Security Policy, version 1.0
January 31, 2008
HP StorageWorks Secure Key Manager
Page
12
of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
Service
Description
Keys/CSPs
Perform first-time
initialization
Configure the module when it is used for the
first time
Crypto Officer (admin) password
– write;
Kdsa public/private – write;
Krsa private – write;
Krsa private – write;
Log signing RSA key – write;
Log signature verification RSA
key – write;
KRsaPub – write;
KRsaPriv – write.
Upgrade firmware
Upgrade firmware (firmware must be FIPS-
validated)
Firmware upgrade key – read
Configure FIPS mode
Enable/disable FIPS mode
None
Manage keys
Manage all client keys that are stored within
the module. This includes the generation,
storage, export (only public keys), import, and
zeroization of keys.
Client keys – write, read, delete;
PKEK – write, read, delete.
Manage clusters
Manage all clusters that are defined within
the module. This includes the creation,
joining, and removal of a cluster from the
module.
Cluster Member passwords –
write, delete
Manage services
Manage all services supported by the
module. This includes the starting and
stopping of all services.
None
Manage operators
Create, modify, or delete module operators
(Crypto Officers and Users).
Crypto Officer passwords –
write, delete; User passwords –
write, delete
Manage certificates
Create/import/revoke certificates
KRsaPub – write, read, delete;
KRsaPriv – write, read, delete;
CARsaPub – write, read, delete;
CARsaPriv – write, read, delete;
Client RSA public keys – read.
Reset factory settings
Rollback to the default firmware shipped with
the module
All keys/CSPs – delete
Restore default
configuration
Delete the current configuration file and
restores the default configuration settings
None
Restore configuration
file
Restore a previously backed up configuration
file
None
Backup configuration
file
Back up a configuration file
None
Zeroize all keys/CSPs
Zeroize all keys and CSPs in the module
All keys and CSPs – delete
2.4.2 User
Role
The User role is associated with external applications or clients that connect to the KMS via its XML interface.
Users in this role may exercise services—such as key generation and management—based on configured or
predefined permissions. See Table 7 – User Services for details. The keys and CSPs in the rightmost column
correspond to the keys and CSPs introduced in Section 2.7.1.