EasyManua.ls Logo

Entrust nShield - 11.3.2. Compromised Key or Secret: Attacker has subverted memory of HSM; 11.3.3. Compromised Key or Secret: Pass phrase for softcard is compromised

Entrust nShield
90 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Softcard protected application keys
Module/Module Pool protected application keys
Recovery Action
Revoke application key and destroy the Security World, since all application keys in this
Security World must now be considered as compromised.
Destruction of the Security World is achieved by erasing/destroying the ACS.
Destroy the HSM as its integrity can no longer be guaranteed.
Create a different Security World on new/different HSMs (with a new ACS).
Note that erasing the ACS will prevent a lost/stolen backup being reloaded on to a new
HSM.
11.3.3. Compromised Key or Secret: Pass phrase for softcard is
compromised
Compromise Type
Lost or observed
Impact
The application keys protected by the softcard are under the control of the attacker
Recovery Action
Revoke application key protected by softcard. If unable to revoke the key, isolate the
HSM so that no system can use it.
Erase all copies of blobs associated with the application key protected by softcard in
kmdata/rfs/backups to prevent attacker trying to use keys with stolen pass phrase.
Create replacement application keys under new softcards.
11.3.4. Compromised Key or Secret: A quorum of OCS cards is
compromised
Compromise Type
Lost or stolen
Impact
The application keys protected by the OCS are under the control of the attacker
nShield® Security Manual 72 of 90

Table of Contents

Other manuals for Entrust nShield

Related product manuals