Linux Online Encryption Prerequisites and Considerations

By default, when you encrypt, rekey, or decrypt a Linux block device, the filesystem on that block device must be unmounted during the entire procedure and the data is inaccessible until the procedure is finished. With Online Encryption, the filesystem only needs to be unmounted briefly during the initial encryption phase when the HyTrust DataControl Policy Agent changes the device to attach the clear text version it creates during the encryption process. After the device has been reattached on the clear text version, the encryption process continues while the disk remains online and the data remains accessible. The device can now be dynamically rekeyed without losing access to the data during the process. During the decryption process, the data is decrypted dynamically before the device is detached.

Note: The only exception to this is if a VM reboots while a Linux system device (such as /root, /swap, or /home) is being decrypted. In this case, when the VM finishes rebooting, the decryption process resumes in offline mode and the system device and its data will be inaccessible until decryption is complete. If the VM remains online during the entire decryption process, the data will be available the entire time.

Prerequisites

In order to enable Online Encryption, you need to install the HTCrypt Driver on each Linux VM whose disks you want to encrypt.

The HTCrypt Driver is a Dynamic Kernel Module Support (DKMS)-based package that requires the following:

Considerations