Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Using Storage Encryption Technologies to Protect End User Devices

Published

Author(s)

Shirley M. Radack

Abstract

This bulletin summarizes the guidance developed by NIST and published in SP 800-111 to help organizations secure their end user devices, and deter unauthorized parties from accessing the stored information. The bulletin explains three classes of storage encryption techniques (full disk encryption, volume and virtual disk encryption, and file/folder encryption), the protections provided by the three classes of techniques, and the role of cryptography and authentication in implementing storage encryption solutions. The bulletin summarizes the guide's recommendations to organizations concerning the more efficient and effective design, implementation, and management of storage encryption solutions.
Citation
ITL Bulletin -

Keywords

Authentication, cryptography, data storage, encryption, end user devices, Federal Information Processing Standards, information security, storage encryption

Citation

Radack, S. (2007), Using Storage Encryption Technologies to Protect End User Devices, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=51291 (Accessed December 1, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created November 26, 2007, Updated January 27, 2020