White Papers

Dell PowerEdge D@RE Offerings
10 OpenManage Secure Enterprise Key Manager- Best Practices Guide | Document ID
3.2 Compliance
Compliance and governance requirements, whether they be government mandated, industry standards, or
corporate policy, contain multiple requirements regarding encrypting data at rest and protection of the
corresponding cryptographic keys. Evaluation of compliance requirements should always be done to
determine if LKM is sufficient or if the features (high assurance key protection, centralize audit and
reporting, robust access control, etc.) offered through use of Secure Enterprise Key Manager with a Key
Management Servermeets compliance requirements.
-
-