Chapter 10—Encryption and Key Management BlueScale Key Management
August 2017 User Guide—Spectra T50e Library
316
Trackeverycopyofeachkey.Thistrackingiscriticalinordertomeet
requirementsthatmaygoverndataretentionanddatadestruction.
Destroyingallexportedcopiesofkeysassociatedwithencrypteddata
ANDdeletingthekeysfromthelibraryissufficienttosatisfydata
destructionrequirements,sinceencrypteddatacannotbeaccessed
withoutthekeyusedtoencryptit.
SpectraLogicrecommendstrackingtheinformationlistedinthe
followingtableforeverykeythatyoucreate.Foraddedsecurity,
encryptthefilecontainingthetrackinginformation.
Restoring Encrypted Data
Overview Restoringencrypteddatafromacartridgefollowsthestandard
datarestoreprocessesthatyouusewithyourstorage management
software.Theonlydifferenceisthatthekeyusedtoencryptthedatabeing
restoredneedstobestoredinthelibraryandassignedtothepartitionin
whichtheencryptedcartridgeisloaded.Ifthekeyisalreadystoredonthe
library,thedataisautomaticallydecryptedasitisreadfromtape;ifthe
encryptionkeyisnotcurrentlystoredonthelibrary,itmustbeimported
beforethedatacanbedecrypted.Oncetherequiredencryptionkeyis
assigned
tothepartition,standardrestoreproceduresareunchanged.
Three Passwords to Access Import Key Functions IfyouhaveBlueScale
ProfessionalEditionandyouenabledMulti‐Usermode,twoofthethree
encryptionpasswordsarerequiredtoaccesstheimportkeyfunction.See
ConfiguretheUserMode(BlueScaleProfessionalOnly)onpage285)and
ConfiguretheSecureInitializationMode(BlueScaleOnly)onpage286for
informationaboutenablingMulti‐Usermodeandconfiguringthelibrary
tosupportmultipleencryptionpasswords.
Key moniker:
Number of shares (if any):
Number of key copies:
Location of each copy:
Password(s) associated with exported copy of
the moniker:
Location of cartridges containing data that
are encrypted using this moniker:
Moniker creation date:
Planned expiration date: