Organizations we support
Military
Defense Community
Sensitive and Classified Materials at the Edge
Intel (2)
Intelligence and Special Ops Community
Secret Data in Extreme Environments
FedCiv-2
Federal Civilian Solutions
Protection of Sensitive Data from Lost Device and Remote Attacks
Devices we protect
Frame 84
Servers / Enterprise
Frame 85
External Media
Industrial Control Systems
Industrial Control Systems
Frame 87(1)
Unmanned Vehicles
Portfolio
Products
Who we partner with
Handshake
Partnership
Cigent Ecosystem of Device and Service Partners
Resources
Downloadable Assets
Whitepapers, eBooks, Infographics, and More
Blog
Read articles on all things cyber security.
Learn More About Cigent
News from Cigent
4 min read
Edge computing demands robust security to protect ..
4 min read
Data destruction, data erasure, and disk cloning ..
Menu Close

5 Limitations of Full Disk Encryption

June 19, 2023 3 minute read

Protecting critical data is more crucial now than it has ever been. The FBI received a record 791,790 cybercrime complaints in 2020, resulting in more than $4.1 billion in losses. Businesses must take steps to prevent data breaches, but determining how to do so isn’t always easy. Decision-makers will likely encounter many resources recommending encryption, but encryption comes in many forms. One of the most straightforward and seemingly secure is full disk encryption (FDE). But despite how it sounds, it’s often not as secure as people may think.

What Is Full Disk Encryption?

Like any type of encryption, FDE converts data into unreadable gibberish, rendering it virtually useless to hackers. FDE is a type of hard drive encryption, which applies this process to any information in a computer’s storage. If someone wants to access or read this data, they’ll need a password from whoever enacted the encryption, making it off-limits to unauthorized users.

Where FDE differs from other types of hard drive encryption is its scale. Instead of encrypting files on an individual level, it encodes the entire drive. Every file on a drive, as well as the operating system, will receive this treatment. Some forms of FDE will encrypt the master boot record, too, but most don’t.

While full disk encryption sounds reliable upfront, it can give users a false sense of security. Here are five of its most significant limitations.

1. FDE Doesn’t Protect Data in Transit

The most substantial of FDE’s limits is that it only protects data at rest. In other words, it keeps users’ files on a given hard drive private, but not incoming or outgoing data. It won’t encrypt information from external drives, emails, or cloud storage.

In today’s workspaces, sensitive information rarely stays in one place. Teams communicate over email and cloud services routinely, and FDE won’t protect these data transfers that workers increasingly rely on. As such, FDE alone is insufficient to protect all data within a modern workplace.

2. FDE Can Slow Processes

Another shortcoming of full disk encryption is that it can hinder productivity. Any form of encryption can make it take longer to access data, as devices must decrypt a file to read it. This isn’t an issue most of the time, given the power of modern devices, but since FDE also encrypts the operating system, it can slow the system.

Slower speeds will make teams less productive, leading to frustration and, in turn, mistakes. Employees annoyed with the insufficient speed of their devices may pay less attention to any risks that emerge, making them vulnerable to other threats.

3. FDE Is Only as Strong as Its Password

Unlike some other forms of encryption, FDE relies on user-created passwords to lock and unlock files. As such, FDE opens itself to password vulnerabilities. A weak password could let hackers unencrypt protected data with ease, rendering FDE virtually useless.

Strong password management can mitigate this issue, but most people don’t practice safe password habits. According to a 2019 Google study, 66% of American internet browsers use the same password across multiple accounts. Perhaps more troublingly, only 45% would change their password after a data breach.

4. FDE Doesn’t Apply When Files Are in Use

Just as full disk encryption doesn’t encrypt data in transit, it doesn’t protect files currently in use, either. When an authorized user opens an FDE-encrypted file, they decrypt it, and it encrypts again once they log out. That means this data could be vulnerable while users are working with it.

Many programs and malware strains can give cybercriminals remote access to users’ devices. Remote threat actors could then wait for employees to open an encrypted file, viewing or stealing the data once it’s open and unencrypted. Similarly, if a cybercriminal stole or guessed a worker’s login credentials, they could access these files fairly easily.

5.FDE Is Only Effective If Applied Consistently

FDE is vulnerable to user errors beyond poor password management, too. Businesses today rarely store data in a single location, but they may not apply the same level of encryption across all drives. If a company applies FDE to their primary storage but not their backups, it does little to protect that data.

After applying FDE to primary devices, companies may feel they’re secure, causing them to overlook backups and other security considerations. Consequently, they could be vulnerable without their knowledge, thanks to this false sense of security.

Understand FDE’s Risks to Stay Secure

Full disk encryption is not inherently risky, but it’s not a comprehensive security measure, either. User error and failure to understand its limits can render data vulnerable despite encryption. Businesses must understand these risks to develop an appropriate data security plan.

No one solution is perfect in cybersecurity. Rather, companies must understand the strengths and weaknesses of each so they can use multiple strategies in tandem to create a secure environment. Only then can businesses feel secure about their data’s privacy.

Resources / Blog
More from Cigent
Adding Pre-Boot User Authentication for Sensitive Data Security
Blog 3 minute read

Adding Pre-Boot User Authentication for Sensitive Data Security

Protecting critical data is more crucial now than it has ever been. The FBI received a record...

Secure Your Critical Data with Cigent CSfC Certified Data at Rest
Blog 7 minute read

Secure Your Critical Data with Cigent CSfC Certified Data at Rest

Protecting critical data is more crucial now than it has ever been. The FBI received a record...

CMMC Compliance Made Possible: 6 Solutions for Success
Blog 3 minute read

CMMC Compliance Made Possible: 6 Solutions for Success

Protecting critical data is more crucial now than it has ever been. The FBI received a record...