Requirements for IDT-Capable GuardPoints
-
IDT-Capable GuardPoints are available for Linux with CTE 6.3.1 or subsequent versions. All versions of CipherTrust Manager work with IDT-Capable GuardPoints.
-
The host server must use the Advanced Encryption Standard instruction set (AES-NI).
-
The policy assigned to the IDT-Capable GuardPoint must be an in-Place Data Transformation policy and use an XTS/CBC-CS1 AES 256 encryption key.
-
In order to create an IDT-Capable GuardPoint on a raw device, the device must be either:
-
Exported from an external storage system to the host device.
-
On a locally-attached disk.
-
-
Devices protected by an IDT-Capable GuardPoint cannot currently be initialized/added as physical volumes for use by LVM. When LVM support is added, it will be announced in the CTE Release Notes.
-
Existing devices divided into one or more logical partitions cannot be guarded as IDT-Capable Device GuardPoints. Logical partitions in such devices cannot be accessed or separately guarded after guarding the device.
For example, the logical partition
/dev/sda1
or/dev/sda2
inside/dev/sda
cannot be accessed after guarding /dev/sda as IDT-Capable GuardPoint. Using/dev/secvm/dev/sda1
is invalid as/dev/secvm/dev/sda1
is not a GuardPoint and cannot be guarded, and, as such, would not provide access to clear-text data on/dev/sda1
. However, you can guard individual partitions, such as/dev/sda1
or/dev/sda2
, as IDT-Capable GuardPoints without guarding the entire/dev/sda
device. -
IDT-Capable GuardPoints requires XTS-AES mode of the AES algorithm for encryption.
-
CTE only supports IDT on servers with microprocessors integrated with Advanced Encryption Standard instruction set (AES-NI).