"What happens if your servers or laptops or disks are stolen? Can the data still be accessed? The answer is 'No' if you have full disk encryption set up right."


In today's threat landscape, encrypting data is not optional; rather, it's foundational. While different use cases and applications require various levels of encryption, disk-level encryption, also known as FDE - Full Disk Encryption, has become the de facto standard for securing data at rest. Suppose you run Linux systems or any big data workloads. In that case, you’ve probably heard of LUKS (Linux Unified Key Setup), dm-crypt (device mapper encryption), or even NBDE (Network Bound Disk Encryption). Let’s break down what these are, why they matter, and when you should use them.


What are the different types of Encryption?


Application-level data encryption


Database Encryption


File system level encryption


Full Disk Encryption (FDE)


In following sections, we will discuss Full Disk encryption with LUKS (Linux Unified Key Setup) and strengthen it using NBDE (Network Based Disk Encryption).


Linux Unified Key Setup (LUKS)


Fig: LUKS - Full Disk Encryption


LUKS Setup

The following documentation shows step by step guidance to setup LUKS on Redhat Linux systems.

https://www.redhat.com/en/blog/disk-encryption-luks


What is LUKS not suitable for?


Differences between LUKS and dm-crypt


LUKSdm-crypt
License GPL YesYes
Change password without re-encrypting YesNo
Defense against low entropy passphrase (against dictionary attacks) Salting and Hashing YesNo
Multiple decryption keys for same encrypted data YesNo
Keys recovery mechanism YesNo
Store encryption settingsYesNo


Secure Key Files

  1. TPM 2.0 (Trusted Platform Module) integration
  2. Integrate with custom-built key storage
  3. Different disks/Mounting points or the Main disk. And of course, this can't be removed easily.
  4. HSM (Hardware Security Module)
  5. NBDE (Network Bound Disk Encryption). Which is the preferred, secure, and automated way for production systems. NBDE is available in RHEL 7.4 onwards.


Network Bound Disk Encryption (NBDE):

NBDE offers asymmetric cryptography, it allows a machine with an encrypted disk to boot, without the disk's encryption, where the key has to be entered at boot time. But only when the machine is on the correct network, and without storing the encryption key in plain text, or storing it off the machine, or transmitting data across the network in such a way that a thief could make use of it.


LUKS + NBDE offers more security with auto/easier way to manage disk encryption/decryption at boot at high level, NBDE has following concepts.

  1. CLEVIS - Pluggable framework for automated decryption. in NBDE, Clevis provides automated unlocking of LUKS volumes
  2. CLEVIS Pin - is a plug-in into Clevis framework. Implements interactions with TANG server
  3. TANG - Stateless, secure network based data recovery service. TANG is not an escrow server, nothing saved on the server


Fig: Network Bound Disk Encryption (NBDE)


Key Points

Security Model: The system leverages asymmetric cryptography so that disk decryption is only possible when the machine is connected to the correct network (where the Tang server is accessible), without needing to store decryption keys locally or transmit them insecurely.

Automation: NBDE enables automated unlocking of encrypted volumes at boot, reducing manual intervention and improving security for data-at-rest in unattended server environments.

Modularity: Clevis is designed as a flexible framework, allowing other pins (not just Tang) for different unlocking scenarios or hardware integrations.

Statelessness: The Tang server does not retain any secrets or escrow keys, protecting against central server compromise.


Layered Workflow

  1. The client (Clevis) initiates unlock during boot.
  2. Clevis uses the Tang pin to communicate with the Tang server and perform a secure key exchange.
  3. Cryptographic operations (JOSE) manage the secure ephemeral key material.
  4. LUKSMeta stores the binding and unlock logic.
  5. Upon a successful exchange, Clevis decrypts the master key and unlocks the LUKS-encrypted volume.


NBDE - Advantages


Conclusion:

If your organization handles sensitive data or operates in regulated industries, FDE with LUKS + NBDE offers a powerful, automated, and secure solution for data-at-rest protection.