beautypg.com

Benefits, Encryption features – HP Secure Encryption User Manual

Page 6

background image

Overview 6

Benefits

Broad encryption coverage

Encrypts data on both the attached bulk storage and the cache memory of HP Smart Array Px3x
controllers

Supports any HDD or SSD in the Smart Drive portfolio for HP ProLiant Gen8 servers or the Supported
Storage Enclosures

High availability and scalability

Scales with the amount of data privacy requirements

Simplified deployment and management

HP Smart Storage Administrator configures the cryptographic features of HP Secure Encryption, and
manages the controller and other direct-attached storage devices

Helps users meet compliance regulations

The HP ESKM 3.1 has completed FIPS 140-2 Level-2 validation, certificate #1922

HP has applied for FIPS 140-2 Level-2 validation for the HP Smart Array Px3x family of controllers

Encryption features

Most HP Secure Encryption features and security settings are available through HP Smart Storage

Administrator. Additional features for Remote Mode deployments are available through HP Enterprise Secure
Key Manager 3.1 and Integrated Lights Out (iLO).

Feature

Description

Notes

Automatic key management Encryption keys are automatically

created, saved, and deleted by HP Smart

Array Px3x controllers without user

intervention or knowledge when logical
drives are created or deleted.

Compliance

HP Secure Encryption has been designed
to meet NIST-approved standards. HP is

in the process of applying for FIPS 140-2

Level 2 validation for HP Secure
Encryption. The HP ESKM 3.1 has

completed FIPS 140-2 Level-2 validation,

certificate #1922.
HP Secure Encryption helps enterprises

comply with the data privacy and

protection requirements associated with
the U.S. Health Insurance Portability and

Accountability Act (HIPAA) and the

Sarbanes-Oxley Acts.

For more information, see
"Encryption Algorithms (on page

70

)."

Controller key cache

HP Smart Array Px3x controllers can

optionally store all keys required at boot
time inside the controller, enabling the

server to survive a variety of network

outages.

Remote Mode only.

Controller password

Protects the server in the event of theft by

applying a secondary password upon
boot to lock down the controller.

For more information, see "Set or

change the controller password (on
page

35

)."