EasyManua.ls Logo

Entrust nShield - User Manual

Entrust nShield
90 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
nShield®
Security Manual
12.80
17 Nov 2021

Table of Contents

Other manuals for Entrust nShield

Question and Answer IconNeed help?

Do you have a question about the Entrust nShield and is the answer not in the manual?

Entrust nShield Specifications

General IconGeneral
TypeHardware Security Module (HSM)
Cryptographic AlgorithmsAES, RSA, ECC, SHA, DES, 3DES
CertificationFIPS 140-2 Level 3, Common Criteria EAL4+
InterfacesEthernet, USB, PCIe
Form FactorNetwork-attached, PCIe card, USB device
Remote ManagementYes, via web interface or CLI
Tamper ResistanceTamper evident, tamper resistant
Operating Temperature0°C

Summary

1. Introduction

1.1. Who should read this document?

Identifies the target audience for the nShield Security Manual.

1.2. Products covered by this manual

Lists the nShield product variants covered by this document.

1.3. Product security objective

Outlines the security goals and benefits provided by the nShield product range.

2. Supply and Transportation

2.1. Trusted delivery

Procedures for ensuring the secure and verifiable delivery of nShield products.

2.2. Tamper inspection

Steps for inspecting nShield hardware for signs of tampering upon receipt.

3. Environment

3.1. HSM function and architecture

Explains the role, architecture, and capabilities of nShield HSMs.

3.2. HSM environment controls

Guidelines for ensuring secure configuration and examination of HSM deployment environments.

4. Commissioning

4.1. Preparation

Steps and considerations before commissioning an nShield HSM.

4.2. Installation

Guidance on installing nShield software components and bundles.

4.3. Hardware

Information on the physical hardware components and their setup.

4.4. Network configuration

Instructions for configuring network settings for HSM connectivity.

4.5. Date and Time

4.5.1. Set the nShield Solo and nShield Connect Real-Time Clock (RTC)

Procedures for setting accurate time sources for HSMs.

4.5.2. Set the nShield Connect date and time

Guidance on synchronizing nShield Connect time with NTP sources.

4.5.3. Set the Host date and time (nShield Solo only)

Instructions for setting host system date and time.

4.6. nShield Connect and client configuration

4.6.1. Configuring the Ethernet interfaces - IPv4 and IPv6

How to configure network interfaces for nShield Connect.

4.6.2. Optionally configure hardserver interfaces

How to adjust hardserver listening interfaces for specific network needs.

4.6.3. Impath resilience

Configuration of Impath resilience settings for network error recovery.

4.6.4. Configuring the RFS

Steps for setting up the Remote File System (RFS) for backups.

4.7. Logging and debugging

4.7.1. Set up logging

Guidance on identifying and implementing logging requirements for nShield platforms.

4.7.7. Debugging options

Information on enabling and using debugging features, with security considerations.

4.8. Configure access control

4.8.1. Security World key protection options

Overview of access control mechanisms for protecting keys in a Security World.

4.9. Configure Security World

4.9.1. Security World options

Details on choosing and configuring Security World options during creation.

4.9.2. Application interfaces

Configuring application interfaces for integration with Security World.

4.9.3. Nonvolatile memory (NVRAM) options

Guidance on using NVRAM for key storage and its limitations.

4.10. Remote services

4.10.1. Remote Administration Service (RAS)

Setting up and using the Remote Administration Service (RAS).

4.10.2. Remote Operator

How to use the Remote Operator feature for secure smart card transmission.

4.11. SEE

5. Access Control

5.1. Security World access control architecture

Describes access control options within a Security World and their pros/cons.

5.1.1. Security World access control

How Administrator Card Sets (ACS) protect Security World configuration and operations.

5.1.2. Application key access control

Details the three levels of application key protection.

5.2. Security World access control guidance

Guidance on configuring and managing Security World access controls.

5.2.1. Administrator Card Set (ACS) protection

5.2.1.1. NSO-timeout guidance

Advice on setting the NSO-timeout parameter for ACS quorum authorization.

5.2.1.2. Creating and maintaining a quorum

How to create and manage quorum rules for ACS card sets.

5.2.1.3. Card management guidance

Best practices for assigning, storing, and managing ACS cards.

5.2.2. Module protection

5.2.3. Softcard protection

5.2.4. Logical token pass phrase guidance

5.2.5. OCS protection

5.2.5.1. Creating and maintaining a quorum

Guidance on creating and maintaining quorum rules for OCS card sets.

5.2.5.2. Card management guidance

Best practices for storing and managing OCS cards.

5.2.5.3. Persistence and non-persistence for OCS

Explains OCS persistence modes and their security implications.

5.2.5.4. Application independence

Managing OCSs for application independence and mitigating risks.

5.3. Application keys

5.3.1. ACL restrictions for key wrapping;encapsulation keys

Setting ACLs for key wrapping/de-encapsulation to prevent misuse.

5.4. nShield Connect front panel

5.6. Role holder lifecycle guidance

5.6.1. Roles

Identifying roles and assigning minimum required access rights for HSM usage.

5.6.1.1. Windows user privileges

Understanding Windows user privileges for HSM access and administration.

5.6.1.2. Linux user privileges

Understanding Linux user privileges for HSM access and administration.

5.6.2. Access rights withdrawn

Procedures for rescinding access rights for role holders.

5.6.3. Dos and donts for access control mechanisms

6. Operation

6.1. Patching policy

Establishing and implementing a policy for nShield firmware and OS patching.

6.3. Operator Card Set (OCS) quorum configurations

Configuring quorum settings for Operator Card Sets (OCS).

6.4. NVRAM key storage

6.5. RFS - configuring auto push

6.6. Security World replacement options

6.7. Host platform and client applications

6.8. Preload utility

6.9. Discarding keys

6.10. Erasing a module from a Security World

6.11. Replacing an OCS

6.12. Replacing the ACS

6.13. Firmware upgrade

6.14. Enabling and disabling remote upgrade

6.15. Migrating keys to a v3 Security World

7. Key Management

7.1. Key management schema

Overview of the Security World infrastructure for managing cryptographic keys.

7.2. Security World security strengths

Explains security strength representation and available modes.

7.3. Application keys algorithms and key sizes

Guidance on selecting algorithms and key sizes for application keys.

7.4. Cryptoperiods

Defines cryptoperiods and rules for their application to keys.

7.5. Generating random numbers and keys

7.6. Key backup

7.7. Key import

7.8. Key separation

7.9. Installing the nShield JCA;JCE CSP

7.10. nShield PKCS #11 library

7.10.1. Symmetric encryption

Using the library for symmetric encryption operations.

7.10.2. PKCS #11 library with Security Assurance Mechanism

Using SAM to identify weaknesses in PKCS #11 applications.

8. Physical Security

8.1. nShield Edge physical security controls

Physical security features of the nShield Edge.

8.2. nShield Solo+ physical security controls

Physical security features of the nShield Solo+.

8.3. nShield Solo XC physical security controls

Physical security, tamper detection, and response for nShield Solo XC.

8.4. nShield Connect physical security controls

8.4.1. Tamper event

Explains tamper detection and response for the nShield Connect.

8.4.1.1. nShield Connect lid is closed

Handling tamper events when the nShield Connect lid is closed.

8.4.1.2. nShield Connect lid is open

Handling tamper events when the nShield Connect lid is open.

8.4.1.3. Physical security checks

Steps to check the physical security of the nShield Connect.

8.4.1.4. Disabling tamper detection and response functionality

8.5. nShield card readers

8.6. Tamper inspection

9. Audit

9.1. HSM and card reader location

Procedures for recording and verifying HSM and card reader locations.

9.1.1. Physical inspection

Physical inspections during location verification, including tamper mechanisms.

9.2. ACS and OCS

Procedures for recording and verifying ACS and OCS card locations or owners.

9.3. Logs

Types of logs available and their protection mechanisms.

9.4. Audit logging

9.5. Audit Logging time

10. Support and Maintenance

10.1. Security Advisories

How Entrust publishes security advisories and recommended actions.

10.2. Application and Operating System patching

Importance of updating systems in line with a patching policy.

10.3. Connect fan tray module and PSU maintenance

Maintenance procedures for user-replaceable parts on nShield Connect.

10.4. Solo XC fan and battery maintenance

Maintenance for Solo XC fan and battery.

10.5. Maintenance mode

10.6. Troubleshooting

10.7. Contacting Entrust nShield Support

11. Security Incident and Response

11.1. Security incident monitoring

Events and activities to monitor for security incidents.

11.2. Security incident management

Actions to take when a security incident is suspected.

11.3. Security incident impact and response

Impact of compromises and required recovery actions.

11.3.1. Compromised Key or Secret: A brute force attack on blobbed key outside of module

11.3.2. Compromised Key or Secret: Attacker has subverted memory of HSM

11.3.3. Compromised Key or Secret: Pass phrase for softcard is compromised

11.3.4. Compromised Key or Secret: A quorum of OCS cards is compromised

11.3.5. Compromised Key or Secret: A quorum of ACS cards is compromised

11.3.6. Compromised Key or Secret: Soft KNETI

11.3.7. Compromised Key or Secret: nToken KNETI

11.3.8. Compromised Key or Secret: nShield Connect KNETI

11.3.9. Compromised Key or Secret: Soft KNETI

11.3.10. Compromised Key or Secret: nToken KNETI

11.3.11. Compromised Key or Secret: Imported application keys

11.4. Deleting a Security World

11.5. Module failure

11.6. Tamper incident

12. Decommission and Disposal

12.1. nShield Connect and nShield Solo

Secure decommissioning and disposal procedures for HSMs.

12.1.2. Security World

Erasing Security World data and software from decommissioned HSMs.

Appendix A: Abbreviations

Appendix B: Glossary

Access Control List (ACL)

Specifies operations and authorization for key objects.

Administrator Card Set (ACS)

Controls access to Security World configuration, recovery, and replacement.

Advanced Encryption Standard (AES)

Block cipher adopted as an encryption standard by the US government.

Audit logging

Control messages added to log entries for auditing.

Data Encryption Standard (DES)

Symmetric cipher approved by NIST for specific government messages.

Diffie-Hellman

Public key algorithm used for key exchange.

Digital Signature Algorithm (DSA)

Digital signature mechanism approved by NIST.

Federal Information Processing Standards (FIPS)

Standards for cryptographic security modules by US government.

hardware security module (HSM)

Device for securely holding cryptographic keys and software.

nShield Remote Administration Card

Smart cards for secure connections with HSMs.

nShield Trusted Verification Device

Smart card reader for confirming Electronic Serial Number.

Operator Card Set (OCS)

Set of smart cards controlling access to application keys.

Remote Administration

Feature enabling card holders to present cards to remote HSMs.

Security World

Infrastructure for secure lifecycle management of keys.

Tamper Detection

Mechanisms indicating potential tamper occurrences.

Tamper Response

Automatic reaction to detected tamper.

Related product manuals