EasyManuals Logo
Home>Entrust>Security System>nShield

Entrust nShield User Manual

Entrust nShield
90 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #71 background imageLoading...
Page #71 background image
11.3. Security incident impact and response
The sections below identifies the impact of various compromises on keys or secrets and
the recovery action required.
Under Recovery Action the term revoke is used to indicate that the compromised key
must no longer be trusted or used. The terms revoke or revocation are normally used in
regard to digital certificates (normally containing public keys), where methods exist to
indicate that a certified key can no longer be trusted. However, this manual will apply the
term to all compromised keys.
11.3.1. Compromised Key or Secret: A brute force attack on blobbed
key outside of module
Impact
Application key is compromised and must not be used:
OCS protected application keys
Softcard protected application keys
Module/Module Pool protected application keys
Recovery Action
Revoke application key and destroy the Security World, since all applications keys in this
Security World must now be considered as compromised.
Destruction of the Security World is achieved by erasing/destroying the ACS and re-
initializing all the HSMs to a different Security World (with a new ACS).
Alternatively, to mitigate the present threat, the HSMs can be put into pre-initialization
mode whilst business recovery procedures are implemented prior to creating a new
Security World.
Note that erasing the ACS will prevent a lost/stolen backup being reloaded on to a new
HSM.
11.3.2. Compromised Key or Secret: Attacker has subverted memory of
HSM
Impact
Application key is compromised and must not be used:
OCS protected application keys
nShield® Security Manual 71 of 90

Table of Contents

Other manuals for Entrust nShield

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Entrust nShield and is the answer not in the manual?

Entrust nShield Specifications

General IconGeneral
BrandEntrust
ModelnShield
CategorySecurity System
LanguageEnglish

Related product manuals