Glossary, Controller key, Controller-secured region – HP Secure Encryption User Manual
Page 71: Critical security parameters (csps), Crypto officer, Drive array, Drive encryption key, Drive key caching, Encrypted data
Glossary 71
Glossary
ACU
Array Configuration Utility
Controller key
A key created by the controller and permanently saved to the Remote Key Manager after being wrapped by
the Master Encryption Key. This key is used on a temporary basis to alleviate potential bottlenecks to the
Remote Key Manager during volume creation/change events. Use of a Controller Key is on a temporary
basis only and is ultimately transitioned via a rekey operation to the appropriate Drive Encryption Key.
Controller-secured region
The section of a device where data and Critical Security Parameters can exist in an unencrypted format. This
boundary must be secured against tampering as acquiring this sensitive data may result in unauthorized
access to data.
Critical Security Parameters (CSPs)
An industry standard term referring to security related information such as keys, passwords, and so forth,
whose disclosure would compromise an encrypted system.
Crypto officer
Personnel who have permission to access the full range of encryption functions available on the controller.
This includes turning encryption on and off, resetting keys, importing Master Encryption Keys, and so forth.
Drive array
The group of physical drives containing a logical volume.
Drive encryption key
Key generated by the Smart Array controller for each physical drive that contains at least one encrypted
logical drive. The Drive Encryption Key for each physical drive is used to encrypt (wrap) the Volume
Encryption Keys for all of the logical drives resident on that physical drive.
Drive key caching
In Remote mode, the Drive Encryption Keys are typically stored on the Remote Key Manager. However, it is
possible to enable the controller to cache all of these Drive Encryption Keys necessary to decrypt attached
logical drives within the controller-secured region. This option is available to the user through HP SSA.
Encrypted data
Data that has been encrypted through the use of an encryption key.