HPE - A00018950en - Us - HPE Smart Array SR Secure Encryption Installation and User Guide
HPE - A00018950en - Us - HPE Smart Array SR Secure Encryption Installation and User Guide
User Guide
Abstract
This document includes feature, installation, and configuration information about HPE Smart Array SR Secure Encryption
and is for the person who installs, administers, and troubleshoots servers, compute modules, and storage systems. Hewlett
Packard Enterprise assumes you are qualified in the servicing of computer equipment and trained in recognizing hazards
in products with hazardous energy levels.
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise
products and services are set forth in the express warranty statements accompanying such products and services.
Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable
for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying.
Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and
Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no
control over and is not responsible for information outside the Hewlett Packard Enterprise website.
Acknowledgments
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States
and/or other countries.
Contents
Overview............................................................................................................................. 5
About HPE Secure Encryption.................................................................................................................................................................................5
Benefits................................................................................................................................................................................................................ 5
Solution components....................................................................................................................................................................................6
Planning............................................................................................................................ 12
Encryption setup guidelines...................................................................................................................................................................................12
Recommended security settings at remote sites.......................................................................................................................................12
Encrypted backups...................................................................................................................................................................................................... 13
Security domains...........................................................................................................................................................................................................13
Deployment scenarios................................................................................................................................................................................................13
Remote and local key management requirements.................................................................................................................. 13
Configuration................................................................................................................... 14
Local Key Management Mode...............................................................................................................................................................................14
Configuring the controller (local mode).........................................................................................................................................14
Express Local Encryption.......................................................................................................................................................................16
Remote Key Management Mode..........................................................................................................................................................................17
Configuring Remote Key Management Mode............................................................................................................................ 18
Configuring the controller (remote mode)...................................................................................................................................36
Changing from Local Key Management Mode to Remote Key Management Mode............................................................. 38
Operations........................................................................................................................ 39
Accessing Encryption Manager............................................................................................................................................................................39
Opening Encryption Manager .............................................................................................................................................................39
Logging into Encryption Manager.................................................................................................................................................... 39
Managing passwords..................................................................................................................................................................................................40
Set or change the Crypto Officer password.................................................................................................................................40
Set or change the password recovery question........................................................................................................................40
Set or change user account password............................................................................................................................................ 41
Set or change the controller password...........................................................................................................................................42
Suspending the controller password............................................................................................................................................... 43
Resuming the controller password................................................................................................................................................... 43
Working with keys........................................................................................................................................................................................................ 44
Changing the Master Encryption Key............................................................................................................................................. 44
Rekeying the Drive Encryption Keys............................................................................................................................................... 45
Rescanning keys.......................................................................................................................................................................................... 45
Enabling Encryption Key Manager Authentication.................................................................................................................46
Volatile keys................................................................................................................................................................................................... 46
Creating a plaintext volume................................................................................................................................................................................... 50
Converting plaintext volumes into encrypted volumes......................................................................................................................... 53
Changing key management modes....................................................................................................................................................................54
Enabling/disabling plaintext volumes.............................................................................................................................................................. 55
Enabling/disabling the firmware lock............................................................................................................................................................... 55
Enabling/disabling local key cache.....................................................................................................................................................................56
3
Importing drive sets in Local Key Management Mode........................................................................................................................... 57
Importing drives with different Master Keys.............................................................................................................................. 57
Maintenance..................................................................................................................... 59
Controllers.........................................................................................................................................................................................................................59
Clearing the controller..............................................................................................................................................................................59
Replacing an encrypted controller.................................................................................................................................................... 59
Replacing a server while retaining the controller.....................................................................................................................59
Preconfiguring replacement components.................................................................................................................................... 59
Flashing firmware........................................................................................................................................................................................59
Drives...................................................................................................................................................................................................................................60
Replacing a physical drive......................................................................................................................................................................60
Groups.................................................................................................................................................................................................................................60
Locating groups associated with a drive.......................................................................................................................................60
Displaying log information...................................................................................................................................................................................... 68
Running queries.............................................................................................................................................................................................................70
Troubleshooting..............................................................................................................74
Common issues.............................................................................................................................................................................................................. 74
Lost or forgotten Crypto Officer password..................................................................................................................................74
Lost or forgotten controller password............................................................................................................................................74
Lost or forgotten Master Key...............................................................................................................................................................75
Forgotten which Master key goes with which drive.................................................................................................................................78
Logical drives remain offline.................................................................................................................................................................................. 78
Master key not exporting.........................................................................................................................................................................................78
Testing the connection between iLO and the ESKM ..............................................................................................................................79
Potential errors encountered.................................................................................................................................................................................81
Clearing the encryption configuration..............................................................................................................................................................83
Appendix.......................................................................................................................... 87
Encryption algorithms................................................................................................................................................................................................87
Glossary............................................................................................................................ 88
4
Overview
About HPE Secure Encryption
HPE Secure Encryption is a controller-based, enterprise-class data encryption solution that protects data at rest on bulk
storage hard drives and SSDs attached to a compatible HPE Smart Array Controller. The solution is compatible with the
HPE Secure Key Manager, and can operate with or without the presence of a key manager in the environment, depending
on individual customer settings.
Secure Encryption provides encryption for data at rest as an important component for complying with sensitive data
protection requirements including PCI-DSS, HIPAA/HITECH, Sarbanes/Oxley, and state privacy laws. Secure Encryption
secures any data deemed sensitive and requiring extra levels of protection through the application of XTS-AES 256-bit
data encryption. Many companies under government regulations require that sensitive privacy data be secured and
uncompromised using NIST-approved algorithms and methodologies for key management. Secure Encryption is validated
for FIPS-140-2 Level 2 for Smart Array Px3x controllers and is validated for FIPS 140-2 Level 1 for Smart Array Px4x
controllers and Smart Array Gen10 P-Class RAID controllers. For more information about the controllers that have been
validated, see the Cryptographic Module Validation Program (CMVP) on the National Institute of Standards and
Technology website.
Secure Encryption requires the following core components:
Secure Encryption can operate in Remote Key Management Mode, or Remote Mode, through the use of a separate,
clustered, appliance-based server called the Utimaco Enterprise Secure Key Manager. The Utimaco ESKM manages all
encryption keys throughout the data center. When utilizing the ESKM, the communication path between the ESKM and
the Smart Array Controller is established through the HPE iLO interface. The controller communicates with the ESKM as
new keys are generated and old keys are retired. The ESKM acts as a key vault where all keys are managed through a web
browser interface. For more information about the ESKM, see " Enterprise Secure Key Manager ." For more information
about iLO connectivity, see "iLO."
The following additional components are required for operating Secure Encryption in Remote Mode:
• Integrated Lights Out (iLO) Advanced or Scale Out Edition license, per ProLiant server
• Enterprise Secure Key Manager
Secure Encryption can also operate without an attached key management solution through Local Key Management Mode,
or Local Mode.
Benefits
Broad encryption coverage
Overview 5
• Encrypts data on both the attached bulk storage and the cache memory of Smart Array Controllers
• Supports any hard drive or SSD in the Smart Drive portfolio for ProLiant Gen8 or later servers or the Supported
Storage Enclosures
Solution components
HPE Smart Storage Administrator
The HPE SSA is a configuration and management tool for HPE Smart Array controllers. Starting with HPE ProLiant Gen8
servers, HPE SSA replaces ACU with an enhanced GUI and additional configuration features.
The HPE SSA exists in three interface formats: the HPE SSA GUI, the HPE SSA CLI, and HPE SSA Scripting. Although all
formats provide support for configuration tasks, some of the advanced tasks are available in only one format.
Some HPE SSA features include the following:
• Supports online array capacity expansion, logical drive extension, assignment of online spares, and RAID or stripe size
migration
• Provides diagnostic and SmartSSD Wear Gauge functionality on the Diagnostics tab
• For supported controllers, provides access to additional features.
For more information about HPE SSA, see the Hewlett Packard Enterprise website.
Minimum requirements
For minimum operating system requirements to run any SSA format, see the Hewlett Packard Enterprise website.
Minimum video requirements to run the SSA GUI include a minimum monitor resolution of 1024x768 and 16-bit color.
The GUI supports the following browsers:
Overview 6
• Mozilla Firefox 9.0 or later
• Microsoft Internet Explorer 8.0 or later
• Google Chrome
• HPE Smart Array Gen10 E-class (E208i-a, for example) and P-class (P408i-a, for example) controllers
• Smart Array PX3X and PX4X controllers
• HPE HX4X Smart HBAs operating in RAID mode
For more information about controllers supporting Secure Encryption, see the Hewlett Packard Enterprise website.
For more information about Smart Array controllers, see the appropriate Smart Array controller user guide on the Hewlett
Packard Enterprise website.
Encryption features
Most Secure Encryption features and security settings are available through HPE Smart Storage Administrator. Additional
features for Remote Mode deployments are available through Enterprise Secure Key Manager and Integrated Lights Out
(iLO).
Table Continued
Overview 7
Feature Description Notes
Table Continued
Overview 8
Feature Description Notes
Overview 9
HPE Smart Array SR SmartCache
HPE Smart Array SR SmartCache can be used in conjunction with Secure Encryption. HPE Smart Array SR SmartCache
enables solid state drives to be used as caching devices for hard drive media. Data can be accessed from the solid state
drive instead of hard drives. Data stored on the SmartCache drive utilizes the same encryption methods and keys as the
originating volume where the data is permanently stored, extending protection to the SmartCache drives.
SmartCache provides the following features:
SmartCache requires a SmartCache license. For more information, or to obtain a license, see the Hewlett Packard
Enterprise website.
HPE iLO
iLO Management is a set of embedded management features that support the complete life cycle of the server, from initial
deployment, to ongoing management, to service alerting and remote support.
The iLO subsystem is a standard component of HPE ProLiant servers that simplifies initial server setup, server health
monitoring, power and thermal optimization, remote server administration, and key exchanges between the ESKM and the
Smart Array Controller. The iLO subsystem includes an intelligent microprocessor, secure memory, and a dedicated
network interface. This design makes iLO independent of the host server and its operating system. This system provides
client credentials, registration to the key management database, key management, encryption activation, and audit
support for the devices within the platform.
For the full implementation of HPE Secure Encryption with the ESKM, HPE iLO Advanced or HPE iLO Scale Out editions
are required to connect and auto-register with the ESKM. iLO provides key exchange support between the Smart Array
Controller and the ESKM to enable pre-boot support for OS disk encryption. Audit support is provided for all for key
management transactions.
For more information about iLO, see the Hewlett Packard Enterprise website.
Overview 10
• Supports audit and compliance requirements, including PCI-DSS and HIPAA/HITECH
• Provides scalability for multiple data centers, thousands of clients, and millions of keys
• Uses a FIPS-140-2 Level 2 validated secure appliance, which supports the latest NIST cryptographic guidance
For more information on supported remote secure key managers, see the iLO QuickSpecs document on the Hewlett
Packard Enterprise website (https://www.hpe.com/info/qs).
The separation of keys helps ensure the safety of the data residing on the drives, the portability of the drives, and the
ability to manage keys in a centralized manner. The controller uses the ESKM to back up a segment of its keys using an
encryption method that protects the keys from exposure in plaintext.
Licensing
IMPORTANT: HPE Special Reminder: Before enabling encryption on the Smart Array controller module on this
system, you must ensure that your intended use of the encryption complies with relevant local laws, regulations and
policies, and approvals or licenses must be obtained if applicable.
For any compliance issues arising from your operation/usage of encryption within the Smart Array controller
module which violates the above mentioned requirement, you shall bear all the liabilities wholly and solely. HPE will
not be responsible for any related liabilities.
Depending on when you initially set up Secure Encryption, licensing is based on the number of servers requiring
encryption, or is on a per-drive basis. If configuring after June 2015, you will need one Secure Encryption license per
server. For more information on supported license keys, see the HPE Smart Array SR Secure Encryption QuickSpecs
document on the Hewlett Packard Enterprise website (https://www.hpe.com/info/qs). Once configured, Secure
Encryption applies to all storage devices internally or externally attached to the Smart Array controllers in the server.
Though you are required to purchase an entitlement license for each server to authorize use, HPE Smart Storage
Administrator does not require that you input a license key to enable encryption via a configuration change in the
controller and iLO.
In addition to a physical Enterprise Secure Key Manager, Secure Encryption operating in Remote Key Management Mode
requires the following licenses:
• Integrated Lights Out (iLO), Advanced or Scale Out edition, version 1.4 or later
• One Enterprise Secure Key Manager Client License per ProLiant server
Overview 11
Planning
Encryption setup guidelines
When setting up Secure Encryption, consider the information described in the following table.
Encryption mode • Local Key Management Mode Choose Local Key Management Mode when:
• Remote Key Management Mode • Data is stored at a site without network
access.
• In a small deployment center or lab
• Manual key management is available.
Choose Remote Key Management Mode
when:
• Using a large number of servers
• A network is available between the ESKM
and a server.
• Automatic key management is preferred,
including backups and redundancy
configurations
Key naming conventions Master Encryption Keys are customizable. Create a specific naming convention when
managing multiple keys and multiple servers.
Planning 12
Encrypted backups
At system startup, all encrypted data-at-rest becomes accessible to the host system in unencrypted form via the
controller and the appropriate keys. This method of startup allows the system to boot into an operating system installed
on an encrypted volume. As a result, encrypted backups are not available, and all data appears unencrypted when
accessed from the host system and placed on tape. Software or hardware utilizing an independent encryption feature is
not impacted by Secure Encryption.
Security domains
A security domain is a blueprint for separating out different groups of servers or key management escrows where access
to a set of keys is inhibited by the structure of the various domains. The best mechanisms for establishing separate
security domains are either through the use of separate ESKM or via the use of groups within the ESKM. Unique groups
provide a software mechanism for each server to partition off their key sets from one server to another. Groups are
created on the ESKM and assigned to a server via the HPE iLO Key Manager page. For more information, see "Remote
Key Management Mode."
Deployment scenarios
Remote and local key management requirements
Use the table below to determine which encryption mode is right for you.
Mode parameters Local Key Management Mode Remote Key Management Mode
Planning 13
Configuration
Local Key Management Mode
Local Key Management Mode, or Local Mode, is a solution designed for small to medium-size data centers using few
encrypting controllers. The solution utilizes a paraphrase password, or Master Encryption Key name, to set the security on
the controller and enable encryption. The Master Encryption Key must be tracked independently of the controllers in case
the controller needs replacement or drive migration is required among controllers with different passwords. In local mode,
the Master Key name is considered a cryptographic secret and should be protected as such. Key creation and
management is maintained at the local controller level without the use of a key manager.
Characteristics
• Requires physical paraphrase password management, such as writing and storing Master Key information in a
notebook or computer file
• Utilizes one paraphrase password-derived 256-bit key to encrypt a unique, per-volume XTS-AES 256-bit data
encryption key
Prerequisites
To configure Secure Encryption using command line or scripting methods, see the HPE Smart Storage Administrator user
guide.
To configure the controller to operate in Local Key Management Mode:
Procedure
Configuration 14
The following screen appears.
Configuration 15
4. Click OK .
5. A warning appears, prompting the user to record the Master Encryption Key. Click Yes to continue.
6. If you have read and agree to the terms of the EULA, select the check box and click Accept .
7. A summary screen appears, indicating the controller has been successfully configured for encryption use. Click Finish
to continue.
8. The Encryption Manager screen appears with updated Settings, Accounts, and Utilitiesoptions.
IMPORTANT: Hewlett Packard Enterprise recommends setting up a password recovery question and answer
after initial configuration. If the Crypto Officer password is lost and a recovery question and answer have not
been set, you will need to erase and reconfigure all Secure Encryption settings in order to reset the Crypto
Officer password. For more information, see "Set or change the password recovery question."
To configure Secure Encryption using command line or scripting methods, see the HPE Smart Storage Administrator user
guide.
IMPORTANT: Express Local Encryption configures Secure Encryption in Local Key Management Mode. Once
configured, you will not have a Crypto Officer password.
IMPORTANT: Express Local Encryption uses a randomly-generated Master Encryption Key. Features requiring the
input of a Master Encryption Key, such as migrating volumes to a new controller, will not be available while Express
Local Encryption is enabled.
Express Local Encryption configures the controller with predetermined encryption settings and a randomly-generated
Master Encryption Key. Once configured, encryption settings changes will not be possible without clearing the encryption
configuration.
Express Local Encryption enables the following:
• Controller encryption
• Local Key Manager Mode
• Random crypto password, not recoverable
• Random master key name, not recoverable
• Future plaintext volumes not allowed
Procedure
Configuration 16
3. Under Setup Type , select Express Local Encryption . Once selected, all other encryption setup options disappear.
Click OK to continue.
4. A warning appears. Click Yes to continue.
5. If you have read and agree to the terms of the EULA, select the check box and click Accept.
6. The Encryption Manager screen appears with updated Settings, Accounts, and Utilities options.
In Remote Key Management Mode, keys are imported and exported between the controller and the ESKM, which provides
a redundant, secure store with continuous access to the keys. To enable key exchanges between the Smart Array
Controller and the ESKM, a network connection is required both during pre-OS boot time and during OS operations.
Because the controller does not have direct network access capabilities, iLO provides the necessary network access to
facilitate key exchanges between the controller and the ESKM. iLO has both network presence and is constantly running
on AUX power regardless of the server state. The keys exchanged between iLO, ESKM, and the controller are all secured.
A valid Secure Encryption license for each server to be encrypted is required. This license must be purchased, but it does
not need to be input into HPE Smart Storage Administrator.
Characteristics
Configuration 17
• High volume key storage
• Keys are kept in separate storage from servers to protect against physical removal
• Requires network availability and a remote key management system
1. Configure the ESKM . For more information about installation, configuration and operation of the ESKM, see the
Enterprise Secure Key Manager user guide and the Installation and Replacement guide.
2. Connect iLO to the ESKM.
3. Install HPE SSA. For more information, see the HPE Smart Storage Administrator user guide.
4. Configure the Smart Array Controller.
Procedure
3. Create a group.
4. Assign the user account for hosting Master Encryption Keys to the group created in step 3.
5. Create a Master Encryption Key to be used by the controller. Be sure to set the owner of the key to the user
account created to host the Master Encryption Key created in Step 2b.
6. Place the Master Encryption Key in the group created in step 3.
Procedure
1. Open a new browser window and enter the IPv4 address and web administration port number using https. The port is
user-configurable. The default port is 9443.
Example: https://11.12.13.14:9443
2. Log in using administrator credentials.
Configuration 18
Adding a user
IMPORTANT: Passwords must contain at least five different characters. Passwords cannot:
• Contain only whitespace
• Resemble a phone number, dictionary word or reversed dictionary word
• Be based on the username associated with the password
The deployment user is the first user account created. It allows iLO to connect to the ESKM and begin using keys.
Subsequent standard user accounts are assigned Master Encryption Keys.
Procedure
Configuration 19
4. Under Local Users, click Add.
The dialog above shows a deploy user being added. The following fields appear.
Configuration 20
5. Complete the following fields:
• Username
• Password
• Confirm Password
• If this is the deployment user account, select the User Administration Permission and Change Password
Permission check boxes.
• If this is a standard user account, leave the User Administration Permission and Change Password Permission
check boxes empty.
• Leave the Enable KMIP check box empty.
6. Click Save.
Adding a group
Groups enable you to organize a set of servers together and restrict access only to a specific set of users.
Procedure
Configuration 21
4. Under Local Groups, click Add.
Configuration 22
6. Select ESKM in the Group Type field.
7. Click Save.
Configuration 23
4. Under Local Groups, select the group name and click Properties.
Configuration 24
5. Click Add.
6. Enter the Username in the field provided.
Configuration 25
7. Click Save.
Creating keys
About keys
Master keys are used to wrap the drive keys and are stored on the ESKM in remote mode. In general, one master key is
used for a group of servers that provide similar functionality or belong to a specific department. This allows you to swap
the drives among the servers. Depending on your environment, you can create one master key for a server, a project, a
department, or for an entire deployment.
The ESKM does not differentiate between key types such as Master Encryption Key or Drive Encryption Key. If creating a
Master Encryption Key, Hewlett Packard Enterprise recommends applying a specific Master Encryption Key naming
convention to distinguish the Master Key from all other keys created in the ESKM. You should have one Master Key for
each iLO.
Creating a Master Key
Procedure
Configuration 26
3. From the left side panel, expand the Keys menu, and then click Create Keys.
Configuration 27
4. Under the section Create Key, complete the following:
5. Click Create. You will receive a notification that the key was created successfully.
Configuration 28
3. From the left side panel, expand the Keys menu and click Query Keys.
Configuration 29
4. Click Add.
The following screen appears.
a. Query Name
b. Query Type
c. Description
6. Click Next.
The following screen appears.
Configuration 30
7. Under Create Query, complete the following:
a. Query Name: Enter a query name here. Your query is saved for future use.
b. Choose Keys Where drop down menu: select Owner, or Key Name. Two additional Choose Keys Where fields
appear.
9. Click Save and Run Query. A results screen appears, displaying the Master Key name.
Configuration 31
4. A new Key and Policy Configuration screen appears. Click the Permissions tab.
Configuration 32
a. In the Group field, enter the Group name created previously.
b. Under Export, select Always.
c. Under Full, leave deselected (default).
6. Click Save. The screen will refresh and list the group permissions.
Configuring iLO
Integrated Lights Out (iLO) manages key exchanges between the ESKM and the Smart Array controller. iLO initially uses
user credentials with administrative privileges created on the ESKM to automatically register and create a private, unique,
MAC address-based username account for all key exchanges. The administrative account is termed the deployment user
account. All iLO accounts can be viewed in the ESKM under Users And Groups and take the form iLO-MAC Address. The
iLO-specific account is placed in the group indicated in the group field on the iLO Key Manager page. If the group does
not exist, iLO creates one and places the account in that group along with all future keys generated.
Prerequisites
• The ESKM must be configured with a deployment user. For more information, see "Configuring the ESKM ."
• iLO must be installed and operating properly with the appropriate iLO-supporting license.
For more information on installing and configuring iLO, including scripting and command line methods, see the Hewlett
Packard Enterprise website.
Connecting iLO to the ESKM
If you intend to use a second ESKM for a redundant key repository, complete the fields under Secondary Key Server and
select the Enable Enterprise Secure Key Manager Redundancy check box. Hewlett Packard Enterprise strongly
recommends a redundant pair of ESKM devices in a cluster configuration.
To connect iLO to the ESKM:
Procedure
Configuration 33
The Enterprise Secure Key Manager configuration page appears.
Configuration 34
3. Under Key Manager Servers, complete the following:
Configuration 35
• Enter the secondary IP address of the ESKM in the Address field.
• Enter the secondary port number of the ESKM in the Port field.
c. Optional: Select the Require Redundancy check box. This option enables iLO to verify that encryption keys are
copied to all configured key servers. For configurations with a primary and secondary key server, Hewlett Packard
Enterprise recommends enabling this option.
7. Click Update ESKM. A confirmation screen appears, indicating the configuration was saved and connected
successfully.
Configuration 36
3. Complete the following:
• Under Setup Type, select Full Setup.
• Under New Password, enter and then re-enter the Crypto Officer password in the fields provided.
• Under Encryption Mode, select either:
◦ Enable and Allow Future Plaintext Volumes: Allowing future plaintext volumes still requires authentication
by the Crypto Officer or the User before a plaintext volume can be created.
◦ Enable and Disallow Future Plaintext Volumes: This option prevents the creation of new plaintext volumes
on the controller. This setting can be changed later by the Crypto Officer. Selecting this option does not
prevent the migration of a set of drives with existing plaintext volumes to the controller.
4. Click OK.
5. A EULA screen appears. If you have read and agree to the terms of the EULA, select the check box and click Accept.
Configuration 37
6. A summary screen appears, indicating the controller has been successfully configured for encryption use. Click Finish
to continue.
7. The Encryption Manager home screen appears with updated Settings, Accounts, and Utilities options.
IMPORTANT: Hewlett Packard Enterprise recommends setting up a password recovery question and answer
after initial configuration. If the Crypto Officer password is lost and a recovery question and answer have not
been set, you will need to erase and reconfigure all Secure Encryption settings in order to reset the Crypto
Officer password. For more information, see "Set or change the password recovery question."
Procedure
Configuration 38
Operations
Accessing Encryption Manager
Opening Encryption Manager
Procedure
1. Start HPE SSA. For more information, see the HPE Smart Storage Administrator user guide.
2. Select a Secure Encryption-compatible controller.
3. Click Configure.
4. Under Tools, click Encryption Manager .
3. A new window appears. Select an account to log in with and enter the password in the field provided.
4. Click OK to continue.
Operations 39
Managing passwords
NOTE: Valid passwords must be 8 to 16 US-ASCII characters long and contain the following:
• At least one lowercase letter
• At least one uppercase letter
• At least one number
• At least one non-alphanumeric character, such as # or $
4. A new window appears. Enter in the new password in the New Password fields.
5. Click OK.
Operations 40
A new window appears.
a. Password Recovery Question: Enter a question to which only you know the answer.
b. Password Recovery Answer: Enter the answer to the question entered above.
5. Click OK.
The User account is disabled by default until the Crypto Officer sets the User account password for the first time.
To set or change the User account password:
4. A new window appears. Enter and re-enter the new password in the New Password fields.
Operations 41
5. Click OK.
4. A new window appears. Enter and re-enter the new controller password in the New Password fields.
Operations 42
5. Click OK.
4. A new window appears, asking if you want to suspend the controller password. Click Yes to continue.
Operations 43
4. A new window appears, asking if you want to resume the controller password. Click Yes to continue.
Operations 44
4. A new window appears. Enter the new Master Key in the field provided. When using Local Key Management mode, the
input can be any set of printable characters. When using Remote Key Management mode, the input must be the same
name as the key name in the remote key store.
5. Click OK.
4. A prompt appears, indicating new Drive Encryption Keys will be created for all physical drives. Click OK to continue.
Rescanning keys
In Remote Mode, this procedure signals the controller to retrieve all encryption keys from the ESKM. This procedure
resolves potentially locked volumes that could have been locked as a result of failure to initially retrieve the associated
keys.
To rescan keys:
Operations 45
4. A new window appears, indicating iLO will retrieve keys from the ESKM. Click OK to continue.
3. A new window appears. To confirm enabling Encryption Key Manager Authentication, click Yes.
Volatile keys
Enabling a volatile key for the logical drive prevents the encrypted data encryption key from being stored on the physical
drives. In the event of a power failure or a server reboot, the controller loses the key.
For Local Key Management Mode, there is no method available to recover the data encryption key or access the data on
the logical drive.
For Remote Key Management Mode, the controller must retrieve the data encryption key from the ESKM before the data
on the logical drive can be accessed.
To enable, back up, and retrieve a volatile key for a logical drive, see "Enabling volatile keys in Remote Key
management mode."
Operations 46
Enabling volatile keys in Local Key Management Mode
1. Start HPE SSA. For more information, see the HPE Smart Storage Administrator user guide.
2. Select a Secure Encryption-compatible controller.
3. Under Controller Devices, select Arrays.
4. Select a logical drive.
5. Under Actions, select Encryption Volatile Key. A new window appears.
Operations 47
Enabling volatile keys in Remote Key Management Mode
1. Start HPE SSA. For more information, see the HPE Smart Storage Administrator user guide.
2. Select a Secure Encryption-compatible controller.
3. Under Controller Devices, select Arrays.
4. Select a logical drive.
5. Under Actions, select Encryption Volatile Key. A new window appears.
Operations 48
A banner appears over the main menu, indicating that volatile keys are enabled for specific controllers. This banner
will remain until volatile keys are disabled.
9. The keys are being backed up to the ESKM at this time. Click Refresh to update the Logical Drive Details summary
listed on the right hand side of the screen. When the backup is complete, the summary will display Yes for Data Key
Backed Up.
Operations 49
11. A new window appears. Click OK to continue.
1. Start HPE SSA. For more information, see the HPE Smart Storage Administrator user guide.
2. Under Controller Devices, click on Unassigned Drives.
Operations 50
3. Select drives.
Operations 51
5. Complete the following fields:
Operations 52
7. Click Create Logical Drive.
8. Array Details, Logical Drives, Physical Drives and Device Path specifications appear. Click Finish to complete.
Operations 53
a. To preserve existing data, select Yes.
b. To discard existing data, select No. If selected, a warning prompt appears after clicking OK, confirming your
selection. Click OK to continue past the warning.
7. Click OK. A new window appears, listing the Logical Drive Details, Logical Drive Acceleration Method, and Device
Path details.
8. Click Finish.
4. A new window appears with the key management mode selected. Enter the Master Encryption Key in the field
provided.
5. Click OK.
6. A warning appears, prompting the user to record the Master Encryption Key. Click Yes to continue.
Operations 54
Enabling/disabling plaintext volumes
IMPORTANT: Plaintext volumes are unencrypted. The option of allowing or disabling the creation of plaintext
volumes depends on the following:
5. A prompt appears, asking you to confirm the change. Click Yes to continue.
Operations 55
4. Do one of the following:
5. A prompt appears, asking you to confirm the change. Click Yes to proceed.
Operations 56
• To disable, select No.
• To enable, select Yes. If you select Yes, two new fields appear.
IMPORTANT: Hewlett Packard Enterprise recommends using the default settings for the number of access
attempts. Only change this value if there is a concern that an unintended individual might remove the server
from the environment. When the value is set to a value higher than "0", HPE Secure Encryption attempts to
locate ESKM the configured number of times during boot. If all attempts fail, the local key cache is deleted prior
to boot. All volumes encrypted will remain locked until the ESKM is reached and the required keys are retrieved
and placed back into the local key cache.
• Number of Access Attempts Before Deleting Local Key Cache - A value of "0" indicates HPE Secure Encryption
will not check for the presence of a key manager, and the key cache will remain present on the controller. If the
value is greater than "0", HPE Secure Encryption will attempt to contact the key manager the number of attempts
specified. If any attempt is successful, the encrypted logical drive(s) will be unlocked using the keys in the local key
cache. If all of the attempts are unsuccessful, then all of the encrypted logical drive(s) will remain locked and the
keys in the local key cache are deleted.
• Retry Interval in Minutes - The number of minutes between access attempts.
6. Click OK.
Operations 57
If non-encrypted drives are migrated to an encrypting controller, the controller automatically brings the logical volumes
associated with those physical drives online and makes them available for use.
To import drives with a different Master Key into a controller when using Local Key Management Mode:
1. Power down the server. For more information, see the documentation that ships with the server.
2. Attach drives. For more information, see the documentation that ships with the drives.
3. Power up the server. For more information, see the documentation that ships with the server.
4. Start HPE SSA. For more information, see the HPE Smart Storage Administrator user guide.
5. Under Array Controller(s), click the controller assigned to the new drives. Red alert message indicators will appear
next to it.
10. A new screen appears. Enter the new Master Encryption Key name assigned to the drives being imported in the
Master Key field.
The drives will be incorporated, unlocked, and assigned the Master Encryption Key of the receiving controller.
Operations 58
Maintenance
Controllers
Clearing the controller
To clear all logical drives and arrays on controllers:
1. Start HPE SSA. For more information, see the HPE Smart Storage Administrator user guide.
2. Select the controller to be cleared.
3. Under Actions, click Clear Configuration.
4. A new window appears, confirming your request to clear the controller's configuration. To continue, click Clear.
5. A new window appears, displaying controller settings and configuration. To continue, click Finish.
Flashing firmware
If the firmware lock function is enabled, the firmware lock on the controller must be unlocked before attempting to flash
the controller. To disable the firmware lock function, see "Enabling/disabling the firmware lock."
Maintenance 59
Drives
Replacing a physical drive
To replace a drive, see the server maintenance and service guide.
Groups
Locating groups associated with a drive
Use one of the following methods to locate the group name associated with a drive.
Maintenance 60
The following screen appears.
4. Click Add.
The following screen appears.
Maintenance 61
5. Complete the following fields:
a. Query Name
b. Query Type
c. Description
6. Click Next.
The Key Policy and Configuration screen appears.
7. If you want to save this query, enter a name in the Query Name field.
8. Under Choose Keys Where, do the following:
Maintenance 62
a. Field 1: Select Key Name from the drop down menu.
b. Field 2: Select Contains from the drop down menu.
c. Field 3: Enter the serial number of one of the drives in the server.
9. If you assigned a name to this query, click Save and Run Query. Otherwise, click Run Query without Saving.
10. Click on the key. A new screen appears, listing the Key Properties.
11. Click Permissions to view the group name.
Maintenance 63
3. Under Keys, click Query Keys.
Maintenance 64
4. Click Add.
The following screen appears.
a. Query Name
b. Query Type
c. Description
6. Click Next.
The Key Policy and Configuration screen appears.
Maintenance 65
7. If you want to save this query, enter a name in the Query Name field.
8. Under Choose Keys Where, do the following:
9. If you assigned a name to this query, click Save and Run Query. Otherwise, click Run Query without Saving.
10. Click on the key. A new screen appears, listing the Key Properties.
Maintenance 66
11. Click the Permissions tab to view the group name.
Maintenance 67
Displaying log information
The event log displays events for all controllers in the system and does not differentiate between events produced by
different controllers.
When operating Secure Encryption in Remote Mode, you can access the ESKM events log for information on key retrieval
and exchange, including the following:
• Connection status
• Master Encryption Key retrieval
• Drive Key retrieval
• Drive Key save requests
• Drive Key deletion
Maintenance 68
Procedure
3. Click Key Manager. The Enterprise Secure Key Manager Events appears at the bottom of the screen.
Maintenance 69
Navigating away from the page and returning or clicking Test ESKM Connections refreshes the list of events.
Running queries
To run a query:
3. From the left side panel, expand the Keys menu and click Query Keys.
Maintenance 70
A new screen appears.
a. If you want to save the query for future use, fill in the following fields:
Maintenance 71
• Query Name
• Description
b. In the Choose Keys Where field, structure queries that combine any or all of the following criteria:
• Key Name
• Owner
• Group Name
• Algorithm
• Creation Date
• Latest Key Version Date
• Any Key Version Date
• Versioned Key
• Not Versioned Key
• Exportable
• Not Exportable
• Deletable
• Not Deletable
• Access Time
• Controller identification criteria
• Custom criteria
d. When you have finished structuring the query, click one of the following buttons:
• Save and Run Query
• Save Query
• Run Query without saving
Maintenance 72
The report appears with the selected criteria.
Maintenance 73
Troubleshooting
Common issues
Lost or forgotten Crypto Officer password
1. Open Encryption Manager .
2. Under Accounts, locate Crypto Officer Password. Click Recover Crypto Officer Password.
3. Do the following:
4. Click OK.
Troubleshooting 74
1. Open Encryption Manager .
2. Log in as the Crypto Officer.
3. Under Settings, locate Controller Password. Click Remove Controller Password.
4. A window appears, asking you to confirm that you want to remove the controller password. Click Yes.
5. Click on Change Master Key and enter the Master Encryption Key used for encryption. For more information, see
"Changing the Master Encryption Key."
6. Enable Secure Encryption, then reboot the server.
Local mode
If operating Secure Encryption in Local Mode, securing the Master Encryption Key value is critical to accessing the
encrypted logical drive data. If the controller requires replacement or if the physical drives are moved to another
controller, a matching Master Key is required to gain access to the data. Master Keys are not recoverable if lost. If the
Master Key is lost or forgotten, you must perform a data restore operation from the backup media to regain access to the
data.
Remote mode
Locating the key using the ESKM
To locate a lost or forgotten Master Encryption Key using the ESKM:
Troubleshooting 75
3. From the left side panel, expand the Keys menu and click Keys.
4. The Key and Policy Configuration page displays a list of all keys. Scroll through the list to locate the Master Key.
5. If you remember specific attributes about the Master Key, run a key query.
If you cannot locate the Master Key name, it may have been accidentally deleted from the ESKM. You may be able to
locate the key by using an ESKM backup.
Locating the key using iLO
iLO utilizes an event log listing recent key activity. If the lost or forgotten key was recently modified, it might appear in the
event log.
To locate a lost or forgotten Master Encryption Key using iLO:
Procedure
Troubleshooting 76
3. Click Key Manager. The Enterprise Secure Key Manager Events appears at the bottom of the screen. Review the
event log for the missing key.
Troubleshooting 77
Forgotten which Master key goes with which drive
Recovery of the Master Encryption Key name corresponding to a specific set of drives is possible when operating Secure
Encryption in Remote Key Management Mode.
To recover the Master Encryption Key name:
a. Choose Keys Where drop down menu: select Custom: Server_Name. Two new fields appear.
b. In the second drop down menu, select Equals.
c. In the third field, enter the name of the server to be associated with the Master Encryption Key.
d. Under Custom Attributes, select Master_Key.
• Network connectivity issues are occurring between iLO and the ESKM.
• iLO is not configured properly.
• The Drive Keys are missing from the ESKM.
• The Drive Encryption Keys and iLO groups are mismatched.
To view a diagnostic report, see the HPE Smart Storage Administrator user guide.
Troubleshooting 78
• A network problem prevents key retrieval from the ESKM.
• Lost or incorrect iLO configuration
• Missing or incorrectly configured Master Encryption Key
Possible Resolutions
• Troubleshoot the network connection between iLO and the ESKM. For more information, see "Testing the connection
between iLO and the ESKM ."
• Ensure the Master Encryption Key exists. For more information, see "Locate the key using the ESKM ."
• Ensure the Master Encryption Key is in the correct group. If the Master Encryption Key is incorrectly assigned, see
"Placing a key in a group."
Procedure
Troubleshooting 79
The following screen appears.
Troubleshooting 80
3. Under Key Manager Configuration, click Test ESKM Connections:
• If iLO is connected to the ESKM, a green checkmark appears indicating the key managers are accessible.
• If the connection has been lost, you will need to re-configure iLO to communicate with the ESKM. For more
information, see "Connecting iLO to ESKM ."
Troubleshooting 81
Error Description Action
Remote key manager communication Slot X Encryption Failure – To troubleshoot, see the Key Manager
failure Communication issue prevents drive page in iLO interface.
keys from being retrieved. Encrypted
logical drives are offline. System may
not boot.
Incorrect or missing Master Key on Slot X Encryption Failure – Master Correct the problem on the ESKM.
Remote key manager Encryption Key is incorrect or not
retrieved from ESKM. Encrypted
logical drives may be offline. System
may not boot.
Volume Key decryption failure Invalid Drive Encryption Keys on Restore the correct version of the
ESKM. Encrypted logical drives may be Drive Encryption Key on the ESKM.
offline. System may not boot.
Unable to establish communication Communication issue prevents keys Reset the controller by rebooting the
with controller from being retrieved. Dependent server.
encrypted logical drives are offline.
System may not boot.
Missing local Master Key Imported encrypted logical drives are Use HPE Smart Storage Administrator
offline; the matching local Master to enter the local Master Encryption
Encryption Key is required. System Key.
may not boot.
Controller password failure All encrypted local drives are offline Reboot the server and enter the
due to failure to enter proper proper controller password, or unlock
controller password. the controller using HPE Smart
Storage Administrator.
Controller encryption not enabled Encrypted logical drives are present Use HPE Smart Storage Administrator
but encryption is not yet enabled. to enable encryption.
Encrypted logical drives are offline.
Encryption parameters not set Encryption is enabled for the controller Use Encryption Manager to set the
but the Master Encryption Key name is Master Key name for the controller
not set. and reboot.
Controller/logical drive encryption Key management mode mismatch Use Encryption Manager to match key
type mismatch between controller and drives. management modes. For more
Dependent encrypted drives offline. information, see "Importing drives
with different Master Keys".
Encryption failure - unsupported Unsupported system ROM detected. Update the system ROM to a version
system ROM detected Encrypted logical drives may be offline. supporting encryption.
System may not boot.
Encrypted logical drives on non- Encrypted logical drives are offline. Move drives to a controller with
encrypting controller Encryption feature is not available on encryption support or delete the
this controller. logical drives.
Encryption failure - unsupported iLO Unsupported iLO firmware detected. Update iLO firmware to a version
firmware detected Encrypted drive may be offline. System supporting encryption.
may not boot.
Table Continued
Troubleshooting 82
Error Description Action
NVRAM failure Non-volatile storage corrupted. Critical Use HPE Smart Storage Administrator
Security Parameters erased per policy. to reestablish CSPs.
Encrypted drives are offline.
Encryption engine self-test failure Encryption engine hardware failure. Replace the controller to bring
Encrypted logical drives are offline encrypted drives online.
until the problem is corrected.
Unable to create a plaintext volume While logged into the system, you are Verify that Encryption Manager has
unable to create a plaintext volume. been set to allow the creation of future
plaintext volumes.
IMPORTANT: Clearing the controller is not necessary if there are no encrypted drives present or if HPE Smart
Storage Administrator is operating in an offline mode.
4. A prompt appears, indicating all encryption settings will be cleared from the controller. To continue, click Clear.
Troubleshooting 83
Support and other resources
Support and other resources
Accessing Hewlett Packard Enterprise Support
• For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website:
http://www.hpe.com/info/assistance
• To access documentation and support services, go to the Hewlett Packard Enterprise Support Center website:
http://www.hpe.com/support/hpesc
Information to collect
• Technical support registration number (if applicable)
• Product name, model or version, and serial number
• Operating system name and version
• Firmware version
• Error messages
• Product-specific reports and logs
• Add-on products or components
• Third-party products or components
Accessing updates
• Some software products provide a mechanism for accessing software updates through the product interface. Review
your product documentation to identify the recommended software update method.
• To download product updates:
Hewlett Packard Enterprise Support Center
www.hpe.com/support/hpesc
Hewlett Packard Enterprise Support Center: Software downloads
www.hpe.com/support/downloads
Software Depot
www.hpe.com/support/softwaredepot
• To subscribe to eNewsletters and alerts:
www.hpe.com/support/e-updates
• To view and update your entitlements, and to link your contracts and warranties with your profile, go to the Hewlett
Packard Enterprise Support Center More Information on Access to Support Materials page:
www.hpe.com/support/AccessToSupportMaterials
Remote support
Remote support is available with supported devices as part of your warranty or contractual support agreement. It
provides intelligent event diagnosis, and automatic, secure submission of hardware event notifications to Hewlett Packard
Enterprise, which will initiate a fast and accurate resolution based on your product's service level. Hewlett Packard
Enterprise strongly recommends that you register your device for remote support.
If your product includes additional remote support details, use search to locate that information.
Warranty information
To view the warranty information for your product, see the links provided below:
HPE ProLiant and IA-32 Servers and Options
www.hpe.com/support/ProLiantServers-Warranties
HPE Enterprise and Cloudline Servers
www.hpe.com/support/EnterpriseServers-Warranties
HPE Storage Products
www.hpe.com/support/Storage-Warranties
Regulatory information
To view the regulatory information for your product, view the Safety and Compliance Information for Server, Storage,
Power, Networking, and Rack Products, available at the Hewlett Packard Enterprise Support Center:
www.hpe.com/support/Safety-Compliance-EnterpriseProducts
Documentation feedback
Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help us improve the
documentation, send any errors, suggestions, or comments to Documentation Feedback ([email protected]). When
submitting your feedback, include the document title, part number, edition, and publication date located on the front
cover of the document. For online help content, include the product name, product version, help edition, and publication
date located on the legal notices page.
Algorithm Description
XTS-AES 256-bit The XTS algorithm is used to encrypt data on the drive
platter as described in NIST special publication SP
800-38E.
AES-ECB The AES algorithm is used to perform symmetric key
encryption.
SHA-256 The SHA secure hashing algorithms are described in FIPS
180-4.
HMAC The HMAC algorithm is described in the FIPS 198-1
standard.
PBKDF2 The PBKDF2 algorithm derives cryptographic keying
material from user-provided passwords. The algorithm is
described in NIST special publication SP 800-132.
DRBG An implementation of the SP800-90A algorithm is used to
produce random bit sequences.
Appendix 87
Glossary
ACU
Array Configuration Utility
Controller key
A key created by the controller and permanently saved to the Remote Key Manager after being wrapped by the Master
Encryption Key. This key is used on a temporary basis to alleviate potential bottlenecks to the Remote Key Manager
during volume creation/change events. Use of a Controller Key is on a temporary basis only and is ultimately transitioned
via a rekey operation to the appropriate Drive Encryption Key.
Controller-secured region
The section of a device where data and Critical Security Parameters can exist in an unencrypted format. This boundary
must be secured against tampering as acquiring this sensitive data may result in unauthorized access to data.
Critical Security Parameters (CSPs)
An industry standard term referring to security related information such as keys, passwords, and so forth, whose
disclosure would compromise an encrypted system.
Crypto officer
Personnel who have permission to access the full range of encryption functions available on the controller. This includes
turning encryption on and off, resetting keys, importing Master Encryption Keys, and so forth.
Drive array
The group of physical drives containing a logical volume.
Drive encryption key
Key generated by the Smart Array controller for each physical drive that contains at least one encrypted logical drive. The
Drive Encryption Key for each physical drive is used to encrypt (wrap) the Volume Encryption Keys for all of the logical
drives resident on that physical drive.
Drive key caching
In Remote mode, the Drive Encryption Keys are typically stored on the Remote Key Manager. However, it is possible to
enable the controller to cache all of these Drive Encryption Keys necessary to decrypt attached logical drives within the
controller-secured region. This option is available to the user through HPE SSA.
Encrypted data
Data that has been encrypted through the use of an encryption key.
ESKM
Enterprise Secure Key Manager
FIPS
Federal Information Processing Standard
HIPAA
Health Insurance Portability and Accountability Act
HITECH
Health Information Technology for Economic and Clinical Health
HPE SSA
HPE Smart Storage Administrator
iLO 4
Glossary 88
Integrated Lights-Out 4
Local Master Encryption Key
The equivalent of a Master Encryption Key in Local mode. The Local Master Encryption Key name is stored in non-volatile
memory within the controller-secured region and used to generate a Local Master Encryption Key for wrapping the Drive
Encryption Keys.
Master Encryption Key
A two-part key established on the Remote Key Manager. This key consists of both a name and a value. The name consists
of a maximum of 64 characters and is used to uniquely identify this key to all controllers within a given Security Domain.
The Master Encryption Key value is a 256-bit quantity used by controllers to wrap Drive Encryption and Controller Keys
for secure storage on the controller and import into the Remote Key Manager.
NIST
National Institute of Standards and Technology
NVRAM
nonvolatile memory
PCI-DSS
Payment Card Industry Data Security Standard
Plaintext
Data in unencrypted form.
Remote Key Manager
A server used to store, backup and retrieve keys for a group of controllers in a data center.
Volume encryption key
The key used in conjunction with hardware-based algorithms to perform the encryption of data resident on logical
volumes.
Glossary 89