Skip to content

Encryption of Workstations at ISIMA and LIMOS

  • The CNRS, UCA, and the ANSSI require all user workstations—whether fixed or portable—to be encrypted.

  • Encryption of your workstation(s) must be performed through the CRI ISIMA/LIMOS service:

    • A procedure exists for each operating system
    • Your recovery key to decrypt the disk in the event of an incident will be stored in a secure vault
  • Your external drives / USB keys must also be encrypted with VeraCrypt by yourself or by contacting the CRI ISIMA/LIMOS service

Backup Policy

backup

Adding an Additional Linux Encryption Key

First, determine which partition is encrypted, then find a free slot to add a new key, and finally add your key.

This new key, along with the existing one, will allow you to decrypt the computer.

  • lsblk to identify which partition is encrypted lsblk
    • Here, we see that sda3 is encrypted
  • sudo cryptsetup luksDump /dev/sda3 to view which slots are used for encryption (and which are free)
  • cryptsetup
    • We see that slot 0 is used by the key set during installation
    • The other 7 slots are free
  • sudo cryptsetup luksAddKey --key-slot 1 /dev/sda3 to add a key to slot 1 (which is free) on partition sda3
    • You will then be prompted to enter a new passphrase

Modifying the Key (PIN Code) for Windows

On Windows 10, BitLocker manages encryption.

A recovery key has already been created and saved, and a 10-digit PIN has been added.

This PIN is used to decrypt the machine and can be modified.

  • Type BitLocker in the search bar (bottom left) and click Manage BitLocker

bitlocker

  • Enter a new 10-digit PIN