Data Encryption

<< Click to Display Table of Contents >>

Navigation:  »No topics above this level«

Data Encryption

 

Encryption of the communication

 

Apresa can provide a secure HTTPS web interface, to prevent that web pages or downloaded recordings are intercepted by a third party. HTTPS can be enabled on the Network tab in the System settings, after a certificate has been enabled on the Encryption page.

 

Remote-access to the Apresa system shell, when enabled, is possible using the SSH protocol, which is an encrypted protocol.

 

 

Encryption of the stored data

 

Full disk encryption

Full disk encryption can be chosen during installation, and it will encrypt everything on the hard disk except the boot sector. Full disk encryption cannot be disabled or enabled later on. During reboot, it requires that a pass phrase is entered with a keyboard (connected directly to the system), in order to unlock and start the system. If the pass phrase is lost, it is impossible to recover the data, or even to start the system.

 

When data is accessed using the web interface, the data is sent in decrypted form. In order to secure this communication, consider using HTTPS (see above).

When data is exported using backup, the data is sent in decrypted form.

 

System-wide encryption of call content

As an alternative to full disk encryption, the call content of recorded calls can be encrypted. This option can be switched on and off in the web interface. Call meta data, such as the start and stop time, and the telephone numbers, will not be encrypted. Only the audio (or video) content of calls will be encrypted.

 

Call content encryption can be enabled on the Encryption page. You can choose a pass phrase there.

 

When the Apresa system is rebooted, the recording of calls will continue, and the web interface will be available, but playback will be impossible. In other words, decryption of the call content will be unavailable, for security reasons. In order to enable playback (decryption), the pass phrase must be entered. In the web interface, there will be a warning displayed, that this must be done. The pass phrase can be entered using the web interface. This pass phrase is used by the system to unlock the playback possibility. This is a one-time procedure, for as long as the system remains switched on. As long as it is on, playback will continue to be possible, until the next reboot.

 

When data is accessed using the web interface, the data is sent in decrypted form. In order to secure this communication, consider using HTTPS (see above).

When data is exported using backup, the data is stored encrypted.

 

Per-tenant encryption of call content

Call content encryption can also be applied per-tenant separately. This feature works very differently compared to the system-wide call encryption described above. For tenant call encryption, the decryption of call content happens in the web browser of the user that wants to play or download the recording. To play or download an encrypted call, a password is required. Each tenant can set its own password. The password itself is never sent to Apresa and no decryption is happening on Apresa for playback. Once a call has been encrypted, nobody without the password is able to decrypt the calls. This also includes system administrators. If the password is lost, it is not possible to retrieve the calls.

 

The tenant call encryption feature allows for the encryption of the recordings of a tenant. Only the call contents are encrypted. Call meta data, such as telephone numbers, is not encrypted.

 

Tenant call encryption can be configured on the tenant call encryption page by a tenant administrator who has permission.

 

For playback and downloading of tenant encrypted calls, a modern browser is required. The following browsers are known to work:

- Firefox

- Chrome

- Chromium-based Microsoft Edge

- Safari

Internet explorer will not work.

 

Enabling tenant call encryption brings a few limitations

- HTTPS is required. Playback, downloading or changing the encryption settings cannot be done over plain HTTP.

- Screen recordings and card recordings are currently not encrypted with this method.

- Encrypted calls that are exported to another Apresa will not be usable there.

- For backup purposes it is important to note that recordings are stored in an encrypted format that is not self-contained. Restoration of these calls to a playable state will always require a copy of the database as well.