We're Hiring!
Take the next step in your career and work on diverse technology projects with cross-functional teams.
LEARN MORE
Mountain West Farm Bureau Insurance
office workers empowered by business technology solutions
BLOG
3
8
2018
3.1.2023

Weighing VMware vSphere Encryption

Last updated:
9.16.2020
3.1.2023
No items found.

VMware vSphere 6.5 introduced policy-based encryption, which simplifies the security management of VMs across large scale infrastructure, as each object no longer requires individual key management.

vSphere VM encryption offers quite a few advantages compared to other encryption methods, but it might not be a great fit for every workload. When weighing whether to encrypt or not, you’ll want to consider a few limitations, caveats, and performance issues first.

vSphere Encryption Diagram courtesy of VMware.

 

Advantages of Policy-based VM Encryption

Using the integrated vSphere encryption for VMs offers a few advantages over other encryption models. Let’s take a look at those other methods first.

Fabric-Based Encryption protects the data at the storage fabric layer and takes place at the Host Bus Adapter or the switch, encrypting data as it enters or leaves the network.

With encryption at the Host Bus Adapter, the HBA encrypts and decrypts as data leaves the host machine and enters the network, with key management existing in an external KMIP server. Multitenant environments are difficult to manage with this method as each machine must be administered individually. Portability can also be negatively affected.

With switch encryption, data is encrypted at the switch before being sent to the storage array. This also uses external KMIP key managers. Data travels “in the clear,” or unencrypted, on the network in this case. It can limit movement of VMs between datastores. Using different storage methods may require multiple switches for encryption and multitenancy is limited to the datastore connected to the VM.

Storage or disk based encryption takes place at the storage level and can use Self-Encrypting Drives or Array-Based encryption.

Self-Encrypting Drives are disk-based encryption, with data encrypted at the storage level using integrated hardware and an individual media encryption key (MEK), which is in turn encrypted with a key (KEK). KEKs are required for the encryption to work and must be managed individually unless an external key manager is used.

At the array level, the storage array itself encrypts data as it is written to the disks, either with integrated hardware or by using software. Keys are managed with built-in key managers or an external KMIP server.

As with switch encryption, data is not encrypted in transit, only once it reaches storage. It can be difficult to use different keys for different workloads in a single storage environment. Encryption-enabled storage devices often have a larger cost overhead as well.

In-Guest encryption uses familiar software like Windows BitLocker, macOS FileVault, or Linux dm-crypt within the VM OS in order to enable encryption. One disk partition launches before the complete system boots, with key management using a hardware device or software control (passwords) to complete the final boot.

This can cause administration complications if you have multiple OS within your environment, as each Windows, Linux, or Mac machine must be managed individually. If the machine itself is infected by malware, the data could be accessed, as encryption keys reside within the OS. Hardware or software updates may require disabling of the encryption before they can be installed.

Using vSphere encryption dodges many of these issues. It supports multitenant environments, is OS-agnostic so it can be applied across VMs with multiple guest OS, uses policy-based management for global configuration changes, has automation features, does not require any additional hardware, and can be used across various datastores.

 

Performance with Encryption Enabled

The performance toll of encryption largely depends on the storage hardware in use, but there is a performance hit regardless of the hardware, according to a VMware study.

Enabling encryption generally did not increase storage bandwidth overhead in any meaningful way. Latency had similar results, so you can expect network traffic and storage performance to remain largely stable with encrypted VMs when using vSphere encryption features, with a slight hit to latency in particular.

CPU performance suffered much more, with encryption adding anywhere from 20% to 500% the number of cycles per I/O depending on the storage hardware.

VM power-on operations and cloning had less than a 20% performance toll with encryption across all storage platforms. Snapshots also had a low overhead except when using vSAN datastores, which necessitate the use of additional files generated by the VAIO (IOFilter).

Enabling AES-NI in your BIOS can help improve encryption performance.

 

VMware vSphere Encryption Limitations and Best Practices

When enabling encryption in your vSphere environment, there are a few things you’ll want to note:

See the full list of Best Practices, Caveats, and Interoperability on the VMware Knowledgebase.

 

Be sure to weigh your intended use of the VM against these limitations. Does the data require encryption? Do you heavily use Snapshots or Fault Tolerance? Do you require maximum CPU performance? You may need to reconsider your workflow and VM backup strategies when enabling encryption.

Recent Blog Posts

lunavi logo alternate white and yellow
4.5.2024
03
.
27
.
2024
Utilizing Bicep Parameter Files with ALZ-Bicep

Ready to achieve more efficient Azure Deployments? You can use Bicep parameters instead of JSON which opens new opportunities for deployment. Let Lunavi expert, Joe Thompson, show you how.

Learn more
lunavi logo alternate white and yellow
3.26.2024
03
.
04
.
2024
Anticipating Surges in Cyber Attacks and Bolstering Your InfoSec Defenses in 2024

Learn how to navigate 2024 with the right InfoSec defenses to protect your organization against a rising number of cyber attacks.

Learn more
lunavi logo alternate white and yellow
3.26.2024
01
.
03
.
2024
Microsoft Copilot is Re-Shaping the Innovation Frontier

Microsoft 365 Copilot has been released, and it's changing the way we work. More than OpenAI or ChatGPT, read how Copilot can seamlessly integrate with your workflow.

Learn more