Security
SED

SED

AES-256
AES-256
TCG Opal
TCG Opal
Security Erase
Security Erase
ESD Safety
ESD Safety
EMI Safety
EMI Safety
Self-Encrypting Drive

SED
(Self-Encrypting Drive)

Self-Encrypting Drive

What Are Self-Encrypting Drives (SED)?

An SED (Self-Encrypting Drive) refers to a storage device with built-in self-encryption capabilities. It is important to clarify that an SED is not a single encryption algorithm or a specific piece of hardware IP. Rather, it is a security concept that describes a storage device’s capability to perform trusted and manageable self-encryption behaviors.

 

How an SED Works

From an implementation perspective, an SED typically relies on the SSD controller’s inline hardware encryption architecture. The primary differentiator lies in its support for key isolation and manageable, policy-driven access control, rather than encryption alone.

When data is written to an SSD, it is encrypted in real time by a hardware encryption engine integrated into the controller. The encrypted data (ciphertext) is then stored in NAND Flash.

Encryption keys are managed internally by the controller’s secure mechanisms and kept physically and logically separate from user data in NAND. This design ensures that even if the SSD is removed, relocated, or the host system is compromised, the data remains inaccessible without proper authentication and unlocking.

 

Core Capabilities of an SED

  1. Inline Encryption

    The foundation of an SED is the SSD controller’s built-in hardware AES encryption engine, typically utilizing the AES-256 algorithm. All data is automatically encrypted before being written to NAND and transparently decrypted when read. This entire process occurs inside the SSD, without involvement from the operating system or CPU.

     

    Because encryption and decryption are handled by dedicated hardware in real time, performance impact is typically minimal across most workloads. In addition, the encryption process is independent of the OS, BIOS, drivers, or software updates.

    It should be noted that inline encryption alone does not qualify a device as an SED. Whether a drive can be classified as an SED depends on the presence of manageable and verifiable security behaviors beyond basic encryption.

  2. Device-Based Key Storage

    Key isolation is the core security principle of SED architecture. In an SED, the Master Encryption Key (MEK) exists only within the Secure Zone of the SSD controller. It is never exposed to the host or any external system. This is the primary difference between an SED and pure software encryption:
    .OS Corruption: If the operating system is damaged or compromised, data protection remains intact.
    .Physical Theft: If the SSD is removed and connected to another computer, the data remains encrypted and inaccessible.
  3. Instant Secure Erase, ISE

    All data on an SED is stored in an encrypted state on the NAND. By performing a Key Purge, the encryption key is destroyed, rendering the remaining data permanently indecipherable—even though the ciphertext still resides in NAND. This process effectively achieves near-instantaneous cryptographic erasure of all stored data.

    This key-based erase mechanism is extremely fast because it does not require overwriting the entire NAND space. It is ideal for highly security-sensitive environments, including industrial PCs, financial institutions, and government sectors, and for scenarios like server decommissioning where rapid data sanitization is required.

    Depending on the interface and standard, this mechanism may be referred to by different names, including:

    .Instant Secure Erase (ISE): A commonly used industry term for Enterprise SSDs.
    .Crypto Erase: Terminology used in SATA / TCG specifications.

    .Crypto Sanitize: The designation within NIST / NVMe Sanitize commands.

 

The Relationship Between SED and TCG

If SED is viewed as a security capability, the specifications defined by the Trusted Computing Group (TCG) establish how that capability is managed, verified, and access-controlled in a standardized manner.

Through standards such as TCG Opal or TCG Enterprise (TCGe), systems can apply different permission management modes based on the application scenario. For example:

  • TCG Opal: Designed for client and PC environments, supporting Pre-Boot Authentication (PBA) and multi-range encryption management.
  • TCGe: Optimized for data center environments with features like centralized key management and large-scale security domain control.

In essence, SED defines a storage device’s capability for manageable self-encryption, while TCG standards specify how that capability is securely implemented and managed.

(To learn more about TCG standards, please refer to the TCG article.)

 

Note:

SED represents a security capability framework that defines a storage device’s self-encryption behavior rather than a single encryption technology, while TCG standards specify the formal protocols for access control and management of that capability.
 
Inquiry

total 0 items

Compare list

Select up to 4 products to compare.