18.104.22.168.13 (BL) Ensure 'Configure use of hardware-based encryption for fixed data drives: Restrict crypto algorithms or cipher suites to the following:' is set to 'Enabled: 2.16.822.214.171.124.4.1.2;2.16.8126.96.36.199.4.1.42'
Warning! Audit Deprecated
This audit has been deprecated and will be removed in a future update.
This policy setting allows you to manage BitLocker's use of hardware-based encryption on fixed data drives and specify which encryption algorithms it can use with hardware-based encryption. Using hardware-based encryption can improve performance of drive operations that involve frequent reading or writing of data to the drive. You can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that do not support hardware-based encryption and whether you want to restrict the encryption algorithms and cipher suites used with hardware-based encryption. Note: The 'Choose drive encryption method and cipher strength' policy setting does not apply to hardware-based encryption. The encryption algorithm used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm configured on the drive to encrypt the drive. The 'Restrict encryption algorithms and cipher suites allowed for hardware-based encryption' option enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm set for the drive is not available, BitLocker will disable the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID). For example: - AES 128 in CBC mode OID: 2.16.8188.8.131.52.4.1.2 - AES 256 in CBC mode OID: 2.16.8184.108.40.206.4.1.42 The recommended state for this setting is: Enabled: 2.16.8220.127.116.11.4.1.2;2.16.818.104.22.168.4.1.42. Rationale: From a strict security perspective the hardware-based encryption may offer the same, greater, or less protection than what is provided by BitLocker's software-based encryption depending on how the algorithms and key lengths compare.
To establish the recommended configuration via GP, set the following UI path to Enabled: 2.16.822.214.171.124.4.1.2;2.16.8126.96.36.199.4.1.42: Computer Configuration\Policies\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives\Configure use of hardware-based encryption for fixed data drives: Restrict crypto algorithms or cipher suites to the following: Note: This Group Policy path may not exist by default. It is provided by the Group Policy template VolumeEncryption.admx/adml that is included with the Microsoft Windows 8.0 & Server 2012 (non-R2) Administrative Templates (or newer). Impact: None - this value is ignored when the checkbox above it (Restrict encryption algorithms and cipher suites allowed for hardware-based encryption) is False (unchecked), as is required in Rule 188.8.131.52.12. If that checkbox is set to True (checked), then the encryption algorithms permitted on fixed drives would be restricted to the specified object identifiers (OIDs). Default Value: Encryption algorithms and cipher suites are not restricted for hardware-based encryption on fixed drives. References: 1. CCE-33080-3