Chapter 10—Encryption and Key Management BlueScale Key Management
August 2017 User Guide—Spectra T50e Library
302
High Security Site
Thefollowingtabledescribesthesecurityconsiderationsandthesuggested
encryptionconfigurationforanenterpriseorganization.
Security
Considerations
Strategy
Securitygoals Protectingallstoreddata.
Encryption
principals
ITseniorstaff,chiefoperatingofficer,chiefsecurityofficer,chieftechnology
officer.
Datatoencrypt All.
Levelofsecurityto
implement
BlueScaleProfessionalEdition,withmultiplekeys
SecureInitializationMode:Afterthelibrarypoweristurnedon,the
encryptionusermustenterthepasswordtoenablepartitionsdedicatedto
encryption
Multi‐usermode,withthreeencryptionpasswords
Datasetsrequiring
isolation
Eachdatasetisseparatelykeyed,asdefinedbythedepartmentgenerating
data.
Keyescrow
method
Storekeycopieswithtworemotecorporatelegalcounselofficesandalsowitha
paid,trustedthird‐partyescrowservice.
Copiesofeachkey
tostore,andthe
storedkey
locations
Keepthreecopiesofeachkey:storeoneatthemainofficeofcorporatelegal
counsel,twowiththekeyescrowservice.
Keyrotationplan Createanewkeyeverymonthforeachpartitiondedicatedtoencryption.
Trackingkey
monikersand
passwords
Sendtothekeyescrowserviceanencryptedfilewithencryptionaccess
passwordsandsuperuserpasswords.Sendtocorporatelegalofficealistof
passwordsusedtoexportkeys.Fileswiththisdatacannotbecreatedorstored
onanetworkedcomputer;deletefileorfilesfromthecomputeroncedata
is
transmittedsecurely.
Multiple
encryptionteams
(optional)
SeniorITadmin,chiefoperatingofficer,chiefsecurityofficer,chieftechnology
officer.
Scheduleandrun
drills
Quarterlyevaluationandreview,inconjunctionwithwidercorporatesecurity
plan.
Passwords Passwordstoaccessencryptionfeatures:minimumof15characters,
includingatleastonenumberandoneletter
Passwordtoexportandimportencryptionkeys:minimumof40characters,
includingatleastonenumberandoneletter