
Security Policy, version 1.0
January 31, 2008
HP StorageWorks Secure Key Manager
Page
5
of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
1 Introduction
1.1 Purpose
This document is a non-proprietary Cryptographic Module Security Policy for the HP StorageWorks Secure Key
Manager (SKM) from Hewlett-Packard Company. Federal Information Processing Standards (FIPS) 140-2,
Security
Requirements for Cryptographic Modules
, specifies the U.S. and Canadian Governments’ requirements for
cryptographic modules. The following pages describe how HP’s SKM meets these requirements and how to use the
SKM in a mode of operation compliant with FIPS 140-2. This policy was prepared as part of the Level 2 FIPS 140-2
validation of the HP StorageWorks Secure Key Manager.
More information about FIPS 140-2 and the Cryptographic Module Validation Program (CMVP) is available at the
website of the National Institute of Standards and Technology (NIST):
http://csrc.nist.gov/groups/STM/cmvp/index.html
.
In this document, the HP StorageWorks Secure Key Manager is referred to as the
SKM
, the
module
, or the
device
.
1.2 References
This document deals only with the operations and capabilities of the module in the technical terms of a FIPS 140-2
cryptographic module security policy. More information is available on the module from the following sources:
•
The HP website (
http://www.hp.com
) contains information on the full line of products from HP.
•
The CMVP website (
http://csrc.nist.gov/groups/STM/cmvp/index.html
) contains contact information for
answers to technical or sales-related questions for the module.