management database, key management, encryption activation, and audit support for the devices within the platform.
For the full implementation of HP Secure Encryption with the HP ESKM, HP iLO Advanced or HP iLO Scale Out editions are required to connect and
For more information about HP iLO, see the HP website (http://www.hp.com/go/ilo).
HP Enterprise Secure Key Manager 3.1 and later
HP Enterprise Secure Key Manager 3.1 and later acts as a secure, reliable repository for keys used by HP Secure Encryption. In Remote Key Management Mode, HP iLO connects to the HP ESKM using username/password and digital certificate authentication to securely store and retrieve keys. Each HP iLO must be registered as an HP ESKM user by an administrator, or Crypto Officer, of the HP ESKM for access to be granted. If a user is registered and has the necessary permissions, the HP ESKM accepts requests and provides keys to the client. As standard practice, communication with the HP ESKM is configured for SSL to ensure the security of the connection and authorized access to keys.
The HP ESKM keys and users can be organized into different groups depending on the policies set by an administrator. These groups determine whether a particular user can retrieve a particular key, and supports both key sharing and separation for
Characteristics
•Used only in Remote Mode, requiring a network connection
•Supports
•Provides key services to HP iLO clients using username and password, certificate authentication, or both
•Communicates using SSL encryption to ensure the security of the connection and authorized access to keys
•Provides reliable, secure access to
•Supports audit and compliance requirements, including
•Provides scalability for multiple data centers, thousands of clients, and millions of keys
•Uses a
HP ESKM and key management
The HP Smart Array Controller manages keys by separating them into the following categories:
•Keys stored
•Keys stored on the drive media
•Keys stored on the controller
The separation of keys helps ensure the safety of the data residing on the drives, the portability of the drives, and the ability to manage keys in a centralized manner. The controller uses the HP ESKM to back up a segment of its keys using an encryption method that protects the keys from exposure in plaintext.
Overview 11