Spectra Stack Tape Library User Manual page 131

Table of Contents

Advertisement

CHAPTER 3 - CONFIGURING AND USING ENCRYPTION
• Track every copy of each key. This tracking is critical in order to meet
requirements that may govern data retention and data destruction. Destroying all
exported copies of keys associated with encrypted data AND deleting the keys
from the library is sufficient to satisfy data destruction requirements, since
encrypted data cannot be accessed without the key used to encrypt it.
• Spectra Logic recommends tracking the information listed in the following table
for every key that you create. For added security, encrypt the file containing the
tracking information.
Key moniker:
Number of key copies:
Location of each copy:
Password(s) associated with exported
copy of the moniker:
Location of cartridges containing data
encrypted using this moniker:
Moniker creation date:
Planned expiration date:
JANUARY 2023
131
SPECTRA STACK LIBRARY
USER GUIDE

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Stack Tape Library and is the answer not in the manual?

Questions and answers

Table of Contents

Save PDF