HP StorageWorks XP Command View Advanced Edition Common Component Security Guide Description and Operator's Guide (T1780-96308, July 2009)
Overview of Security Setup and Operation
8
1-2-1-1 Storage management software
The storage management software is included in HP StorageWorks XP Command View Advanced
Edition and is described subsection 1-3-3 .
1-2-1-2 HP StorageWorks XP Command View Advanced Edition Common
Component (CVAE)
This software provides the base module that implements the common functionality for the storage
management software included in HP StorageWorks XP Command View Advanced Edition.
1-2-2 HP StorageWorks XP Command View Advanced
Edition Common Component Security Functions
This section provides an overview of the three security functions that have been evaluated based on
ISO/IEC 15408 for HP StorageWorks XP Command View Advanced Edition Common Component.
1-2-2-1 Identification and authentication
This function performs authentication by using authentication information (user ID and
corresponding password), and maintains the session governed by the result of the authentication
process. This function also controls access to permission information through identification and
authentication.
1-2-2-2 Management
This function sets account information, permission information, and banner information. It also sets
security parameters. When the management function sets information or parameters, it controls
access through identification and authentication.
1-2-2-3 Warning banner
This function provides warning message data to the storage management software included in HP
StorageWorks XP Command View Advanced Edition.
1-3 Security Policy for Creating and Operating
the System
To protect the system from threats, the system must be built and operated according to the security
policy described below, and the security functions must be used correctly. Note that, if the security
functions are not used correctly, the system is no longer subject to evaluations based on ISO/IEC
15408.
Table 1-1 lists the items required for the security policy.
Table 1-1 Items Required for the Security Policy
No. Item See: Operation that must be performed
according to the security policy
1 System creation and operation
performed by a reliable system
creator who has the required
knowledge
System operation performed by
reliable administrators who have the
required knowledge
1-3-1
--
2 Hardware management in the center
1-3-2 Installing Hardware (see section 3-2 )