White Papers

Overview
5 OpenManage Secure Enterprise Key Manager- Best Practices Guide | Document ID
1 Overview
The Dell Technologies whitepaper “Cyber Resilient Security in 14
th
generation of Dell EMC PowerEdge
servers” describes the numerous threats and the Dell Technologies design and tools that are used to address
them. Table 1 describes how Dell Technologies addresses common threat vectors.
Common Threat Vectors
Security layer Threat vector
Dell Technologies
Solution
Addressed
by Local
Key
Manager
Addressed by
Secure
Enterprise Key
Manager
Physical server
Server tampering
Physical deterrents
including…
Yes Yes
Server theft Secure Enterprise Key
Manager protects your
data when the server is
removed from the
network, the keys
required to unlock the
drives will not be
available from the central
key server.
No Yes
Firmware and
software
Firmware
corruption, malware
injection
Silicon-based
Root of Trust;
Intel Boot Guard;
AMD Secure
Root-of-Trust
Cryptographically
signed and
validated
firmware;
Yes Yes
Software
Updates provided by Dell
Technologies
Yes Yes
Attestation trust
features
Server identity
spoofing
TPM, TXT, Chain of
Trust
Yes Yes
Server management
Rogue configuration
and updates,
unauthorized open-
port attacks
iDRAC9
Yes Yes