<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>encryption | KC's Blog</title>
	<atom:link href="https://www.kjctech.net/tag/encryption/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.kjctech.net</link>
	<description></description>
	<lastBuildDate>Sat, 22 Mar 2025 05:22:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/12/cropped-KC-Logo.png?fit=32%2C32&#038;ssl=1</url>
	<title>encryption | KC's Blog</title>
	<link>https://www.kjctech.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">24634607</site>	<item>
		<title>Encrypting Disks with BitLocker in PowerShell</title>
		<link>https://www.kjctech.net/encrypting-disks-with-bitlocker-in-powershell/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=encrypting-disks-with-bitlocker-in-powershell</link>
					<comments>https://www.kjctech.net/encrypting-disks-with-bitlocker-in-powershell/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Fri, 23 Jun 2023 00:22:52 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[powershell]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=5085</guid>

					<description><![CDATA[<p>When I need to turn on BitLocker on either a system drive or an external USB drive, I usually just right-click the drive, choose Turn on BitLocker, and then follow the wizard. It works pretty well and does what I need. What I didn&#8217;t know is that there are a lot more options you can choose from when you do [&#8230;]</p>
The post <a href="https://www.kjctech.net/encrypting-disks-with-bitlocker-in-powershell/">Encrypting Disks with BitLocker in PowerShell</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>When I need to turn on BitLocker on either a system drive or an external USB drive, I usually just right-click the drive, choose Turn on BitLocker, and then follow the wizard. It works pretty well and does what I need. What I didn&#8217;t know is that there are a lot more options you can choose from when you do so using PowerShell.</p>



<p>For example, there is more than just one encryption method you can use. With -EncryptionMethod, you can specify one of 4 methods to encrypt your drive, AES128, AES258, XtsAes128, or XtsAes256.</p>



<pre class="wp-block-preformatted">Enable-BitLocker -MountPoint "c:" -EncryptionMethod Aes256 -RecoveryKeyPath "E:\Recovery\" -RecoveryKeyProtector</pre>



<p>You can also enable BitLocker with a specified AD user account so that when a user accesses the encrypted drive, they will get prompted for credentials for that account.</p>



<pre class="wp-block-preformatted">Enable-BitLocker -MountPoint "C:" -EncryptionMethod Aes128 -AdAccountOrGroup "Western\SarahJones" -AdAccountOrGroupProtector</pre>



<p>Have you ever wondered what is wrong with my BitLocker drive that has a warning sign?</p>



<figure class="wp-block-image size-full"><img data-recalc-dims="1" decoding="async" width="306" height="101" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image.png?resize=306%2C101&#038;ssl=1" alt="" class="wp-image-5086" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image.png?w=306&amp;ssl=1 306w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image.png?resize=250%2C83&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image.png?resize=100%2C33&amp;ssl=1 100w" sizes="(max-width: 306px) 100vw, 306px" /></figure>



<p><strong><em>Get-BitLockerVolume</em></strong> tells you everything.</p>



<figure class="wp-block-image size-large"><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?ssl=1" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" fetchpriority="high" decoding="async" width="600" height="107" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=600%2C107&#038;ssl=1" alt="" class="wp-image-5087" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=600%2C107&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=450%2C80&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=250%2C45&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=768%2C137&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=700%2C125&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=520%2C93&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=360%2C64&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?resize=100%2C18&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-1.png?w=819&amp;ssl=1 819w" sizes="(max-width: 600px) 100vw, 600px" /></a></figure>



<p>Aha&#8230;it&#8217;s because the Protection is off. Let&#8217;s Resume-BitLocker it.</p>



<figure class="wp-block-image size-large"><img data-recalc-dims="1" decoding="async" width="600" height="169" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=600%2C169&#038;ssl=1" alt="" class="wp-image-5088" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=600%2C169&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=450%2C127&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=250%2C71&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=768%2C217&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=700%2C198&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=520%2C147&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=360%2C102&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?resize=100%2C28&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-2.png?w=829&amp;ssl=1 829w" sizes="(max-width: 600px) 100vw, 600px" /></figure>



<p>What&#8217;s my encrypted system drive&#8217;s recovery password?</p>



<pre class="wp-block-preformatted">(Get-bitlockervolume -MountPoint "C:").KeyProtector</pre>



<p>Can I save it to Active Directory so I don&#8217;t have to keep the file? Sure thing.</p>



<pre class="wp-block-preformatted">Backup-BitLockerKeyProtector -MountPoint "C" -KeyProtectorId (Get-bitlockervolume -MountPoint "C:").KeyProtector[1].KeyProtectorId</pre>



<p>But whoops, it says &#8220;Group Policy does not permit the storage of recovery information to Active Directory&#8221;. What to do?</p>



<p>There are two policies you will need to change here. Open the policy assigned to the GPO, and go to the following location.</p>



<pre class="wp-block-preformatted">Computer Configuration &gt; Policies &gt; Administrative Templates &gt; Windows Components &gt; BitLocker Drive Encryption</pre>



<p>And enable the policy called <strong><em>Store BitLocker Recovery information in Active Directory Domain Services</em></strong></p>



<p>Then go to one of the following sub-locations of BitLocker Drive Encryption, whichever one you would be using.</p>



<ul class="wp-block-list">
<li>Fixed Data Drives</li>



<li>Operating System Drives</li>



<li>Removable Data Drives</li>
</ul>



<figure class="wp-block-image size-full"><img data-recalc-dims="1" loading="lazy" decoding="async" width="357" height="123" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-3.png?resize=357%2C123&#038;ssl=1" alt="" class="wp-image-5089" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-3.png?w=357&amp;ssl=1 357w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-3.png?resize=250%2C86&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2023/06/image-3.png?resize=100%2C34&amp;ssl=1 100w" sizes="auto, (max-width: 357px) 100vw, 357px" /></figure>



<p>And enable the policy called <strong><em>Choose how BitLocker-protected operating system drives can be recovered</em>.</strong></p>



<p>If it still doesn&#8217;t work, you may have to install the BitLocker management tools on the AD server.</p>



<pre class="wp-block-preformatted">Install-WindowsFeature BitLocker -IncludeAllSubFeature -IncludeManagementTools</pre>



<p>With GPO configured to save the BitLocker keys to AD, we can enable BitLocker and save the keys directly to AD in PowerShell.</p>



<pre class="wp-block-preformatted">Add-BitLockerKeyProtector -MountPoint C: -RecoveryPasswordProtector | Out-Null<br>Enable-BitLocker -MountPoint C: -TpmProtector -EncryptionMethod Aes256 -SkipHardwareTest</pre>The post <a href="https://www.kjctech.net/encrypting-disks-with-bitlocker-in-powershell/">Encrypting Disks with BitLocker in PowerShell</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/encrypting-disks-with-bitlocker-in-powershell/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5085</post-id>	</item>
		<item>
		<title>HTTPS, HSTS, SSL, Encryption, DV, EV, OV, etc.</title>
		<link>https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=https-hsts-ssl-encryption-dv-ev-ov-etc</link>
					<comments>https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Fri, 09 Mar 2018 23:32:15 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=3849</guid>

					<description><![CDATA[<p>Here is a list of good writeups, by a couple awesome security experts, Troy Hunt &#38; Scott Helme, about https, SSL, HSTS, encryption, DV, EV, OV, and anything related to that matter. Life is about to get a whole lot harder for websites without HTTPS &#8211; Troy Hunt It&#8217;s taken us a while, but finally we&#8217;re getting to a &#8220;secure [&#8230;]</p>
The post <a href="https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/">HTTPS, HSTS, SSL, Encryption, DV, EV, OV, etc.</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>Here is a list of good writeups, by a couple awesome security experts, <a href="https://www.troyhunt.com" target="_blank" rel="noopener">Troy Hunt</a> &amp; <a href="https://scotthelme.co.uk/" target="_blank" rel="noopener">Scott Helme</a>, about https, SSL, HSTS, encryption, DV, EV, OV, and anything related to that matter.</p>
<p><a href="https://www.troyhunt.com/life-is-about-to-get-harder-for-websites-without-https/">Life is about to get a whole lot harder for websites without HTTPS</a> &#8211; Troy Hunt</p>
<blockquote>
<p>It&#8217;s taken us a while, but finally we&#8217;re getting to a &#8220;secure by default&#8221; web!</p>
</blockquote>
<p><a href="https://www.troyhunt.com/new-pluralsight-course-what-every-developer-must-know-about-https/">What Every Developer Must Know about HTTPS</a> &#8211; Troy Hunt</p>
<blockquote>
<p>So that&#8217;s what I&#8217;ve created and <a href="https://app.pluralsight.com/library/courses/https-every-developer-must-know/">I&#8217;m <em>enormously</em> happy to now see it up live on Pluralsight</a>. If you&#8217;ve not tried them before, you can <a href="https://www.pluralsight.com/pricing">get into it for less than $1 a day</a> and gain immediate access to thousands of courses, including some very good content on HTTPS</p>
</blockquote>
<p><a href="https://www.troyhunt.com/i-wanna-go-fast-https-massive-speed-advantage/">I wanna go fast: HTTPS&#8217; massive speed advantage</a> &#8211; Troy Hunt</p>
<blockquote>
<p>This is all simply a test of &#8220;what&#8217;s the fastest we can go over HTTP versus what&#8217;s the fastest we can go over HTTPS&#8221;. I don&#8217;t want fair, I want fast. If you wanna go fast, serve content over HTTPS using HTTP/2.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/journey-to-an-extended-validation-certificate/">A Journey to Get an EV</a> &#8211; Troy Hunt</p>
<p>It&#8217;s a 14-page long journey Troy took to get a green EV for Have I been Pwned. Does it worth the effort?</p>
<blockquote>
<p>This whole EV cert thing is hard to measure in terms of value; I have no idea how many more people will put their email address into HIBP or how much more media or good will or donations it will get. No idea at all.</p>
<p>But what I do know is that it adds transparency and legitimacy to a realm that as I mentioned earlier, tends to be inhabited by a lot of shady characters and that&#8217;s gotta count for something.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/on-the-perceived-value-ev-certs-cas-phishing-lets-encrypt/">On the Value of EV Certs, Commercial CAs, Phishing and Let&#8217;s Encrypt</a> &#8211; Troy Hunt</p>
<blockquote>
<p>The bottom line is that as of today, the effectiveness of EV certs is entirely dependent on people recognising what they mean <em>and</em> actually adapting their behaviour accordingly. It&#8217;s hard to argue with that.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/are-ev-certificates-worth-the-paper-theyre-written-on/">Are EV certificates worth the paper they&#8217;re written on?</a> &#8211; Scott Helme</p>
<blockquote>
<p>I&#8217;m not opposed to the idea or the value of EV certificates but right now they just seem like a nice revenue stream for CAs. The technical and user issues outlined above need to be addressed before EV can have <em>real</em> value. The amount of information and mis-information surrounding them really doesn&#8217;t help and there&#8217;s also some pretty wild claims from CAs about what EV can do.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/debunking-the-fallacy-that-paid-certificates-are-better-than-free-certificates-and-other-related-nonsense/">Debunking the fallacy that paid certificates are better than free ones</a> &#8211; Scott Helme</p>
<blockquote>
<p>When you look at a certificate the only thing we really care about is whether or not the browser is going to accept it, we care if the certificate is valid. To be valid there are various technical criteria outlined above regarding it&#8217;s format, the fields it contains and the data inside them that must be met. There&#8217;s also criteria around how it was issued that the CA must adhere to and all of this plays a part in the ultimate determination made by the browser about the certificate itself. Whether or not anyone handed over some hard-earned cash to purchase the certificate simply does not matter one bit. The browser doesn&#8217;t even have knowledge of whether that happened and there&#8217;d be no way and no need for it to do so. <strong>There&#8217;s absolutely no difference between a free certificate and one that you had to shell out some cash for</strong>.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/do-ssl-warranties-protect-you-as-much-as-rocks-keep-tigers-away/">Do SSL warranties protect you?</a> &#8211; Scott Helme</p>
<blockquote>
<p>All in all, the idea of a warranty on a certificate just seems like some marketing fluff for the CA to add to their sales page. The chances of this being useful are close to non-existent and there doesn&#8217;t appear to be a viable way for a consumer to prove the certificate was the cause anyway.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/certificate-transparency-an-introduction/">Certificate Transparency, an introduction</a> &#8211; Scott Helme</p>
<blockquote>
<p>Certificate Transparency is an open framework for monitoring and auditing the certificates issued by Certificate Authorities in near real-time. By requiring a CA to log all certificates they generate, site owners can quickly identify mis-issued certificates and it becomes much easier to detect a rogue CA.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/hsts-the-missing-link-in-tls/">HSTS &#8211; The missing link in Transport Layer Security</a> &#8211; Scott Helme</p>
<blockquote>
<p>HSTS allows for a more effective implementation of TLS by ensuring all communication takes place over a secure transport layer on the client side. Most notably HSTS mitigates variants of man in the middle (MiTM) attacks where <a title="Using SSLstrip to MiTM SSL" href="https://scotthel.me/pineapplesslstrip" target="_blank" rel="noopener">TLS can be stripped out of communications </a>with a server, leaving a user vulnerable to further risk.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/understanding-http-strict-transport/">Understanding HTTP Strict Transport Security and preloading it into the browser</a> &#8211; Troy Hunt</p>
<blockquote>
<p>As HTTPS becomes more ubiquitous across the web, this feature should really start to gain traction and hopefully initiatives like <a href="https://letsencrypt.org/">Let’s Encrypt</a> will help expedite that (note also that this is now being reported as “Arriving September 2015”). It’s good times for those wanting to further protect their web assets and not so good for those wanting to intercept other people’s traffic.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/the-6-step-happy-path-to-https/">The 6-Step &#8220;Happy Path&#8221; to HTTPS</a> &#8211; Troy Hunt</p>
<blockquote>
<ol>
<li>Get a free cert</li>
<li>Add a 301 &#8220;Permanent Redirect&#8221;</li>
<li>Add HSTS</li>
<li>Change Insecure Scheme References</li>
<li>Add the upgrade-insecure-recquests CSP</li>
<li>Monitor CSP reports</li>
</ol>
</blockquote>
<p><a href="https://www.troyhunt.com/5-ways-to-implement-https-in/">5 ways to implement HTTPS in an insufficient manner</a> &#8211; Troy Hunt</p>
<blockquote>
<p>it doesn’t matter how many pages you’re loading securely or how many padlock icons or vendor certifications you drop on the site, once you start sending auth cookies around insecurely, you’re toast. It’s <em>completely</em> pointless to secure those personal details in transit but then let the auth cookie <em>which can load them back up</em> float around in the clear. That is a very insufficient use of HTTPS indeed.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/5-ways-to-tackle-insufficient-https/">5 ways to tackle an insufficient HTTPS implementation</a> &#8211; Troy Hunt</p>
<blockquote>
<p>The simpe way of doing this is for HTTPS everywhere</p>
</blockquote>
<p><a href="https://www.troyhunt.com/ssl-is-not-about-encryption/">SSL is not about encryption</a> &#8211; Troy Hunt</p>
<blockquote>
<p>It’s about assurance. It’s about establishing a degree of trust in a site’s legitimacy that’s sufficient for you to confidently transmit and receive data with the knowledge that it’s reaching its intended destination without being intercepted or manipulated in the process.</p>
</blockquote>
<p>Cheat Sheets &#8211; Scott Helme</p>
<ul>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/csp-cheat-sheet/">CSP Cheat Sheet</a></div>
</li>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/hsts-cheat-sheet/">HSTS Cheat Sheet</a></div>
</li>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/hpkp-cheat-sheet/">HPKP Cheat Sheet</a></div>
</li>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/https-cheat-sheet/">HTTPS Cheat Sheet</a></div>
</li>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/performance-cheat-sheet/">Performance Cheat Sheet</a></div>
</li>
</ul>
<p><a href="https://www.troyhunt.com/heres-why-your-static-website-needs-https/">Here is why your static website needs HTTPS</a> &#8211; Troy Hunt</p>
<blockquote>
<p>So that&#8217;s precisely what I&#8217;ve done &#8211; intercepted my own traffic passed over an insecure connection and put together a string of demos in a 24-minute video explaining why HTTPS is necessary on a static website. Here&#8217;s the video and there&#8217;s references and code samples for all the demos used immediately after that:</p>
<p><div class="jetpack-video-wrapper"><iframe loading="lazy" title="Here&#039;s Why Your Static Website Needs HTTPS" width="640" height="360" src="https://www.youtube.com/embed/_BNIkw4Ao9w?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</p>
</blockquote>
<h2>Some other useful resources</h2>
<p><a href="https://doesmysiteneedhttps.com/">Does My Site Need HTTPS</a></p>
<p><a href="https://istlsfastyet.com/">Is TLS Fast Yet</a></p>
<p><a href="https://www.httpvshttps.com/">HTTP vs HTTPS Test</a></p>
<p><a href="https://haveibeenpwned.com/">Have you been pwned</a> &#8211; Troy Hunt</p>
<p><a href="https://report-uri.com/">Report Uri</a> &#8211; Scott Helme</p>
<p><a href="https://securityheaders.io">Security Headers</a> &#8211; Scott Helme &#8211; check your headers for things like HSTS and HPKP</p>
<p><a href="https://www.ssllabs.com/ssltest/index.html">The infamous SSL Labs</a> &#8211; to check your config</p>The post <a href="https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/">HTTPS, HSTS, SSL, Encryption, DV, EV, OV, etc.</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3849</post-id>	</item>
		<item>
		<title>The VMware vSphere Virtual Machine Encryption Whitepaper</title>
		<link>https://www.kjctech.net/the-vmware-vsphere-virtual-machine-encryption-whitepaper/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-vmware-vsphere-virtual-machine-encryption-whitepaper</link>
					<comments>https://www.kjctech.net/the-vmware-vsphere-virtual-machine-encryption-whitepaper/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Thu, 24 Nov 2016 06:03:09 +0000</pubDate>
				<category><![CDATA[VMware]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Whitepaper]]></category>
		<guid isPermaLink="false">http://www.kjctech.net/?p=3362</guid>

					<description><![CDATA[<p>VMware vSphere virtual machine encryption (VM encryption) is a feature introduced in vSphere 6.5 to enable the encryption of virtual machines. VM encryption provides security to VMDK data by encrypting I/Os from a virtual machine (which has the VM encryption feature enabled) before it gets stored in the VMDK. Concerning about the performance impact that might be? Check out the VM [&#8230;]</p>
The post <a href="https://www.kjctech.net/the-vmware-vsphere-virtual-machine-encryption-whitepaper/">The VMware vSphere Virtual Machine Encryption Whitepaper</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>VMware vSphere virtual machine encryption (VM encryption) is a feature introduced in vSphere 6.5 to enable the encryption of virtual machines. VM encryption provides security to VMDK data by encrypting I/Os from a virtual machine (which has the VM encryption feature enabled) before it gets stored in the VMDK.</p>
<p>Concerning about the performance impact that might be? Check out the <a href="http://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/techpaper/vm-encryption-vsphere65-perf.pdf" target="_blank" rel="noopener">VM Encryption Performance Whitepaper</a> by VMware to find out.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-3363" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart-600x517.png?resize=600%2C517" alt="vmware-encryption-chart" width="600" height="517" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?resize=600%2C517&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?resize=250%2C215&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?resize=450%2C387&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?resize=768%2C661&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?resize=700%2C603&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?resize=520%2C448&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?resize=360%2C310&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?resize=100%2C86&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/11/VMware-Encryption-Chart.png?w=992&amp;ssl=1 992w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p>In short, according to the Executive Summary in the whitepaper, We show that while VM encryption can lead to bottlenecks in I/O throughput and latency for ultra-high-performance devices (like a high-end NVMedrive) that can support hundreds of thousands of IOPS, for most regular types of storage, like enterprise class SSD or VMware vSAN<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, the impact on I/O performance is very minimal.</p>The post <a href="https://www.kjctech.net/the-vmware-vsphere-virtual-machine-encryption-whitepaper/">The VMware vSphere Virtual Machine Encryption Whitepaper</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/the-vmware-vsphere-virtual-machine-encryption-whitepaper/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3362</post-id>	</item>
	</channel>
</rss>
