beautypg.com

HP Secure Encryption User Manual

Page 3

background image

Contents 3

Contents

Overview ..................................................................................................................................... 5

About HP Secure Encryption ....................................................................................................................... 5

Benefits .......................................................................................................................................... 6

Encryption features .......................................................................................................................... 6

Solution components ........................................................................................................................ 8

Planning .................................................................................................................................... 12

Encryption setup guidelines ...................................................................................................................... 12

Recommended security settings at remote sites ............................................................................................ 12

Encrypted backups .................................................................................................................................. 12

Security domains ..................................................................................................................................... 13

Deployment scenarios .............................................................................................................................. 13

Remote and local key management requirements ............................................................................... 13

Configuration ............................................................................................................................. 14

Local key management mode .................................................................................................................... 14

Configuring the controller (local mode) ............................................................................................. 14

Remote Key Management Mode ............................................................................................................... 16

Configuring Remote Key Management Mode .................................................................................... 16

Operations ................................................................................................................................. 32

Accessing Encryption Manager ................................................................................................................. 32

Opening Encryption Manager ......................................................................................................... 32

Logging into Encryption Manager .................................................................................................... 32

Managing passwords .............................................................................................................................. 33

Set or change the Crypto Officer password ...................................................................................... 33

Set or change the password recovery question .................................................................................. 34

Set or change user account password .............................................................................................. 34

Set or change the controller password .............................................................................................. 35

Suspending the controller password ................................................................................................. 36

Resuming the controller password .................................................................................................... 37

Working with keys .................................................................................................................................. 38

Changing the Master Encryption Key ............................................................................................... 38

Rekeying the Drive Encryption Keys ................................................................................................. 38

Rescanning keys ............................................................................................................................ 39

Creating a plaintext volume ...................................................................................................................... 39

Converting plaintext volumes into encrypted volumes ................................................................................... 42

Changing key management modes ............................................................................................................ 43

Enabling/disabling plaintext volumes ......................................................................................................... 44

Enabling/disabling the firmware lock ........................................................................................................ 45

Enabling/disabling local key cache ........................................................................................................... 46

Importing drive sets in Local Key Management Mode ................................................................................... 47

Importing drives with different Master Keys ....................................................................................... 47

Maintenance .............................................................................................................................. 49

Controllers .............................................................................................................................................. 49

Clearing the controller .................................................................................................................... 49

Replacing an encrypted controller .................................................................................................... 49