I'm looking into ways to encrypt data at rest in our IT environment, and I'm particularly considering BitLocker on our file server VM. Our setup includes an ESXi host and a Windows Server VM that's used as a file server, connected to iSCSI SAN storage. I've been exploring whether using a vTPM with BitLocker is safe, especially during disaster recovery scenarios. I have concerns about relying solely on a BitLocker recovery key and want to verify my plan before proceeding. My main goals are to ensure data is securely encrypted while maintaining a smooth DR process. I'm not experienced with vTPM and want to ensure I'm not overlooking potential pitfalls. Here are my main questions: Are there any hidden challenges with using vTPM and Veeam for restores? Is my approach to handling recovery keys solid? And should I consider alternatives to BitLocker for our small setup?
8 Answers
Honestly, I'm a bit puzzled about using BitLocker on VMs. Isn't its main purpose to protect against physical theft? If your drives aren't at risk of theft in a VM setup, other solutions might be more fitting. Still, I can see the value in it for protecting against data leaks if the VM files were ever mishandled.
For your situation, also think about OPAL disks if you're renewing hardware. They can provide encryption at a lower management cost and might align well with your goals.
Before moving forward, clarify what problem you want to solve. If all you need is security against someone accessing a physical drive, there are easier options available. You must also ensure your BitLocker keys are stored securely for DR scenarios—having them on-site can be risky.
Using VMware's vTPM for BitLocker is okay, but I suggest looking into VMDK encryption at the storage level instead. This provides a level of security that simplifies DR processes and is compliant with FIPS standards. VMDK encryption keeps everything tied to your nodes, making backups more manageable without changing much. If FIPS compliance is necessary, ensure you set that up before enabling BitLocker to avoid issues with the encryption version used.
I recently dealt with a similar situation, and BitLocker works well for encryption if you don't have built-in SAN encryption. Just make sure to have your recovery keys stored safely, like in a shared password vault. The most annoying part you'll face is entering that recovery key after every reboot, so consider simplifying that process with an easy-to-enter boot password. It really doesn't have to be overly complicated.
It might be worth considering encrypting at the storage layer directly. This method would handle encryption at rest without the complexities of managing it inside the VM. Plus, running BitLocker can limit your recovery options with Veeam if you enable file-level recovery.
Be cautious about relying on BitLocker within VMs if you want to use Veeam's file recovery features. It’s better to encrypt at the storage layer for simplicity unless protecting against data exfiltration is a priority.
Your assumptions are mostly correct! Veeam can restore the disks as they are, and you’ll need that recovery key for DR scenarios. Just ensure you keep backups of that key in multiple safe places.

Related Questions
Can't Load PhpMyadmin On After Server Update
Redirect www to non-www in Apache Conf
How To Check If Your SSL Cert Is SHA 1
Windows TrackPad Gestures