Configure self-encrypting disks
This guide explains how to configure self-encrypting disks (SEDs) in the EDA 9300 or 10300 sensor.
SEDs continuously encrypt data written to the drive. Data on these drives is protected by requiring a key to unlock the encrypted drives before retrieving data. The drives are only protected from theft when the disks are secured.
You can configure security for virtual disks on SEDs either upon or after virtual disk creation. Secure virtual disks cannot be unsecured without erasing all data on the drive.
There are two options available for enabling security and encryption on installed drives:
- Local Key Management (LKM)
- Enable security from the PowerEdge RAID Controller (PERC) and configure a security key and passphrase that is stored locally on the controller. This method protects data in the event of physical drive theft, but not entire system theft. For more information on configuring LKM, see Security key and RAID management.
- Secure Enterprise Key Management (SEKM)
- Manage keys from a key management service and enable security on installed drives from the iDRAC9. Because keys are stored externally on a key management service, data on these drives is protected in the event of system theft. For more information on configuring SEKM, see the "PowerEdge RAID Controller (PERC)" section in the SEKM configuration and deployment guide.
After you enable either LKM or SEKM, you must encrypt your existing virtual disks.
Configure LKM on the RAID controller from the iDRAC web interface
If you prefer to secure the system with Local Key Management (LKM), you can enable
security from the RAID controller.
Next steps
Next, encrypt an existing virtual disk.Configure SEKM for drive encryption from the iDRAC web interface
If you prefer to secure the system with SEKM, you can configure security from the RAID
controller.
After restarting the server, the configuration job runs in the Automated Task
Application to enable SEKM on the PERC. The server restarts automatically.
Next steps
Next, encrypt an existing virtual disk.Encrypt a virtual disk
You can configure security for virtual disks on existing SEDs. Secure virtual disks
cannot be unsecured without erasing all data on the drive.
- Start iDRAC from any supported browser.
- From the iDRAC web interface, click Storage, and then click Overview.
- Click Virtual Disks.
- Click Encrypt Virtual Disk from the Actions list for the virtual disk to be encrypted.
- Click Add to Pending.
- Click Apply Now.
Thank you for your feedback. Can we contact you to ask follow up questions?