Planning for encryption involves purchasing a licensed function and
then activating and enabling the function on the system. The system supports two methods of configuring
encryption. You can use USB flash drives that contain encryption keys
or use a centralized key server to create and manage keys. Both of
these methods can be enabled at the same time to provide redundancy.
To
encrypt data that is stored on drives, the control enclosure on which
they are connected must contain an active license and be configured
to use encryption.When encryption is activated and
enabled on the system, valid encryption keys must be present on the
system when the system unlocks the drives or the user generates a
new key. If USB encryption is enabled on
the system, the encryption key must be stored on USB flash drives
that contain a copy of the key that was generated when encryption
was enabled. If key server
encryption is enabled on the system, the key is retrieved from the
key server.
If you are using
encryption to protect data that is copied to cloud storage, the cloud
account is always synchronized with the system encryption settings.
If both USB flash drives and key servers are configured, the cloud account that is created
supports both of these methods. If just one encryption method is configured
and the other is disabled, the cloud account supports encryption with
the remaining configured encryption method. To ensure that the cloud
account supports encryption, one or both methods must be configured
with active keys when the cloud account is created.
If a cloud account is
created with one encryption method, you can configure the second method
later, but the cloud account must be online while the configuration
occurs. After the second method is configured, the cloud account will
support both key providers.
To
use encryption on the system, you must purchase an encryption license, activate the license on the
system, enable encryption, and create copies of the keys. If you have not purchased a license,
contact a customer representative to purchase an encryption license.To use encryption on the system, an encryption license is required for each
enclosure that supports encryption. Only certain models support encryption.
Before you activate and enable encryption,
you must determine the method of accessing key information during
times when the system requires an encryption key to be present. The
system requires an encryption key to be present during the following
operations:
- System power-on
- System restart
- User initiated rekey operations
- System recovery
- Removal or replacement of self-encrypting drives
Several factors must be considered
when planning for encryption.
- The correct hardware model is installed.
- Physical security of the system
- Need and benefit
of manually accessing encryption keys when the system requires
- Availability of
key data
- Encryption license is purchased,
activated, and enabled on the system
- If you are using IBM Security Key
Lifecycle Manager to create and manage keys, ensure that you are using
version 2.7.0 or later that supports multiple master key servers which
automatically replicate keys to all configured key servers. The system
also supports one master (primary) key server and secondary key servers;
however, replication is a manual process and during rekey operations,
keys are not available until replication is completed.
- If you are using
Gemalto SafeNet KeySecure key servers to create and manage keys, determine
whether the system needs a user name and password to authenticate
to the KeySecure key servers. If you plan to use a user name and
password to authenticate the system to these key servers, you must
configure user credentials for authentication in the KeySecure interface.
For KeySecure versions of 8.10 and up, administrators can configure
a user name and password to authenticate the system when it connects.
Before version KeySecure 8.10, the use of a password is optional.
Key server encryption
Key servers provide useful features that make them desirable to use such as being responsible for
encryption key generation, backups, and following an open standard that aids interoperability. When
planning for key server encryption, the following items are important to consider.
- SSL certificates
- Certificates are the primary method that the key server uses to authenticate a client (for
example,a system node), and that the client uses to authenticate the key server in order to verify that
access to the keys stored in the key server is permitted. The authentication of the client ensures
that the key server does not give access to keys to any party that is not trusted. The
authentication of the key server ensures that the client does not ask for sensitive keys to be
stored by a party that is not trusted. The
system requires a server
certificate to allow it to communicate with the IBM Security Key Lifecycle Manager server. As part of the process of
provisioning a key server, the user must export the certification authority (CA) certificate
required to authenticate the key server's certificate and install it in
the system. All of the IBM Security Key Lifecycle Manager key servers can be configured to use
a single CA certificate (which is used for all key severs) or configured so that each individual key
server has its own self-signed certificate. Furthermore, the user must install the system
certificate onto each key server, and the IBM Security Key Lifecycle Manager administrator can then accept the
certificate to grant the system access to the key server. Implementation of key server encryption
requires that there be an external key server to generate keys and act as a repository for those
keys.
- System requirements
- Only one type of key server is supported at this time. The system implements the Key Management
Interoperability Protocol (KMIP) that is sent over an SSL connection between the client and the
server. Support is provided for self-signed and CA-signed certificates.
The
system validates the server's SSL certificate and conforms to the KMIP standard. Existing SAS hardware needs access to at least one master key to unlock and needs
to be able to respond to key server master keys. Enabling key servers for the first
time is a simple procedure. Once key server encryption is enabled, the type can be configured and
enabled, server end-points can be created, and then the keys can be prepared and committed.
- Security requirements
- Security of all key server communications is governed by the TLS 1.2 protocol. Encryption keys
are clustered in the system using TLS 1.2.
The
system uses AES-128 encryption that uses OpenSSL library interfaces.
- IP addresses and ports
All nodes that want to communicate with key servers must have their service IP address
configured. A node must have its full service IP stack configured (address, gateway, mask) in order
for that node to be a candidate for attempting to contact the key server. Key servers are typically
set up on a private LAN, and this requires enforcement of service IP addresses. If only a subset of
nodes have service IP addresses set, then those nodes without a service IP address log an error. The
IP address that the user supplies must be the one that
the
system uses to communicate with the key server.
Each key server has a TCP port associated with its access. Since a key server serves multiple
clients,
the
system allows the user to use a different port for each server and enables access for this port when
required. KMIP server conformance mandates that TCP port 5696 be supported, so this is the default
port for the server end point.
- Key generation policy and key database
If key server encryption is enabled, then the key server generates and manages the master keys.
The node generates all other keys.
The key database can be clustered or unclustered depending on the type of key server that is
used. For unclustered key servers, the user needs to consider backup and replication of the key
database. IBM Security Key Lifecycle Manager is an example of a key
server product where replication must be configured in order for encryption keys to be shared
automatically between IBM Security Key Lifecycle Manager instances.
Without replication configured, manual backup and restore operations must be used. Other products
might self-replicate, so other key server instances automatically have any new keys created. For IBM Security Key Lifecycle Manager, complete backups and restores by
following the IBM Security Key Lifecycle Manager user guide.
- Update requirements for key server encryption
If encryption was enabled on a pre-7.8.0 code level system and the system
is updated to code level 7.8.x or above, you must run a USB rekey operation to enable key server
encryption. Use the
management GUI or run the
chencryption command before you enable key server encryption. To perform a rekey
operation, use the
management GUI or run the
following commands.
chencyrption-usb newkey-key preparechencryption-usb newkey-key commit
The rekey operation must be run after the update is completed to the 7.8.x
code level or higher and before you attempt to enable key server encryption.