Details
This policy setting allows you to manage BitLocker’s use of hardware-based encryption on fixed data drives and specify which encryption algorithms it can use with hardware-based encryption. Using hardware-based encryption can improve performance of drive operations that involve frequent reading or writing of data to the drive.
If hardware-based encryption is not available BitLocker software-based encryption will be used instead.
The recommended state for this setting is: Enabled: True (checked).
Rationale:
From a strict security perspective the hardware-based encryption may offer the same, greater, or less protection than what is provided by BitLocker’s software-based encryption depending on how the algorithms and key lengths compare.
Solution
To establish the recommended configuration via GP, set the following UI path to Enabled: True (checked):
Computer ConfigurationPoliciesAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesConfigure use of hardware-based encryption for fixed data drives: Use BitLocker software-based encryption when hardware encryption is not available
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template VolumeEncryption.admx/adml that is included with the Microsoft Windows 8.0 & Server 2012 (non-R2) Administrative Templates (or newer).
Impact:
None – this is the default behavior.
Default Value:
If hardware-based encryption is not available on fixed drives, BitLocker software-based encryption will be used instead.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Windows.