BITLOCKER
IMPLEMENTATION
GOMGOM SILALAHI
IT INFRASTRUCTURE & NETWORK
Q1 PROJECT
Overview
BITLOCKER AND REQUIREMENTS
PLANNING & POLICIES
DEPLOYMENT : OVERVIEW
01
02
03
BITLOCKER & REQUIREMENTS
What is Bitlocker ?
Bitlocker or BitLocker Drive Encryption is a data protection feature that integrates with
the operating system and addresses the threats of data theft or exposure from lost,
stolen, or inappropriately decommissioned computers.
BitLocker provides the most protection when used with a Trusted Platform Module
(TPM) version 1.2 or later. The TPM is a hardware component installed in many newer
computers by the computer manufacturers.
Requirements
BitLocker has the following hardware requirements:
For BitLocker to use the system integrity check provided by a Trusted Platform Module
(TPM), the computer must have TPM 1.2 or later. If your computer does not have a TPM
,enabling BitLocker requires that you save a startup key on a removable device, such as
a USB flash drive.
PLANNING & POLICIES
Planning
There are several things that we must determine when implementing
Bitlocker :
• Which drives should be encrypted and which should not be encrypted
?
• What authentication mode is used ?
• Will we support computers without TPM and not windows 10 pro ?
• What areas of Equity need a more secure level of data protection?
Planning
Planning for deployment :
A. Basic deployment
B. Deployment on Windows Server 2012 R2 or later.
Policies
There are several policies that must be defined in implementing Bitlocker:
• Are there policies to address which computers will use BitLocker and
which computers will not use BitLocker ?
• What policies exist to control recovery password and recovery key
storage?
• What are the policies for validating the identity of users that need to
perform BitLocker recovery ?
• What policies exist to control who has access to recovery data?
• What policies exist to control computer decommissioning or retirement
?
Deployement
Overview
Timeline
08-02-2021
-
15-02-2021
15-02-2021
-
26-03-2021
05-03-2021
-
24-03-2021
21-03-2021
-
30-03-2021
Prepare & audit our
environment
Deploy for small
circle (IT)
Implementation to
all environments in
Equity
Analysis & review
1 2 3 4
Thank you

bitlocker requirement and implementation.pptx

  • 1.
  • 2.
    Overview BITLOCKER AND REQUIREMENTS PLANNING& POLICIES DEPLOYMENT : OVERVIEW 01 02 03
  • 3.
  • 4.
    What is Bitlocker? Bitlocker or BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers.
  • 5.
    Requirements BitLocker has thefollowing hardware requirements: For BitLocker to use the system integrity check provided by a Trusted Platform Module (TPM), the computer must have TPM 1.2 or later. If your computer does not have a TPM ,enabling BitLocker requires that you save a startup key on a removable device, such as a USB flash drive.
  • 6.
  • 7.
    Planning There are severalthings that we must determine when implementing Bitlocker : • Which drives should be encrypted and which should not be encrypted ? • What authentication mode is used ? • Will we support computers without TPM and not windows 10 pro ? • What areas of Equity need a more secure level of data protection?
  • 8.
    Planning Planning for deployment: A. Basic deployment B. Deployment on Windows Server 2012 R2 or later.
  • 9.
    Policies There are severalpolicies that must be defined in implementing Bitlocker: • Are there policies to address which computers will use BitLocker and which computers will not use BitLocker ? • What policies exist to control recovery password and recovery key storage? • What are the policies for validating the identity of users that need to perform BitLocker recovery ? • What policies exist to control who has access to recovery data? • What policies exist to control computer decommissioning or retirement ?
  • 10.
  • 11.
    Timeline 08-02-2021 - 15-02-2021 15-02-2021 - 26-03-2021 05-03-2021 - 24-03-2021 21-03-2021 - 30-03-2021 Prepare & auditour environment Deploy for small circle (IT) Implementation to all environments in Equity Analysis & review 1 2 3 4
  • 12.