Skip to main content
NetApp Knowledge Base

Is It Possible to Change Storage Encryption Settings While the Server Is Running?

Views:
55
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
core
Last Updated:

Applies to

  • ONTAP 9
  • NetApp Storage Encryption (NSE)
  • NetApp Aggregate Encryption (NAE)
  • NetApp Volume Encryption (NVE)

Answer

  • NetApp offers three encryption options for disk encryption:
    • NetApp Volume Encryption (NVE)
    • NetApp Storage Encryption (NSE)
    • NetApp Aggregate Encryption (NAE)
  • These options are used to enhance the security of data and provide encryption at different levels.
    • NetApp Volume Encryption (NVE)
      • Provides encryption at the volume level.
      • It is a software-based encryption solution that allows for encrypting specific volumes.
      • NVE can be applied to existing volumes and operational environments, but may require volume recreation or data migration.
      • The performance impact during encryption is typically minor but varies based on the amount of data and system load.
    • NetApp Storage Encryption (NSE)
      • Offers disk-level encryption.
      • NSE utilizes Self-Encrypting Drives (SEDs).
      • Applying NSE to an existing non-encrypted system may necessitate data migration or system reconstruction.
      • Introducing encrypted drives requires hardware replacement, which may lead to service downtime.
    • NetApp Aggregate Encryption (NAE)
      • Provides encryption at the aggregate level.
      • NAE is an extension of NVE, encrypting all volumes within an aggregate.
      • To apply NAE, you need to create a new aggregate and migrate data.

Additional Information

additionalInformation_text

 

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.