beautypg.com
Contents 3
Contents
Overview ..................................................................................................................................... 5
About HP Secure Encryption ....................................................................................................................... 5
Benefits .......................................................................................................................................... 6
Encryption features .......................................................................................................................... 6
Solution components ........................................................................................................................ 8
Planning .................................................................................................................................... 12
Encryption setup guidelines ...................................................................................................................... 12
Recommended security settings at remote sites ............................................................................................ 12
Encrypted backups .................................................................................................................................. 12
Security domains ..................................................................................................................................... 13
Deployment scenarios .............................................................................................................................. 13
Remote and local key management requirements ............................................................................... 13
Configuration ............................................................................................................................. 14
Local key management mode .................................................................................................................... 14
Configuring the controller (local mode) ............................................................................................. 14
Remote Key Management Mode ............................................................................................................... 16
Configuring Remote Key Management Mode .................................................................................... 16
Operations ................................................................................................................................. 32
Accessing Encryption Manager ................................................................................................................. 32
Opening Encryption Manager ......................................................................................................... 32
Logging into Encryption Manager .................................................................................................... 32
Managing passwords .............................................................................................................................. 33
Set or change the Crypto Officer password ...................................................................................... 33
Set or change the password recovery question .................................................................................. 34
Set or change user account password .............................................................................................. 34
Set or change the controller password .............................................................................................. 35
Suspending the controller password ................................................................................................. 36
Resuming the controller password .................................................................................................... 37
Working with keys .................................................................................................................................. 38
Changing the Master Encryption Key ............................................................................................... 38
Rekeying the Drive Encryption Keys ................................................................................................. 38
Rescanning keys ............................................................................................................................ 39
Creating a plaintext volume ...................................................................................................................... 39
Converting plaintext volumes into encrypted volumes ................................................................................... 42
Changing key management modes ............................................................................................................ 43
Enabling/disabling plaintext volumes ......................................................................................................... 44
Enabling/disabling the firmware lock ........................................................................................................ 45
Enabling/disabling local key cache ........................................................................................................... 46
Importing drive sets in Local Key Management Mode ................................................................................... 47
Importing drives with different Master Keys ....................................................................................... 47
Maintenance .............................................................................................................................. 49
Controllers .............................................................................................................................................. 49
Clearing the controller .................................................................................................................... 49
Replacing an encrypted controller .................................................................................................... 49