
Security Policy, version 1.0
January 31, 2008
HP StorageWorks Secure Key Manager
Page
15
of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
in 60 seconds. Since 10
-5
» 6×60
-8
, the probability of a successful password attempt in 60 seconds is considerably
less than 10
-5
.
2.4.6 Unauthenticated
Services
The following services do not require authentication:
•
SNMP statistics
•
FIPS status services
•
Health check services
•
Network Time Protocol (NTP) services
•
Initiation of self-tests by rebooting the SKM
•
Negotiation of the XML protocol version for communications with the KMS
SNMP is used only for sending statistical information (SNMP traps). FIPS status and health check are status-report
services, unrelated to security or cryptography. NTP is a date/time synchronization service that does not involve
keys or CSPs. Initiation of self-tests and negotiation of the XML protocol version do not involve keys or CSPs.
2.5 Physical Security
The module was tested and found conformant to the EMI/EMC requirements specified by Title 47 of the Code of
Federal Regulations, Part 15, Subpart B, Unintentional Radiators, Digital Devices, Class A (that is, for business
use).
The HP StorageWorks Secure Key Manager is a multi-chip standalone cryptographic module. The entire contents of
the module, including all hardware, software, firmware, and data, are enclosed in a metal case. The case is opaque
and must be sealed using tamper-evident labels in order to prevent the case cover from being removed without signs
of tampering. All circuits in the module are coated with commercial standard passivation. Once the module has been
configured to meet FIPS 140-2 Level 2 requirements, the module cannot be accessed without signs of tampering.
See Section 3.3 – Physical Security Assurance of this document for more information.
2.6 Operational Environment
The operational environment requirements do not apply to the HP StorageWorks Secure Key Manager—the module
does not provide a general purpose operating system and only allows the updating of image components after
checking an RSA signature on the new firmware image. Crypto Officers can install a new firmware image on the
SKM by downloading the image to the SKM. This image is signed by an RSA private key (which never enters the
module). The SKM verifies the signature on the new firmware image using the public key stored in the module. If
the verification passes, the upgrade is allowed. Otherwise the upgrade process fails and the old image is reused.
2.7 Cryptographic Key Management
2.7.1
Keys and CSPs
The SSH and TLS protocols employed by the FIPS mode of the module are security-related. Table 11 – List of
Cryptographic Keys, Cryptographic Key Components, and CSPs for SSH and Table 12 – List of Cryptographic
Keys, Cryptographic Key Components, and CSPs for TLS, introduce cryptographic keys, key components, and
CSPs involved in the two protocols, respectively.
Table 11 – List of Cryptographic Keys, Cryptographic Key Components, and CSPs for SSH
Key
Key Type
Generation / Input
Output
Storage
Zeroization
Use