beautypg.com

4 maintaining the skm, Backup and restore overview – HP Secure Key Manager User Manual

Page 85

background image

4 Maintaining the SKM

Backup and restore overview

Clustering SKM nodes is an effective way of exchanging keys and configuration data to allow for failover,

but it is not the complete solution for protecting the SKM environment. Perform regular backups of the SKM

nodes to ensure that your encryption solution is protected in a disaster-recovery scenario. In addition, if

connectivity between nodes is lost, even for a brief time, the nodes can become out-of-sync—one node

might have keys from a library that were not replicated across the cluster, for example. In this event, using

the backup utility is critical to being able to distribute the unreplicated keys to the other cluster nodes.

Because of this out-of-sync possibility, it is necessary to back up each SKM node, even in a clustered

environment. Since this could affect several nodes, some of which might be in offsite locations, it is best to

develop a way to automate those backups to make administering the SKMs easier.
The SKM provides three ways of backing up the keys and configuration. There are advantages

and disadvantages to each method.

Backing up internally to the SKM is the quickest and most secure way of running a backup, but

provides no disaster-recovery protection and must be performed manually.

Backup by downloading the data via browser (this encrypts and saves the data to the local

computer via the browser interface) provides disaster-recovery protection since the data is stored

outside the SKM and is OS independent (because the browser handles the transfer), but again

must be run manually.

Backup to an external server using SCP (secure file transfer) to copy the backup file provides both

disaster-recovery protection and the ability to be automated, but SCP is an older secure protocol

and, if the desire is to send the data to a Windows server, requires additional software as SCP is

not a recognized protocol on Windows. SCP still works to secure the backup data, however, and

so this method is the preferred solution for backing up the SKM.

To read more about how to copy settings between devices, please see

Services Configuration Page

.

The HP StorageWorks Secure Key Manager’s backup mechanism allows you to achieve two important

objectives: (1) back up information on the device to be restored in case of a failure, and (2) copy

configuration information between devices. Once a device is fully configured with networking

information, certificates, and user accounts, we recommend that the entire configuration be backed up.

Likewise, when you make changes to your configuration, update your backup files.
When restoring a backup, you can select which components of the backup file to restore. In general,

once you select which items to restore, the current settings for those items are cleared from the SKM

before the settings from the backup file are restored in their place. So if you restore a backup that

contains Users & Groups, you can expect that any settings you configured previously for Users & Groups

will be overwritten by the configuration from the backup file. No other configuration items are affected by

the restore operation.
Restoring keys, certificates, or local CAs, in contrast, is an additive process. The SKM adds the keys,

certificates, and local CAs from the backup file to the existing set of keys, certificates, and CAs. This is

because keys, certificates, and local CAs are unique cryptographic objects that cannot be recreated.
If one of these objects is being restored on a device where there is already a similar object with the same

name, the key, certificate, or local CA from the backup file overwrites the existing object.
Every backup file is protected with a key on the SKM and a password provided by the administrator.

Because a backup file may contain sensitive information, such as user accounts and certificates, we

recommend a reasonably long backup password.

Secure Key Manager

85