Start with full disk encryption
Sure, you could encrypt your entire hard drive, and you should!
However, this is only one layer of a good security policy. Experts will tell you that it’s always a good idea to utilize multiple layers of security in case one fails. Your policy should have many layers, like an onion.
In the world of information security, experts refer to this concept as “defense-in-depth.”
The problem with relying on full disk encryption is that it was never meant to fit the use case of the machines that are hosting files online 24 hours per day.
Typically, a user powers on a machine and enters the encryption key. The entire drive is then decrypted, and is not re-encrypted again until the machine is powered off. If a user were to rip the hard drive out of the machine, the files contained on this fully encrypted drive would be inaccessible to the attacker.
However, what if the attacker was able to compromise the machine hosting the files while it was powered on? Game over.
I don’t want to discredit full disk encryption, I merely want to state that it does not provide the level of protection that experts sometimes assume.
A good analogy would be locking the door to your house, but leaving all of your jewelry and financial information prominently displayed on your dining room table.
Once someone bypasses the door lock, they have what they’re looking for. In this way, once the hard drive has been decrypted (when the system boots up and the encryption key is entered), user files are no longer safe.
How can you stop thieves in their tracks?
Using OnBase Encrypted Disk Groups is analogous to storing your jewelry and financial information in a locked safe that only the owner knows the combination to. It’s an extra layer of defense, and an important one. While full disk encryption protects the user against theft of the hard drive, OnBase Disk Groups (and the encryption of files in general), protects the user against unauthorized access.