Chapter 10—Encryption and Key Management BlueScale Key Management
August 2017 User Guide—Spectra T50e Library
307
8. ClickNexttomovetothenextpartitionconfigurationscreen.Navigate
throughtheremainingpartitionconfigurationscreensbyclickingNext.
9. WhenyoureachtheSummaryscreen,clickSave.Alldatasenttothis
partitionisencryptedusingthekeyyouselected.
10. Accesstheencryptionfeatureandconfirmthatthelistedkeysreflect
theassignmentsyoujustcompleted.
Exporting and Protecting Encryption Keys
Ensuringthatyouhaveabackupofallkeysusedinthelibraryanda
recordofthepasswo rdforeachexportedkeyisessentialtoensuringthat
youcanrecoverencrypteddata.Forsafe‐keepingandsecurity,exportthe
encryptionkeyandstoreitinasafe,securelocationsothatyoucanimport
itbackintothelibraryifneeded.
Overview
Decryptingencrypteddatarequiresboththeencryptionkeyandthe
encryptionkeypasswordusedtoprotecttheencryptionkeywhenitis
exported.Toensurethatthekeysareprotected,usetheExportKeyoption
describedinthissectiontoexportencryptionkeystoaUSBdeviceassoon
aspossibleafteryoucreatethem.
Best Practice
SpectraLogicrecommendsthatyouexporteachencryptionkeytoatleast
twodifferentUSBdevicesandstoretheminseparatelocations.Remember,
lostencryptionkeyscannotberecreated;youshouldkeepthemassecure
(andasbackedup)asyourdata.
Data cannot be recovered without the encryption key used to encrypt the data, so
protecting encryption keys is extremely important to data decryption and recovery.
To decrypt and restore encrypted data, you need the data, the encryption key, and
the encryption key password used to protect the exported key and data.
Backup files of the library configuration include any encryption keys that were
stored in the library at the time the file was created.
As a matter of best practice, Spectra Logic recommends exporting encryption keys
to a USB device instead of using email.
Although emailing encryption keys is supported by the library, using email
presents security issues, including the following:
Copies of encryption keys may be left on the email servers used for sending and
receiving email and are thus subject to compromise.
The difficulty in verifying where all of the copies of emailed encryption keys
may be located can make security audits more challenging.