Chapter 10—Encryption and Key Management BlueScale Key Management
August 2017 User Guide—Spectra T50e Library
297
Bestpracticesdictatethatyoumakecopiesofthekeyimmediately
followingthekey’screation.Toensuresecurity,makesurethatyoutrack
eachcopyofanencryptionkey.
Decideonthenumberofcopiestomakeofeachkeyandkeeparecord
ofeachcopy’slocation.Considerstoringmultiplecopiesofkeys,that
youthentrackcarefully,storingthecopiesinseparateplacesandaway
fromthedataencryptedusingthosekeys.
Establishakeyrotationplanthatspecifieshowoftentocreateanduse
newkeys.Therotationplanmaybeasimpleschedulesuchaschanging
keysonceeverysixmonths,anddestroyingthekeysonlyafterthelast
setofdataencryptedusingthatkeyisoverwrittenordestroyed.
BlueScaleEncryptionStandardEditionstoresonekeyonthelibraryat
atime;youmustdeletethekeycurrentlyonthelibrarybeforeyoucan
createorimportanotherkey.ProfessionalEditionpermitsmultiple
keysperlibrary,withonekeyperencryption‐enabledpartition.
Establishaprocedurefortrackingmonikers.Makesureyoutrackthe
informationrequiredtoaccessandidentifykeys,alongwiththe
locationofstoreddatathatuseseachencryptionkey.Makesurethis
informationisnotstoredwiththeencrypteddata.Keepitonasystem
orinanarchivethatisnotavailableonanetwork.Foradditional
security,encryptthisinformationaswell.
Beforeyoudeleteakeyfromthelibrary,makesure thatatleastone
copywasexportedandstoredsecurely.Itisimportanttomakesure
thatatleastonecopyofeachkeyissecureandreadable(thatis,
uncorrupted),toensureyoucanrestoreyourdata.
Keepingacopyofanexportedkeyisessential;afterakeyisdeleted
fromthelibrary,itisnotrecoverable.Oncethekeyisgone,thedatais
inaccessible;forlegalandpracticalpurposesthedataistypically
consideredtobedeleted.
Process Testing and Exception Handling
Rundrillstoconfirmthatyourdataisbeingencryptedproperly,that
keysarestoredproperly,andthatyoucanrecoveryourdata.Makesure
thatthesedrillsareincludedwithyouroverallorganizationalsecurity
strategy.
As a matter of best practice, Spectra Logic recommends exporting encryption keys
to a USB device instead of using email.
Although emailing encryption keys is supported by the library, using email
presents security issues, including the following:
Copies of encryption keys may be left on the email servers used for sending and
receiving email and are thus subject to compromise.
The difficulty in verifying where all the copies of emailed encryption keys may
be located can make security audits more challenging.