S 4.147 Secure use of EFS under Windows

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: User

Windows 2000 and higher versions provide an Encrypting File System (EFS) that supports the encryption of individual files. The files must be marked accordingly for encryption. File encryption using EFS is based on a hybrid mechanism that uses a combination of symmetric and asymmetric encryption methods:

All the keys needed for encryption or decryption are stored during use by Windows in an area of the main memory that is not moved to the swap file. This is intended to guarantee that the key cannot be compromised if an unauthorised third party should obtain access to the swap file. One critical issue in this regard is the use of the Hibernation mode because all of the main memory is stored in a file which will then necessarily contain the key material as well. For this reason, the Hibernation mode should not be used if you are using EFS on Windows versions prior to Windows Vista and Windows Server 2008. This is especially important for mobile systems. The hybrid Standby mode available in Windows Vista and higher should not be used for the same reason. Like the Hibernation mode, this sleep mode developed especially for desktop systems stores the contents of the memory on the hard disk before the system is set to the Standby mode. On clients in Windows Vista and higher and on servers in Server 2008 and higher, it can help to encrypt the swap file: Computer Configuration | Windows Settings | Security Settings | Public Key Policies | Encrypting File System. Click with the right mouse button and select Properties from the menu that appears.

Every user can specify encryption for individual files or directories with EFS. The users should be trained in the correct use of EFS, and they should also be informed of the potential weaknesses of this type of encryption.

The use of EFS improves security in general. However, the users should be aware that even when plain text files are encrypted, there is still a residual risk that the data in the deleted plain text files could be restored fully or in part. The restoration of deleted files requires special software and access to the hard disk of the particular computer, though.

To ensure that the files encrypted using the EFS are not completely lost if the private key is lost, it is possible to encrypt the FEK again using the public key of the Recovery Agent. This makes it possible to decrypt the data when logged in to the user account of the recovery agent. In principle, any user account can be used as a recovery agent. In Windows 2000, the specification of a recovery agent is mandatory, but is not mandatory in Windows XP or higher versions. The default setting for the recovery agent user account in Windows 2000 is the administrator account.

The following should be considered when using EFS from a security perspective:

In Windows Vista / Server 2003, it is possible to use the BitLocker hard drive encryption as an alternative or as a supplement to EFS (see S 4.337 Use of BitLocker drive encryption). This applies in particular to mobile computers (see S 2.442 Use of Windows Vista and Windows 7 on mobile systems).

Review questions: