Covered entities and business associates who need to comply with HIPAA encryption standards first have some high-level planning which is addressed in the post Encrypting Mobile Devices – First Create a Plan. Many organizations will choose to use Microsoft’s BitLocker since it is built into many versions of Windows and supports centralized management. But is it secure? How should it be configured and implemented?
Microsoft published an excellent whitepaper Countermeasures: Protecting Bitlocker-encrypted devices from attacks in January 2014.
This paper outlines five categories of attacks which can be used to compromise hard disk encryption:
-
Bootkit and rootkit attacks
-
Brute-force sign-in attacks
-
Direct memory access attacks
-
Hyuberfil.sys attacks
-
Memory remanence attacks

- Operating System – while Windows 8 and 8.1 have been much maligned and while enterprise adoption levels remain low, they do provide advantages over the much more popular Windows 7. Security improvements, such as the introduction of Early Launch Anti Malware (ELAM) were introduced in 8.0 and more improvements were made in 8.1. These are detailed in the whitepaper.
- Hardware considerations – whether devices include Trusted Platform Module (TPM), the newer UEFI which supports Secure Boot, and/or any DMA ports (e.g. Firewire or Thunderbolt)
- Administrative procedures – by adopting standard configuration policies which include testing that any drivers you use are recognized by the Early Launch Anti-Malware (ELAM) software you select.
Depending on your mix of operating systems and hardware environment, the Microsoft whitepaper provides specific configuration guidelines. A secure implementation will require that these guidelines be followed. Finally, other organizational policies are important – notably insuring that secure drivers be included as part of your standard configurations.
