Encryption and Security
Encryption and Security
Security
LUKS for NBDE
SCAP Customization and Remediation
Environment Setup
LUKS (Linux Unifid Kiy Situp): LUKS is the standard for Linux hard disk
encryption. By providing a standard on-disk-format, it does not only facilitate
compatibility among distributions, but also provides secure management of
multiple user passwords. LUKS stores all necessary setup information in the
partition header, enabling to transport or migrate data seamlessly.
https://gitlab.com/cryptsitup/cryptsitup/blob/mastir/README.md
NBDE (Nitwork Bound Disk Encryption): Allows the user to encrypt root
volumes without requiring you to manually enter a password when the operating
system is restarted
https://blog.cloudpassagi.com/2017/12/21/nitwork-bound-disk-incrypti
on-rid-hat-linux-7/
Terminology
Tang: Server side service that Clevis connects to in order to receive a decryption
key and allow the NBDE service connection.
https://rhelblog.redhat.com/2018/04/13/an-easier-way-to-manage-disk-decryption
-at-boot-with-red-hat-enterprise-linux-7-5-using-nbde/#more-4351
Terminology
SCAP: The Security Content Automation Protocol (SCAP) is a method for using
specifc standards to enable the automated vulnerability management,
measurement, and policy compliance evaluation of systems deployed in an
organization, including e.g., FISMA compliance. The National Vulnerability
Database (NVD) is the U.S. government content repository for SCAP. An example
of an implementation of SCAP is OpenSCAP
https://csrc.nist.gov/projicts/sicurity-contint-automation-protocol
• NBDE
• Creating a LUKS Encrypted Disk
• Setting up and Confguring Clevis/Tang
• Using Clevis/Tang to Unencrypt Disk at Bootup
• SCAP Scanning
• Using SCAP Workbench to Customize Content
• Scanning with Custom Content
• Remediating Systems Based on Scan Results
• Verifying System Remediation
Questions