Encrypting File System (EFS):
The EFS provides a per-file encryption option, this does not include boot-up files, registry or page file
BitLocker:
The BitLocker mechanism can provide volume encryption protected by a number of key material sources including USB tokens and built-in Trusted Platform Modules
The EFS mechanism operates as a file system filter and was introduced in V3.0 of NTFS in 1999:
EFS Limitations - Key Management:
Security of EFS-encrypted files is typically not limited by the strength of the bulk cipher, but by the management of public keys including recovery keys. If a recovery agent account is compromised, this gives access to all EFS encrypted files
EFS Limitations - File System Transitions:
Copying files to non-NTFS volumes such as FAT or network file systems results in files being decrypted. Such transitions may be transparent to users, resulting in storage in plain text. File systems with links to others in them are problematic
EFS is mainly intended to protect data at rest, i.e. files on storage media during times when the operating system is not running:
Although called BitLocker Drive Encryption, Microsoft’s BitLocker is in fact a volume encryption mechanism:
A main reason for strict requirements is the possible susceptibility of mechanisms such as BitLocker to cold boot or pre-boot attacks:
For the mechanism to work, a PIN or similar mechanism is needed and the machine must support a secure hibernation mode together with UEFI Secure Boot / Windows Trusted Boot and Connected Standby
From Windows 8.1 onwards, encryption may be initiated automatically by default under the name Device Encryption:
Unlike a drive encryption software, BitLocker must rely on a pre-boot environment to perform
BitLocker Vulnerability Potential - Even with a TPM, however…
Some residues of key material can persist after a re-boot