HP Cisco MDS 9020 Cisco MDS 9000 Family Storage Media Encryption Configuration - Page 31

Cisco Storage Media Encryption Security Overview, Additional Security Capabilities

Page 31 highlights

Chapter 1 Product Overview Cisco Storage Media Encryption Security Overview Send documentation comments to [email protected] • Each FC-redirected target can be zoned to 16 hosts or less. • CFS should be enabled on all required switches for FC-redirect. • Cisco SME servers and tape devices should not be part of an IVR zone set. • Advanced zoning capabilities like quality of service (QoS), logical unit number (LUN) zoning, and read-only LUNs must not be used for FC-Redirect hosts and targets. Cisco Storage Media Encryption Security Overview Cisco SME transparently encrypts and decrypts data inside the storage environment without slowing or disrupting business critical applications. Cisco SME generates a master key, tape volume keys and tape keys. The keys are encrypted in a hierarchical order: the master key encrypts the tape volume keys and the tape keys. They are also copied to the key catalog on the Cisco KMC server for backup and archival. Eventually inactive keys are removed from the fabric, but they are retained in the Cisco KMC catalog. The keys can be retrieved automatically from the Cisco KMC by the Cisco SME services in the fabric if needed again. A single Cisco KMC can be used as a centralized key repository for multiple fabrics with Cisco SME services if desired. Key catalog import and export capabilities are also provided to accommodate moving tape media to different fabrics in environments with multiple Cisco KMC servers. Backup applications can be used to archive the key catalogs for additional protection. Additional Security Capabilities Additional security capabilities offered by Cisco NX-OS complete the Cisco SME solution. For example, RADIUS and TACACS+ servers can be used to authenticate, authorize, and provide accounting (AAA) for Cisco SME administrators. Management of Cisco SME can be limited to authorized administrators using role based access controls (RBAC). When communication occurs, secure shell (SSHv2) protocol is used to provide message integrity and privacy. The Cisco MDS 9000 Family is certified to meet Common Criteria (CC) EAL3 and Federal Information Processing Standard (FIPS) 140-2 level 2. To meet FIPS 140-2 level 3 Certification requirements for the critical Cisco SME services, the MSM-18/4 has the cryptographic engine and related memory devices encapsulated to prevent tampering. Any attempt at tampering the system is guaranteed to destroy the sensitive data. In addition, critical security parameters never leave the system unencrypted. OL-18091-01, Cisco MDS NX-OS Release 4.x Cisco MDS 9000 Family Storage Media Encryption Configuration Guide 1-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280

Send documentation comments to [email protected]
1-13
Cisco MDS 9000 Family Storage Media Encryption Configuration Guide
OL-18091-01, Cisco MDS NX-OS Release 4.x
Chapter 1
Product Overview
Cisco Storage Media Encryption Security Overview
Each FC-redirected target can be zoned to 16 hosts or less.
CFS should be enabled on all required switches for FC-redirect.
Cisco SME servers and tape devices should not be part of an IVR zone set.
Advanced zoning capabilities like quality of service (QoS), logical unit number (LUN) zoning, and
read-only LUNs must not be used for FC-Redirect hosts and targets.
Cisco Storage Media Encryption Security Overview
Cisco SME transparently encrypts and decrypts data inside the storage environment without slowing or
disrupting business critical applications.
Cisco SME generates a master key, tape volume keys and tape keys. The keys are encrypted in a
hierarchical order: the master key encrypts the tape volume keys and the tape keys. They are also copied
to the key catalog on the Cisco KMC server for backup and archival. Eventually inactive keys are
removed from the fabric, but they are retained in the Cisco KMC catalog. The keys can be retrieved
automatically from the Cisco KMC by the Cisco SME services in the fabric if needed again.
A single Cisco KMC can be used as a centralized key repository for multiple fabrics with Cisco SME
services if desired. Key catalog import and export capabilities are also provided to accommodate moving
tape media to different fabrics in environments with multiple Cisco KMC servers. Backup applications
can be used to archive the key catalogs for additional protection.
Additional Security Capabilities
Additional security capabilities offered by Cisco NX-OS complete the Cisco SME solution. For
example, RADIUS and TACACS+ servers can be used to authenticate, authorize, and provide accounting
(AAA) for Cisco SME administrators. Management of Cisco SME can be limited to authorized
administrators using role based access controls (RBAC). When communication occurs, secure shell
(SSHv2) protocol is used to provide message integrity and privacy.
The Cisco MDS 9000 Family is certified to meet Common Criteria (CC) EAL3 and Federal Information
Processing Standard (FIPS) 140-2 level 2. To meet FIPS 140-2 level 3 Certification requirements for the
critical Cisco SME services, the MSM-18/4 has the cryptographic engine and related memory devices
encapsulated to prevent tampering. Any attempt at tampering the system is guaranteed to destroy the
sensitive data. In addition, critical security parameters never leave the system unencrypted.