Viewing Master Key Ids; Zeroizing An Encryption Engine - Brocade Communications Systems Brocade 8/12c Administrator's Manual

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

2

Zeroizing an encryption engine

Viewing master key IDs

When the master key has been backed up multiple times, you can use this feature to view the
associated key IDs.
To view master key IDs, follow these steps:
1. Select Configure > Encryption from the menu task bar.
2. Select a group from the Encryption Center Devices table, then select Group > Security from the
3. From the Master Key Action list, select Master Key IDs.
FIGURE 74

Zeroizing an encryption engine

Zeroizing is the process of erasing all data encryption keys and other sensitive encryption
information in an encryption engine. You can zeroize an encryption engine manually to protect
encryption keys. No data is lost because the data encryption keys for the encryption targets are
stored in the key vault.
Zeroizing has the following effects:
88
The Encryption Center dialog box displays.
menu task bar, or right-click a group and select Security.
The Encryption Group Properties dialog box displays with the Security tab selected.
The Master Key IDs dialog box displays.
Master Key IDs dialog box
All copies of data encryption keys kept in the encryption switch or encryption blade are erased.
Internal public and private key pairs that identify the encryption engine are erased and the
encryption switch or the encryption blade is in the FAULTY state.
All encryption operations on this engine are stopped and all virtual initiators (VI) and virtual
targets (VT) are removed from the fabric's name service.
The master key is erased from the encryption engine.
Once enabled, the encryption engine is able to restore the necessary data encryption keys
from the key vault when the master key is restored.
Fabric OS Encryption Administrator's Guide
53-1002159-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents