HP StorageWorks Secure Key Manager Pre-installation survey and checklists, for connecting to ETLA libraries (AJ087-96012, November 2008)

banner
HP StorageWorks Secure Key Manager
Pre-installation survey and checklists, for
connecting to ETLA libraries
Use the survey and checklist to establish system-wide information and ensure proper conguration for the
Secure Key Man
ager (SKM) and the Enterprise Tape Libraries with Extended Tape Library Architecture
(ETLAs) to wh
ich the system is attached. This must be done before beginning system installation to
ensure success.
SKM pre-installation survey
The survey identies critical information HP needs to install and congure the HP Secure Key Manager
(SKM). The survey also identies prerequisites that must be in place prior to installation (for example,
ETLA library rmware versions and congurations), even though they are not part of the HP SKM
installation service. Finally, the survey includes areas which you should consider prior to installation in
order to ensure your security policies are not subject to disruption, and can continue to function without
interruption if a disruption does occur. This includes reviewing site requirements and guidelines for
planning backups of the SKM.
NOTE:
Standard installation consists of installing two appliances and enrolling one ETLA Tape Library at
one location. Requirements exceeding the standard service, such as installing additional appliances,
enrolling multiple ETLA Tape Libraries, complex or custom implementation, or integration activities can
be accommodated at additional cost.
Sourcing the SKM security ofcer (SO) role and ensuring installation support
TheSOrolewilldene and oversee the security policies for your data center, or even for the enterprise. If
you already have an SO and security polices, they will dene how the SKM integrates and enhances
those policies. With HP’s SKM and ETLA tape libraries, the SO may be responsible for ensuring
the installation meets your company’s business objectives. This includes ensuring the correct libraries
and drives are selected for encryption, and selecting the appropriate key generation policies for your
business. After installation, the SO may be responsible for auditing those policies, and determining when
policy changes are needed.
AJ087-96012
© Copyright 2007, 2008 Hewlett-Packard Development Company, L.P.
Printed in the US
The information in this document is subject to change without notice.
AJ087-96012
3nd edition: November 2008

Summary of content (9 pages)