HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 195

Re-keying best practices and policies, Manual re-key, Latency in re-key operations

Page 195 highlights

Re-keying best practices and policies 5 Re-keying best practices and policies Re-keying should be done only when necessary. In key management systems, DEKs are never exposed in an unwrapped or unencrypted state. You must re-key if the master key is compromised. The practice of re-keying should be limited to the following cases: • Master key compromise. • Insider security breaches. • As a general security policy as infrequently as every six months or once per year. When using LKM, DEKs are accessible only to privileged users, and can be compromised only by an insider breach of security. Manual re-key Ensure that the link to the key management system is up and running before you attempt a manual re-key. Latency in re-key operations Host I/O for regions other than the current re-key region has no latency during a re-key operation. Host I/O for the region where the current re-key is happening has minimal latency (a few milliseconds) because I/O is held until re-key is complete. The I/O sync links (the Ethernet ports labeled Ge0 and Ge1) must be configured, and must both be connected to the I/O sync LAN to enable proper handling of re-key state synchronization in high availability (HA cluster) configurations. Allow re-key to complete before deleting a container Do not delete a crypto container while re-key is in session or if re-key is not completed. If you want to delete a container, use the command cryptocfg --show -rekey -all to display the status of re-key sessions. If any re-key session is not 100% completed, do not delete the container. If you do delete the container before re-key is complete, and subsequently add the LUN back as cleartext, all data on the LUN is destroyed. Re-key operations and firmware upgrades All nodes in an encryption group must be at the same firmware level before starting a re-key or first time encryption operation. Make sure that existing re-key or first time encryption operations complete before upgrading any of the encryption products in the encryption group, and that the upgrade completes before starting a rekey or first time encryption operation. Fabric OS Encryption Administrator's Guide 177 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
177
53-1001864-01
Re-keying best practices and policies
5
Re-keying best practices and policies
Re-keying should be done only when necessary. In key management systems, DEKs are never
exposed in an unwrapped or unencrypted state. You must re-key if the master key is compromised.
The practice of re-keying should be limited to the following cases:
Master key compromise.
Insider security breaches.
As a general security policy as infrequently as every six months or once per year.
When using LKM, DEKs are accessible only to privileged users, and can be compromised only by an
insider breach of security.
Manual re-key
Ensure that the link to the key management system is up and running before you attempt a manual
re-key.
Latency in re-key operations
Host I/O for regions other than the current re-key region has no latency during a re-key operation.
Host I/O for the region where the current re-key is happening has minimal latency (a few
milliseconds) because I/O is held until re-key is complete. The I/O sync links (the Ethernet ports
labeled Ge0 and Ge1) must be configured, and must both be connected to the I/O sync LAN to
enable proper handling of re-key state synchronization in high availability (HA cluster)
configurations.
Allow re-key to complete before deleting a container
Do not delete a crypto container while re-key is in session or if re-key is not completed. If you want
to delete a container, use the command
cryptocfg --show -rekey –all
to display the status of re-key
sessions. If any re-key session is not 100% completed, do not delete the container. If you do delete
the container before re-key is complete, and subsequently add the LUN back as cleartext, all data
on the LUN is destroyed.
Re-key operations and firmware upgrades
All nodes in an encryption group must be at the same firmware level before starting a re-key or first
time encryption operation. Make sure that existing re-key or first time encryption operations
complete before upgrading any of the encryption products in the encryption group, and that the
upgrade completes before starting a rekey or first time encryption operation.