EasyManua.ls Logo

Entrust nShield - 7.7. Key import; 7.8. Key separation

Entrust nShield
90 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
matter if an attacker obtained this data because all sensitive data is protected by the
Security World key, stored in your HSM, and the Administrator cards for that Security
World.
In terms of cryptoperiods (see above) keys that have reached the end of the
cryptoperiod and therefore no longer exist on the nShield HSM may still exist on
backups. If feasible then the backup data should also be deleted. However, if the backups
have to be maintained for operational, resilience, or audit reasons, then ensure that the
relevant procedural controls are implemented to mitigate attacks on retired keys.
7.7. Key import
We recommend generating a new key instead of importing an existing key whenever
possible. The import operation does not delete any copies of the imported key material
from the host, and as traces of this key material may still exist on disks or in backups,
there is a risk that the key material may become compromised after it has been
imported. It is your responsibility to ensure any unprotected key material is deleted. If a
key was compromised before importation, then importing it does not make it secure
again.
7.8. Key separation
Key separation (i.e. each key only has a single purpose) is an important security principle
which is re-enforced in nShield by having different key types for different purposes (e.g.
ECDHPrivate/ECDHPublic for Elliptic Curve (EC) Key-Establishment keys and
ECDSAPrivate/ECDSAPublic for EC signing/verification keys).
There is a use case where a static EC private Key-Establishment key will also be used to
sign a CSR to request an (initial) certificate for the associated static EC public Key-
Establishment key. For this particular use case, the keyType ECPrivate/ECPublic should be
used for the EC Key-Establishment key, with a specialized ACL allowing the ECPrivate
key to be used for a single signing (OpPermissions:Sign), and then key-establishment
(OpPermissions:Decrypt).
When the ACL is used to enforce a single signature operation, this
signature must be performed before the key is initially
persisted/blobbed.
7.9. nShield JCA/JCE CSP
nShield® Security Manual 53 of 90

Table of Contents

Other manuals for Entrust nShield

Related product manuals