Constraint: I cannot use a TPM (the only Mini PCIe port is already used by a Wi‑Fi/Bluetooth module).
Device / context:
The target system is a portable Pico‑ITX device (Jetway NP93, Intel Celeron N2930, single SATA SSD) used in industrial repair tasks. It runs Windows 10 Enterprise IoT, may occasionally be connected to power/network, and must boot automatically without any user interaction. There is no secondary storage.
Goal / threat model:
We want to encrypt the SSD (OS + sensitive application data) with BitLocker so that:
Boot is fully automatic (no password prompt or USB key entry).
The BitLocker startup key is stored locally, ideally on a hidden partition of the same SSD. If someone dismantles the device and removes the SSD, they should not be able to read the data.
The threats are clients, technicians, or competitors who might try to extract or clone the SSD.
The BIOS is password-protected, but the SSD is removable.
Current situation / clarification:
The usual method is to store the BitLocker startup key on an external USB drive. Storing the key on the same SSD raises concerns: a determined attacker could potentially read the key by connecting the SSD to another system, cloning partitions, or using NVMe/SATA adapters. Hiding the partition alone is unlikely to fully prevent access.
Concrete questions:
Is it technically possible with BitLocker on Windows 10 Enterprise IoT (without TPM) to:
Boot automatically from the SSD, and
Store the key on a hidden partition of the same SSD, so that if the SSD is removed, it cannot be decrypted elsewhere?
If yes, what are the exact steps / settings to implement this?