.Part 5 Storage Security Best Practices and Support Information HP SAN Design Reference Guide 785355-001
• Centralized encryption key management for HP LT04 tape libraries
Automatic policy-based key generation and management supporting key and cartridge
granularity
◦
◦ ISV transparent key archival and retrieval for multiple libraries
◦ Extensible to emerging open standards
• Strong auditable security for encryption keys to ensure compliance
Hardened server appliance◦
◦ Secure identity-based access, administration, and logging
◦ Designed for FIPS 140-2 validation
• Reliable lifetime key archival, which ensures key availability, even in the event of a site disaster
Automatic multiple-site clustering, key encryption, and failover◦
◦ Comprehensive backup and restore functions for keys
◦ Redundant device components and active alerts
Secure Key Manager validation process
The HP CLW enhances the Secure Key Manager validation process.
The CLW features include:
• High-performance appliance with the following modules: Log Manager, Analysis Manager,
and Real-time Alert Manager
• High-speed collection and analysis of log data, which automates compliance reporting for
industry and government standards
Integration of key management with partners
Secure Key Manager can be integrated with third-party and partner products (such as the C-series
SME) to provide a standard enterprise data security solution.
382 Storage security