Back

ECO-35 Adding Encryption to Logging Disks

ECO-35 aims to enhance the security of logging disks by implementing encryption protocols. As sensitive information is often stored in log files, ensuring the confidentiality and integrity of this data is paramount. This change is essential for compliance with data protection regulations and to mitigate the risks associated with unauthorized access to sensitive logs.
DoorDash Labs Global Org
06/12/2025

ECO-35 Adding Encryption to Logging Disks

ECO-35 aims to enhance the security of logging disks by implementing encryption protocols. As sensitive information is often stored in log files, ensuring the confidentiality and integrity of this data is paramount. This change is essential for compliance with data protection regulations and to mitigate the risks associated with unauthorized access to sensitive logs.

    Required Tooling and Equipment

    Covers the needed tooling, equipment and access to specific files or resources in order to carry out the procedure to completion

    • Screenshot2025-05-29at1.20.49PM.png

    Access to Script

    This script can only be accessed via GitHub. Request has been submitted to export to google folder or equivalent space outside of GitHub accessible by most of the company easily. Once new location is made available, this procedure is to be updated with such information

    Ensure the Disk has completed its offload as all content will be erased

    • Screenshot2025-05-29at1.56.18PM.png
    • Screenshot2025-05-29at1.57.25PM.png

    Downloading the Script to Linux Laptop w/o VPN

    If a linux laptop does not have vpn (many do not) follow this process

    Download the file attached to this step

    • Screenshot2025-06-11at3.19.44PM.png

    Running the script

    Confirm you are running buntu 24.04

    open terminal and type: lsb_release -a

    • Screenshot2025-06-05at12.12.08PM.png
    • Pass
    • Flag
    • Fail

    Enter the Asset Number on the Drive being formatted

    • Screenshot2025-06-05at12.04.20PM.png

    Check to see if fscrypt is installed on the computer by the entering the following in the terminal: dpkg -s fscrypt | grep Version if YES skip to PROCESS STEPS, otherwise continue to the next step

    • Screenshot2025-06-05at3.08.08PM.png
    if the answer is "checked "
    if the answer is "unchecked "

    While connected to the internet, get the fscrypt version that works with ubuntu 24.04. The output should end with “saved” and no error messages. Type: wget https://archive.ubuntu.com/ubuntu/pool/universe/f/fscrypt/fscrypt_0.2.5-2_amd64.deb

    • Screenshot2025-06-05at3.13.19PM.png

    Verify the downloaded file hasn’t been corrupted. Output should be “OK” Type: echo "881aa3043c0260539ca9629e3c6402151a1e7044b66d0853fb04dc5eac745e00 fscrypt_0.2.5-2_amd64.deb" | sha256sum --check

    • Screenshot2025-06-05at3.23.05PM.png

    Install the downloaded package. No errors should appear during installation. Type: sudo dpkg -i fscrypt_0.2.5-2_amd64.deb

    • Screenshot2025-06-05at3.24.15PM.png

    Type: sudo fscrypt setup

    • Screenshot2025-06-05at3.50.59PM.png

    Remove the .deb file after it’s been installed. Type: rm fscrypt_0.2.5-2_amd64.deb

    • Screenshot2025-06-05at3.51.51PM.png
    • Screenshot2025-06-05at3.52.09PM.png

    Process Steps

    Connect the drive to the linux laptop

    Connect the drive to the linux laptop

    Using the USB-C to USB-C cable, connect the Linux laptop to the hard drive assembly

    • Screenshot2025-06-05at3.54.54PM.png

    Find the drive location

    Enter the command below to locate the hard drive. Find the line that has a size of ~3.6 - 3.7 Terabytes Type: lsblk -o path,serial,label,size Note: In the screenshot below, the hard drive is located at /dev/sdb, as it is the location that has 3.6 T(erabytes)

    • Screenshot2025-06-05at3.59.59PM.png

    Formatting a pre-configured drive

    If the drive has been formatted before, it will have the label EXT_STORAGE, but if not, it will show size ~3.6T. If you are unsure, unplug the drive, run the command, then plug it in and run the command again - look at the differences. The block device is often /dev/sda or /dev/sdb but it could be anything. Using the drive location (found in the last step) and the asset id (5 digit number labeled on the device), run the format drive script . (note: you may get a warning if drive has already been formatted, please answer Y and proceed) Type: sudo bash format_drive.sh [block device] [asset_id]

    • Screenshot2025-06-05at4.05.59PM.png
    • Screenshot2025-06-05at4.06.29PM.png

    Warning Examples

    Warning example below: Enter Y to continue. This will erase all data, please make sure any logs were already uploaded!

    • Screenshot2025-06-05at4.07.23PM.png

    Mark the drive upon process completion

    If the script finishes and the last line should say “EXT_STORAGE has been formatted”, place a lime green IQC sticker on the bottom of the SSD.

    • Screenshot2025-06-05at4.11.14PM.png
Source: DoorDash Labs Global Org (Community Member)

Please note that any procedure, checklist, or other document available in the MaintainX Procedure Hub is provided for general education and information only and does not constitute legal, medical, or financial advice. MaintainX makes the materials available AS IS and AS PROVIDED, without warranties of any kind. By downloading or using any such materials, you assume the risk that they may not be appropriate for your specific situation and agree that you are solely responsible for any such use, including compliance with applicable law and with meeting any conditions of product warranties.