White Papers

Table of contents
3 OpenManage Secure Enterprise Key Manager- Best Practices Guide | Document ID
Table of contents
Revisions............................................................................................................................................................................. 2
Acknowledgements ............................................................................................................................................................. 2
Table of contents ................................................................................................................................................................ 3
Executive summary ............................................................................................................................................................. 4
1 Landscape .................................................................................................................................................................... 5
2 Reference Architecture ................................................................................................................................................. 7
2.1 Definitions ........................................................................................................................................................... 7
3 Dell PowerEdge D@RE Offerings ................................................................................................................................ 9
3.1 How to Choose Between LKM and Secure Enterprise Key Manager ................................................................ 9
3.2 Compliance ....................................................................................................................................................... 10
4 Components of Secure Enterprise Key Manager....................................................................................................... 11
4.1 Secure Enterprise Key Manager Server ........................................................................................................... 11
4.2 iDRAC ............................................................................................................................................................... 11
4.3 PERC H740, H740P ......................................................................................................................................... 11
4.4 Storage devices (HDD/SSD) ............................................................................................................................ 12
5 Best Practices for Secure Enterprise Key Manager Implementations ....................................................................... 14
5.1 Protect and Ensure your Key Availability ......................................................................................................... 14
5.2 Other Considerations ........................................................................................................................................ 14
5.2.1 Grouping ........................................................................................................................................................... 14
5.2.2 Key Rotation ..................................................................................................................................................... 14
5.2.3 Secure Enterprise Key Manager to iDRAC Authentication .............................................................................. 15
5.2.4 Cryptographic Erase ......................................................................................................................................... 15
6 Other References ....................................................................................................................................................... 16
6.1.1 NIST Guidelines for Media Sanitization (Cryptographic Erase) -
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf ........................................................... 16
6.1.2 SafeNet Best Practices for Cryptographic Key Management white paper - www.safenetat.com/best-practices-
for-key-management .................................................................................................................................................. 16