beautypg.com

HP FIPS 140-2 User Manual

Page 2

background image

Security Policy, version 1.0

January 31, 2008

HP StorageWorks Secure Key Manager

Page 2 of 26

© 2008 Hewlett-Packard Company

This document may be freely reproduced in its original entirety.

Table of Contents

1

INTRODUCTION ...............................................................................................................................................5

1.1

P

URPOSE

.........................................................................................................................................................5

1.2

R

EFERENCES

...................................................................................................................................................5

2

HP STORAGEWORKS SECURE KEY MANAGER .....................................................................................6

2.1

O

VERVIEW

......................................................................................................................................................6

2.2

C

RYPTOGRAPHIC

M

ODULE

S

PECIFICATION

....................................................................................................6

2.3

M

ODULE

I

NTERFACES

....................................................................................................................................8

2.4

R

OLES

,

S

ERVICES

,

AND

A

UTHENTICATION

...................................................................................................11

2.4.1

Crypto Officer Role..............................................................................................................................11

2.4.2

User Role .............................................................................................................................................12

2.4.3

HP User Role.......................................................................................................................................13

2.4.4

Cluster Member Role ...........................................................................................................................14

2.4.5

Authentication......................................................................................................................................14

2.4.6

Unauthenticated Services ....................................................................................................................15

2.5

P

HYSICAL

S

ECURITY

....................................................................................................................................15

2.6

O

PERATIONAL

E

NVIRONMENT

......................................................................................................................15

2.7

C

RYPTOGRAPHIC

K

EY

M

ANAGEMENT

..........................................................................................................15

2.7.1

Keys and CSPs.....................................................................................................................................15

2.7.2

Key Generation ....................................................................................................................................19

2.7.3

Key/CSP Zeroization............................................................................................................................19

2.8

S

ELF

-T

ESTS

..................................................................................................................................................19

2.9

M

ITIGATION OF

O

THER

A

TTACKS

.................................................................................................................20

3

SECURE OPERATION ....................................................................................................................................21

3.1

I

NITIAL

S

ETUP

..............................................................................................................................................21

3.2

I

NITIALIZATION AND

C

ONFIGURATION

.........................................................................................................21

3.2.1

First-Time Initialization.......................................................................................................................21

3.2.2

FIPS Mode Configuration ...................................................................................................................21

3.3

P

HYSICAL

S

ECURITY

A

SSURANCE

................................................................................................................22

3.4

K

EY AND

CSP

Z

EROIZATION

........................................................................................................................24

3.5

E

RROR

S

TATE

...............................................................................................................................................24

ACRONYMS..............................................................................................................................................................25