Dell PowerVault TL4000 Dell PowerVault ML6000 Encryption Key Manager User's - Page 16

Application-Managed Tape Encryption - user s guide

Page 16 highlights

Data Path Data Path Policy or Application Library a14m0252 Policy Library Drive Interface Figure 1-2. Two possible locations for encryption policy engine and key management. Application Layer An application program, separate from the key manager, initiates data transfer for tape storage. See "Application-Managed Tape Encryption" for supported applications. Library Layer The enclosure for tape storage, such as the Dell PowerVault TL2000/TL4000 and ML6000 family. A modern tape library contains an internal interface to each tape drive within it. Application-Managed Tape Encryption This method is best where operating environments run an application already capable of generating and managing encryption policies and keys. Policies specifying when encryption is to be used are defined through the application interface. The policies and keys pass through the data path between the application layer and the encrypting tape drives. Encryption is the result of interaction between the application and the encryption-enabled tape drive, and does not require any changes to the system and library layers. Since the application manages the encryption keys, volumes written and encrypted using the application method can only be read using the application-managed encryption method, by the same application that wrote them. Encryption Key Manager is not required by, or used by, application-managed tape encryption. The following minimum version applications can be used to manage encryption: v CommVault Galaxy 7.0 SP1 v Symantec Backup Exec 12 1-4 Dell Encryption Key Mgr User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

Application Layer
An application program, separate from the key manager, initiates data transfer
for tape storage. See “Application-Managed Tape Encryption” for supported
applications.
Library Layer
The enclosure for tape storage, such as the Dell PowerVault TL2000/TL4000
and ML6000 family. A modern tape library contains an internal interface to
each tape drive within it.
Application-Managed Tape Encryption
This method is best where operating environments run an application already
capable of generating and managing encryption policies and keys. Policies
specifying when encryption is to be used are defined through the application
interface. The policies and keys pass through the data path between the application
layer and the encrypting tape drives. Encryption is the result of interaction
between the application and the encryption-enabled tape drive, and does not
require any changes to the system and library layers. Since the application
manages the encryption keys, volumes written and encrypted using the application
method can only be read using the application-managed encryption method, by
the same application that wrote them.
Encryption Key Manager is not required by, or used by, application-managed
tape encryption.
The following minimum version applications can be used to manage encryption:
v
CommVault Galaxy 7.0 SP1
v
Symantec Backup Exec 12
Library
Library Drive Interface
Application
Policy
Policy
or
Data Path
Data Path
a14m0252
Figure 1-2. Two possible locations for encryption policy engine and key management.
1-4
Dell Encryption Key Mgr User's Guide