What is VMware Encryption for Data-at-Rest?
VMware vSphere encryption for data-at-rest has two main components, vSphere VM encryption and vSAN encryption. Both only require the vCenter vSphere Server, a third-party Key Management Server (KMS), and ESXi hosts to work. It is standards-based, KMIP compatible, and easy-to-deploy.
Data security is paramount for sensitive data-at-rest. Fortunately, protecting your data in VMware is relatively easy with the introduction of vSphere VM encryption in version 6.5 and vSAN encryption in version 6.6. Even better, for most folks, you won’t have to choose between each option, you will likely use both as needed. That said, there are some times when you might prefer one over the other. With that in mind, here are some of the features for each and how they are the same/different.
vSphere VM | vSAN | |
AES-256 encryption | Yes | Yes |
KMIP compatibility | Yes | Yes |
FIPS 140-2 compliant | Yes | Yes |
Common Criteria compliant | Yes (ESXi 6.7) | Yes (ESXi 6.7) |
centralized encryption policy management | Yes | Yes |
Centralized encryption key management (KMS) | Yes | Yes |
Datastore encryption | No | Yes |
per-VM encryption | Yes | No |
Each VM has a unique key | Yes | n/a |
Encryption occurs before deduplication | Yes | No |
Encryption occurs after deduplication | No | Yes |
One of the most clear cut cases on preferring one encryption option or the other is in a multi-tenant situation. VMware gives these examples:
Engineering and Finance may have their own key managers and would require their VM's to be encrypted by their respective KMS. Or maybe your company has been merged with another company, each with their own KMS. Additionally, you may have a "Coke & Pepsi" scenario of two unrelated tenants. VM Encryption can handle this use case using the API or PowerCLI Modules for VM Encryption.
Beyond that, VMware notes that “vSAN has unique capabilities for some workloads and may perform better in those situations.” So, if you are protecting larger datastores with a single tenant, vSAN would be your best option.
With these distinctions in mind, here is the best news: They are equally easy to set up! We have put together two videos to highlight the steps to get encryption enabled in each environment:
For a more detailed look at vSphere VM encryption, please visit our post: vSphere Encryption—Creating a Unified Encryption Strategy. Here is a partial list of steps for enabling vSphere VM encryption:
For a more detailed look at vSAN encryption, please visit our post: vSAN Encryption: Locking your vSAN Down. Here is a partial list of steps for enabling vSAN encryption:
vSphere VM and vSAN encryption for data-at-rest is a powerful tool in protecting your sensitive data - for both companies and VMware Cloud Providers. It is standards-based, policy-based, and KMIP compliant. This makes it both powerful and easy to enable. While each has different strengths that make them a better choice in some situations; most of the time, it will just come down to needing to either secure data in a VM or vSAN datastore.
If you have sensitive data in VMware and are not encrypting, enable encryption today! We are happy to help.