How Data Encryption Works

In Veeam Backup & Replication, data encryption works at the following levels:

When you enable data encryption, Veeam Backup & Replication encrypts backup files with data encryption keys, transfers encrypted data to the target side and stores it in a backup repository or a tape device.

How Data Encryption Works 

Data Encryption Keys

To encrypt each type of backup files, Veeam Backup & Replication uses specific data encryption keys. These keys are encrypted with the secret key based on the password or KMS key and stored in the configuration database. Data encryption keys are not passed to the target side unless you run a backup copy job over WAN accelerators or perform health check for the encrypted backup files.

How Data Encryption Works 

When you enable encryption for the job or storage, you can select the encryption method you want to use — a password that will generate secret keys or an external KMS server that will generate KMS keys.

For secret keys, consider the following:

  • Veeam Backup & Replication generates a symmetric secret key based on the password you specify in the encryption options. To create a strong password, follow the recommendations:
  • The password must be at least 12 characters long.
  • The password must contain uppercase and lowercase characters.
  • The password must be a mixture of alphabetic, numeric and punctuation characters.
  • The password must significantly differ from the password you used previously.
  • The password must not contain any real information related to you, for example, date of birth, your pet’s name, your logon name, and so on.
  • The password hint must not contain the password.
  • The password must be updated regularly.

For KMS keys, consider the following:

  • Asymmetric KMS keys are managed and rotated by an external KMS server. Veeam Backup & Replication only sends requests to the KMS server. For more information about KMS keys, see Key Management System Keys.
  • To encrypt data encryption keys with KMS keys, Veeam Backup & Replication uses the RSA algorithm with a 4096-bit key length. For more information, see RSA Cryptography Specifications.

Note

Consider the following:

  • To protect data encryption keys, passwords, secret keys, KMS keys and other sensitive information stored in the configuration database, Veeam Backup & Replication uses Data Protection API (DPAPI) mechanisms. For more information, see Microsoft Docs.
  • If you have lost or forgotten a password or you cannot use KMS keys due to a KMS server failure, you will not be able to recover data from backups or tapes unless you use Enterprise Manager keys in the encryption process. For more information, see Password Loss Protection.

Data Encryption and Deduplication

Data encryption has a negative effect on the deduplication ratio if you use a deduplicating storage appliance as a target. Veeam Backup & Replication uses different data encryption keys for every job session. For this reason, encrypted data blocks sent to the deduplicating storage appliances appear as different, even though they may contain duplicate data. If you want to achieve a higher deduplication ratio, you can disable data encryption. If you still want to use encryption, you can enable the encryption feature on the deduplicating storage appliance itself.

Data Encryption and Compression

If data compression and data encryption are enabled for a job, Veeam Backup & Replication compresses VM data first and after that encrypts the compressed data blocks. Both operations are performed at the source side.

If the Decompress backup data blocks before storing check box is selected in the backup repository settings, Veeam Backup & Replication does not compress VM data before encryption. Therefore, in the job statistics, you may observe a higher amount of transferred data (the Transferred counter) as compared to a job for which encryption is disabled. For details on job statistics, see Viewing Real-Time Statistics.

Page updated 12/11/2024

Page content applies to build 12.3.0.310