beautypg.com

High security procedures, Configuring the skm for fips compliance – HP Secure Key Manager User Manual

Page 159

background image

IMPORTANT:

Modifying

any

of the items in the Security Settings Configured Elsewhere section immediately takes the

SKM out of FIPS compliance.

Figure 95 Viewing the Security Settings Configured Elsewhere section

The following table describes the components of the Security Settings Configured Elsewhere section.

Table 74 Security Settings Configured Elsewhere section components

Component

Description

Allow Key and

Policy Configuration

Operations

Displays the value of the Allow Key and Policy Configuration Operations field in

the KMS Server Settings section. When enabled, users can configure keys and

authorization policies through the XML Interface. Click the link to access the KMS

Server Settings section. For FIPS compliance, this functionality must be disabled,

or SSL must be enabled.

Allow Key Export

Displays the value of the Allow Key Export field in the KMS Server Settings section.

When enabled, users can export keys from the SKM through the XML Interface.

Click the link to access the KMS Server Settings section. For FIPS compliance, this

functionality must be disabled, or SSL must be enabled.

User Directory

Displays the value of the User Directory field in the KMS Server Authentication

Settings section, which determines whether the KMS Server uses a local directory

or an LDAP server. Click the link to access the KMS Server Authentication Settings

section. For FIPS compliance, a local user directory must be used.

Allowed SSL Protocols

Displays the SSL Protocols enabled in the SSL Options section. Click the link to

access the SSL Options section. FIPS compliance requires that SSL 2.0 and SSL

3.0 be disabled.

Enabled SSL Ciphers

Indicates the security strength of the SSL ciphers enabled in the SSL Cipher Order

section. Click the link to access the SSL Cipher Order section. On FIPS capable

devices, this field indicates if the enabled SSL ciphers permit FIPS compliance and, if

not, what is preventing compliance. For FIPS compliance, you must disable ciphers

with key sizes smaller than 128-bits and all RC4 ciphers.

High Security Procedures

This section describes the procedures for managing the high security features of SKM.
It explains the following processes:

Configuring the Key Manager for FIPS Compliance
Configuring the High Security Settings on a Key Manager

Configuring the SKM for FIPS Compliance

The HP DL360 R05 can be configured to comply with FIPS 140-2, Level 2 standards.
To configure the SKM for FIPS compliance:

Secure Key Manager

159