White Papers
4 Key Encryption in Lifecycle Controller
Contents
Revisions .................................................................................................................................................................................................. 2
Executive Summary ............................................................................................................................................................................... 5
Introduction ............................................................................................................................................................................................ 5
Pre-requisits ............................................................................................................................................................................................ 5
Local Key Encryption ............................................................................................................................................................................ 5
Encrypting Unsecure Virtual Disks .................................................................................................................................................. 10
Rekeying Controller and Encrypted Disks with a New Local Key ............................................................................................. 12
Removing Encryption and Deleting Data ....................................................................................................................................... 15