
7. Installing and Activating Encryption in Spectra T50 Libraries
81
Best Practices
To effectively use BlueScale Encryption and to ensure data security, plan an encryption
strategy and back it up with processes and best practices. Once you’ve implemented
BlueScale Encryption, build custom strategies based on your security requirements.
Sound key management policies and procedures and appropriate staff are essential to
successful encryption.
People
Identify the people at your site who are responsible for backing up data. They will be
responsible for encrypting data written to tape and to other portable media. Identify:
• The person to have superuser privileges on the Spectra Logic library with BlueScale
Encryption.
• The person to have the library’s encryption password.
Next, identify how many users are to have responsibilities that involve encryption. It may be
wise to have more than a single user familiar with passwords, depending on the size of your
organization, so that if one person is not available, another can take over. Make sure only the
authorized users know the encryption passwords, and that the passwords themselves are
secure. Refer to
Passwords and Other Identifiers
on page 83 for more information on setting
up passwords and monikers.