EasyManua.ls Logo

Spectra T50e - Page 300

Default Icon
539 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 10—Encryption and Key Management BlueScale Key Management
August 2017 User GuideSpectra T50e Library
297
Bestpracticesdictatethatyoumakecopiesofthekeyimmediately
followingthekey’screation.Toensuresecurity,makesurethatyoutrack
eachcopyofanencryptionkey.
Decideonthenumberofcopiestomakeofeachkeyandkeeparecord
ofeachcopy’slocation.Considerstoringmultiplecopiesofkeys,that
youthentrackcarefully,storingthecopiesinseparateplacesandaway
fromthedataencryptedusingthosekeys.
Establishakeyrotationplanthatspecifieshowoftentocreateanduse
newkeys.Therotationplanmaybeasimpleschedulesuchaschanging
keysonceeverysixmonths,anddestroyingthekeysonlyafterthelast
setofdataencryptedusingthatkeyisoverwrittenordestroyed.
BlueScaleEncryptionStandardEditionstoresonekeyonthelibraryat
atime;youmustdeletethekeycurrentlyonthelibrarybeforeyoucan
createorimportanotherkey.ProfessionalEditionpermitsmultiple
keysperlibrary,withonekeyperencryptionenabledpartition.
Establishaprocedurefortrackingmonikers.Makesureyoutrackthe
informationrequiredtoaccessandidentifykeys,alongwiththe
locationofstoreddatathatuseseachencryptionkey.Makesurethis
informationisnotstoredwiththeencrypteddata.Keepitonasystem
orinanarchivethatisnotavailableonanetwork.Foradditional
security,encryptthisinformationaswell.
Beforeyoudeleteakeyfromthelibrary,makesure thatatleastone
copywasexportedandstoredsecurely.Itisimportanttomakesure
thatatleastonecopyofeachkeyissecureandreadable(thatis,
uncorrupted),toensureyoucanrestoreyourdata.
Keepingacopyofanexportedkeyisessential;afterakeyisdeleted
fromthelibrary,itisnotrecoverable.Oncethekeyisgone,thedatais
inaccessible;forlegalandpracticalpurposesthedataistypically
consideredtobedeleted.
Process Testing and Exception Handling
Rundrillstoconfirmthatyourdataisbeingencryptedproperly,that
keysarestoredproperly,andthatyoucanrecoveryourdata.Makesure
thatthesedrillsareincludedwithyouroverallorganizationalsecurity
strategy.
Caution
As a matter of best practice, Spectra Logic recommends exporting encryption keys
to a USB device instead of using email.
Although emailing encryption keys is supported by the library, using email
presents security issues, including the following:
Copies of encryption keys may be left on the email servers used for sending and
receiving email and are thus subject to compromise.
The difficulty in verifying where all the copies of emailed encryption keys may
be located can make security audits more challenging.

Table of Contents

Other manuals for Spectra T50e

Related product manuals