Recommendations for Handling Encrypted SSDs and Coordination with InfoSec

Created by Hermelindo David, Modified on Fri, 1 Nov, 2024 at 12:36 PM by Hermelindo David

To ensure that security protocols are consistently maintained, and data integrity is preserved, it’s essential that certain steps are followed before performing any actions involving encrypted drives. Below are the key recommendations for handling these processes:

 

1. Verify Encryption Status and availability of the backup of data

      Before any SSD removal or data copying:

            - Check the encryption status of the SSD by asking to infosec sharing to them the hostname of the workstation and the exact name of the drive. It iwill ensure that Infosec has a means to unlock the drive.

            - Ensure the backup of the data

           

 

2. Notify InfoSec Before Proceeding

      The  InfoSec team must be notified before any SSD removal or data migration actions take place. This helps ensure proper logging and compliance with security protocols. Please incorporate this step into your change management process for transparency.

 

3. Use Kaspersky Security Center to Suspend Encryption (If Required)

      If you need to suspend encryption to avoid issues during hardware changes temporarily:

            -Request Infosec to suspend the device's encryption. This will allow you to remove the SSD while keeping the data protected safely.

 

 

4. Reinstate Full Disk Encryption

      After completing the SSD migration or data copying, use KSC to re-enable BitLocker encryption. Verify that the encryption policy has been applied correctly to the new system.

 

5. Report Actions and Maintain Compliance

      - After completing these operations, provide a detailed log of all actions taken to InfoSec, including:

           - Devices involved

           - Any encryption suspension or recovery key usage

             - Data transfer details

            - This helps ensure that all steps are compliant with our security policies.

 

 

Lastly, I’d like to emphasize that performing these actions without prior InfoSec approval is not recommended. We need to ensure that every action taken with encrypted drives is properly communicated and compliant with security standards.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article