How do I encrypt my data? (Interim)
Overview
Encryption encodes information in such a way that unauthorized parties should be unable to read it. This helps to prevent compromises to the confidentiality and integrity of your data and is a part of robust, multi-layered security approach. Whether it is a compromised desktop, or a lost mobile or storage devices, encryption ensures that your data remains accessible to only you and your team.
What you can do
- Determine your research data’s classification: Data classification
- Level 3 and level 4 data must be stored on a secure server or must be encrypted at rest on a laptop, mobile device, or removeable storage.
- Enable or install full-disk encryption packages based on your Operating System:
- Windows (institutionally managed): Bitlocker.
- Pre-installed but might need to be enabled.
- Contact your Local IT group.
- Windows (self-managed): Bitlocker.
- Pre-installed but might need to be enabled.
- Windows support page.
- MacOS: Filevault.
- Pre-installed but might need to be enabled.
- Apple support page.
- Linux: Various options; distribution dependent.
- Contact your Local IT group for assistance managing encryption on Linux systems.
- Common solutions include Linux Unified Key Setup (LUKS) and GNU Privacy Guard (GnuPG).
- Android: File-based encryption by default when lock screen enabled.
- iOS: File-based encryption by default when lock screen enabled.
- Cross-platform: Various options.
- Contact your Local IT group for assistance managing encryption through other third-party options.
- Common solutions include VeraCrypt.
- Windows (institutionally managed): Bitlocker.
- Encrypt at the file or folder level (Note: ZIP files can be transferred across platforms):
- Windows: 7-zip
- MacOS: Encrypted DMG (MacOS only) or ZIP files.
- ZIP: zip-e command.
- DMG: Scroll to “Create a secure disk image”.
- Linux: Contact your Local IT group for assistance.
- Common solutions include: GNU Privacy Guard (GnuPG), p7zip, and zip -e command.
- Cross-platform: Contact your Local IT group for assistance.
- Use a self-encrypting device (SED) to supplement full-disk or file level encryption:
- Servers: If possible, order SED storage drives and motherboards supporting Trusted Platform Module (TPM).
- External Drive examples: IronKey Vault Privacy 80 External SSD or Samsung T7
- USB Key examples: Kingston IronKey Locker+ 50
- Contact your Local IT group for assistance or other available solutions.