HP Cisco MDS 9120 Cisco MDS 9000 Family Storage Media Encryption Configuration - Page 21

Transparent Fabric Service, Encryption, Cisco SME Roles

Page 21 highlights

Chapter 1 Product Overview About Cisco Storage Media Encryption Send documentation comments to [email protected] Transparent Fabric Service Cisco employs a Fibre Channel redirect scheme that automatically redirects the traffic flow to an MSM-18/4 module or an MDS 9222i switch anywhere in the fabric. There are no appliances in-line in the data path and there is no SAN rewiring or reconfiguration. Encryption Cisco SME uses strong, IEEE-compliant AES 256 encryption algorithms to protect data at rest. Advanced Cisco MDS 9000 SAN-OS and NX-OS software security features, such as Secure Shell (SSH), Secure Sockets Layer (SSL), RADIUS, and Fibre Channel Security Protocol (FC-SP) provide the foundation for the secure FIPS Level 3 architecture. Cisco SME uses the NIST-approved random number standard to generate the keys for encryption. Encryption and compression services are transparent to the hosts and storage devices. Cisco SME Roles Cisco SME services include the following four configuration and security roles: • Cisco SME Administrator • Cisco SME Storage Administrator • Cisco SME Key Management Center (KMC) Administrator • Cisco SME Recovery Officer The Cisco SME Administrator configures and maintains Cisco SME. This role can be filled by multiple storage network administrators. The Cisco SME Storage Administrators are responsible for Cisco SME provisioning operations and the Cisco SME KMC Administrators are responsible for the Cisco SME KMC administration operations. The security officer may be assigned the Cisco SME KMC Administrator role in some scenarios. Note Cisco SME Administrator role includes the Cisco SME Storage Administrator and the Cisco SME KMC Administrator roles. The Cisco SME Recovery Officers are responsible for key recovery operations. During Cisco SME configuration, additional Recovery Officers can be added. Cisco SME Recovery Officers play a critical role in recovering the key database of a deactivated cluster and they are responsible for protecting the master key. The role of the Cisco SME Recovery Officer separates master key management from Cisco SME administrations and operations. In some organizations, a security officer may be assigned to this role. At the advanced security level, a quorum of Cisco SME Recovery Officers is required to perform recovery procedures. The default is 2 out of 5. In this case 2 of the 5 recovery officers are required to unlock the master key. For additional information on Cisco SME Administrator and Cisco SME Recovery Officer roles, see the "Creating and Assigning Cisco SME Roles and Cisco SME Users" section on page 2-9. OL-18091-01, Cisco MDS NX-OS Release 4.x Cisco MDS 9000 Family Storage Media Encryption Configuration Guide 1-3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280

Send documentation comments to [email protected]
1-3
Cisco MDS 9000 Family Storage Media Encryption Configuration Guide
OL-18091-01, Cisco MDS NX-OS Release 4.x
Chapter 1
Product Overview
About Cisco Storage Media Encryption
Transparent Fabric Service
Cisco employs a Fibre Channel redirect scheme that automatically redirects the traffic flow to an
MSM-18/4 module or an MDS 9222i switch anywhere in the fabric. There are no appliances in-line in
the data path and there is no SAN rewiring or reconfiguration.
Encryption
Cisco SME uses strong, IEEE-compliant AES 256 encryption algorithms to protect data at rest.
Advanced Cisco MDS 9000 SAN-OS and NX-OS software security features, such as Secure Shell
(SSH), Secure Sockets Layer (SSL), RADIUS, and Fibre Channel Security Protocol (FC-SP) provide the
foundation for the secure FIPS Level 3 architecture.
Cisco SME uses the NIST-approved random number standard to generate the keys for encryption.
Encryption and compression services are transparent to the hosts and storage devices.
Cisco SME Roles
Cisco SME services include the following four configuration and security roles:
Cisco SME Administrator
Cisco SME Storage Administrator
Cisco SME Key Management Center (KMC) Administrator
Cisco SME Recovery Officer
The Cisco SME Administrator configures and maintains Cisco SME. This role can be filled by multiple
storage network administrators. The Cisco SME Storage Administrators are responsible for Cisco SME
provisioning operations and the Cisco SME KMC Administrators are responsible for the Cisco SME
KMC administration operations. The security officer may be assigned the Cisco SME KMC
Administrator role in some scenarios.
Note
Cisco SME Administrator role includes the Cisco SME Storage Administrator and the Cisco SME KMC
Administrator roles.
The Cisco SME Recovery Officers are responsible for key recovery operations. During Cisco SME
configuration, additional Recovery Officers can be added. Cisco SME Recovery Officers play a critical
role in recovering the key database of a deactivated cluster and they are responsible for protecting the
master key. The role of the Cisco SME Recovery Officer separates master key management from Cisco
SME administrations and operations. In some organizations, a security officer may be assigned to this
role.
At the advanced security level, a quorum of Cisco SME Recovery Officers is required to perform
recovery procedures. The default is 2 out of 5. In this case 2 of the 5 recovery officers are required to
unlock the master key.
For additional information on Cisco SME Administrator and Cisco SME Recovery Officer roles, see the
“Creating and Assigning Cisco SME Roles and Cisco SME Users” section on page 2-9
.