A SERVICE OF

logo

Security Policy, version 1.0 January 31, 2008
HP StorageWorks Secure Key Manager
Page 21 of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
3 Secure Operation
The HP StorageWorks Secure Key Manager meets Level 2 requirements for FIPS 140-2. The sections below
describe how to place and keep the module in the FIPS mode of operation.
3.1 Initial Setup
The device should be unpacked and inspected according to the User Guide. The User Guide also contains
installation and configuration instructions, maintenance information, safety tips, and other information. The device
itself must be affixed with tamper-evident labels that are included in the packaging. See Figure 8 – Tamper-
Evidence Labels for locations of tamper-evidence labels.
3.2 Initialization and Configuration
3.2.1 First-Time Initialization
When the module is turned on for the first time, it will prompt the operator for a password for a default Crypto
Officer. The module cannot proceed to the next state until the operator provides a password that conforms to the
password policy described in Section 2.7.1. The default username associated with the entered password is “admin”.
During the first-time initialization, the operator must configure minimum settings for the module to operate
correctly. The operator will be prompted to configure the following settings via the serial interface:
Date, Time, Time zone
IP Address/Netmask
Hostname
Gateway
Management Port
3.2.2 FIPS Mode Configuration
In order to comply with FIPS 140-2 Level 2 requirements, the following functionality must be disabled on the SKM:
Global keys
File Transfer Protocol (FTP) for importing certificates and downloading and restoring backup files
Lightweight Directory Access Protocol (LDAP) authentication
Use of the following algorithms: RC4, MD5, DES, RSA-512, RSA-768
SSL 3.0
Hot-swappable drive capability
RSA encryption and decryption operations (note, however, that RSA encryption and decryption associated
with TLS handshakes and Sign and Sign Verify are permitted)
These functions need not be disabled individually. There are two approaches to configuring the module such that it
works in the Approved FIPS mode of operation:
Through a command line interface, such as SSH or serial console, the Crypto Officer should use the fips
compliant command to enable the FIPS mode of operation. This will alter various server settings as described
above. See Figure 6 – FIPS Compliance in CLI. The fips server command is used for the FIPS status server
configuration. The show fips status command returns the current FIPS mode configuration.