A SERVICE OF

logo

Security Policy, version 1.0 January 31, 2008
HP StorageWorks Secure Key Manager
Page 4 of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
Table of Tables
TABLE 1 SECURITY LEVEL PER FIPS 140-2 SECTION...................................................................................................6
TABLE 2 LOGICAL INTERFACE AND PHYSICAL PORTS MAPPING..................................................................................8
TABLE 3 FRONT PANEL LED DEFINITIONS ..................................................................................................................9
TABLE 4 REAR PANEL COMPONENTS DESCRIPTIONS.................................................................................................10
TABLE 5 REAR PANEL LED DEFINITIONS..................................................................................................................11
TABLE 6 CRYPTO OFFICER SERVICES ........................................................................................................................11
TABLE 7 USER SERVICES...........................................................................................................................................13
TABLE 8 HP USER SERVICES .....................................................................................................................................13
TABLE 9 CLUSTER MEMBER SERVICES......................................................................................................................14
TABLE 10 ROLES AND AUTHENTICATIONS ................................................................................................................14
TABLE 11 LIST OF CRYPTOGRAPHIC KEYS, CRYPTOGRAPHIC KEY COMPONENTS, AND CSPS FOR SSH....................15
TABLE 12 LIST OF CRYPTOGRAPHIC KEYS, CRYPTOGRAPHIC KEY COMPONENTS, AND CSPS FOR TLS....................16
TABLE 13 CIPHER SUITES SUPPORTED BY THE MODULES TLS IMPLEMENTATION IN FIPS MODE ...........................17
TABLE 14 OTHER CRYPTOGRAPHIC KEYS, CRYPTOGRAPHIC KEY COMPONENTS, AND CSPS ...................................17
TABLE 15 ACRONYMS ...............................................................................................................................................25