White Papers

2 Dell PS Series Architecture: Self Encrypting Drive Management with PS Series Storage Arrays | TR1093
Table of Contents
1 Introduction ................................................................................................................................................................... 4
2 SED technology overview ............................................................................................................................................ 6
2.1 Protecting data from unauthorized access ......................................................................................................... 6
2.2 Instant Secure Erase .......................................................................................................................................... 8
3 Securing data with SED technology on PS Series arrays ............................................................................................ 9
3.1 Key management................................................................................................................................................ 9
3.2 Instant Secure Erase (ISE) ................................................................................................................................. 9
3.3 Security Scenarios Covered by AutoSED ........................................................................................................ 10
3.4 Security scenarios not covered by AutoSED .................................................................................................... 10
4 Summary .................................................................................................................................................................... 12
A PS Series SED storage procedures ........................................................................................................................... 13
A.1 Backing up the access key using the PS Series Group Manager GUI ............................................................ 13
A.2 Unlocking a Self-Encrypting Drive .................................................................................................................... 13
B Frequently Asked Questions ...................................................................................................................................... 15
C Key terms and glossary .............................................................................................................................................. 17
C.1 Glossary ............................................................................................................................................................ 17
D Technical Support and resources............................................................................................................................... 18
D.1 Related resources............................................................................................................................................. 18