beautypg.com

1 introduction, 1 purpose, 2 references – HP FIPS 140-2 User Manual

Page 5

background image

Security Policy, version 1.0

January 31, 2008

HP StorageWorks Secure Key Manager

Page 5 of 26

© 2008 Hewlett-Packard Company

This document may be freely reproduced in its original entirety.

1 Introduction

1.1 Purpose

This document is a non-proprietary Cryptographic Module Security Policy for the HP StorageWorks Secure Key
Manager (SKM) from Hewlett-Packard Company. Federal Information Processing Standards (FIPS) 140-2, Security
Requirements for Cryptographic Modules
, specifies the U.S. and Canadian Governments’ requirements for
cryptographic modules. The following pages describe how HP’s SKM meets these requirements and how to use the
SKM in a mode of operation compliant with FIPS 140-2. This policy was prepared as part of the Level 2 FIPS 140-2
validation of the HP StorageWorks Secure Key Manager.

More information about FIPS 140-2 and the Cryptographic Module Validation Program (CMVP) is available at the
website of the National Institute of Standards and Technology (NIST):

http://csrc.nist.gov/groups/STM/cmvp/index.html

.

In this document, the HP StorageWorks Secure Key Manager is referred to as the SKM, the module, or the device.

1.2 References

This document deals only with the operations and capabilities of the module in the technical terms of a FIPS 140-2
cryptographic module security policy. More information is available on the module from the following sources:

• The HP website (

http://www.hp.com

) contains information on the full line of products from HP.

• The CMVP website (

http://csrc.nist.gov/groups/STM/cmvp/index.html

) contains contact information for

answers to technical or sales-related questions for the module.