve keys to a storage device.
Planning for encryption involves purchasing a licensed function and then activating and enabling the function on the system.
To encrypt data that is stored on drives, the control enclosure on which they are connected must contain an active license and be configured to use encryption. When encryption is activated and enabled on the system, valid encryption keys must be present on the system when the system unlocks the drives or the user generates a new key. The encryption key must be stored on USB flash drives that contain a copy of the key that was generated when encryption was enabled. Without these keys, user data on the drives cannot be accessed.
Data encryption is protected by the Advanced Encryption Standard (AES) algorithm that uses a 256-bit symmetric encryption key in XTS mode, as defined in the IEEE 1619-2007 standard as XTS-AES-256. That data encryption key is itself protected by a 256-bit AES key wrap when stored in non-volatile form.