Linux devices can be encrypted in one of two ways: <\/p>\n\n\n\n
Full-disk encryption is preferred, as it ensures that the system is inaccessible without entering an encryption passphrase. Additionally, fscrypt doesn\u2019t encrypt filesystem metadata except for filenames, whereas full-disk encryption ensures everything written to the disk is encrypted. After reviewing this content, you should know how to encrypt the entire disk, as well as how to encrypt only home directories on your system.<\/p>\n\n\n\n
JumpCloud Admins can create and apply a Linux Check Disk Encryption Policy to one device or group of devices, helping secure their data and sensitive information across their fleet of JC-managed Linux systems. Without this policy, an admin would need to manually track which devices require encryption and verify if they are encrypted to ensure proper data security and compliance. With JumpCloud\u2019s Linux Check Disk Encryption Policy, admins can specify which devices to encrypt and, more specifically, if the devices require only managed home directories or full disk encryption (FDE). Once the policy is applied, the administrator will be notified if any of the targeted devices don\u2019t meet the encryption requirements.<\/p>\n\n\n\n
Considerations<\/strong>:<\/p>\n\n\n\n
FDE protects the data on a block device by encrypting it. To access the device\u2019s decrypted contents, a user must provide a passphrase or key as authentication. This provides additional security beyond existing operating system security mechanisms, as it protects the device\u2019s contents even if it was physically removed from the system. FDE is implemented using LVM (Logical Volume Management) for disk management and LUKS (Linux Unified Key Setup) encryption in all modern distro installer wizards.<\/p>\n\n\n\n
As a system administrator, you can encrypt your device’s storage devices using LUKS, which is a specification for block device encryption. It establishes an on-disk format for the data, as well as a passphrase\/key management policy.<\/p>\n\n\n\n
LUKS uses the kernel device mapper subsystem with the dm-crypt module. This arrangement provides a low-level mapping that handles encryption and decryption of the device data. You can use the cryptsetup utility to perform user-level operations such as creating and accessing encrypted devices.<\/p>\n\n\n\n