
Security Policy, version 1.0 January 31, 2008
HP StorageWorks Secure Key Manager
Page 4 of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
Table of Tables
TABLE 1 – SECURITY LEVEL PER FIPS 140-2 SECTION...................................................................................................6
TABLE 2 – LOGICAL INTERFACE AND PHYSICAL PORTS MAPPING..................................................................................8
TABLE 3 – FRONT PANEL LED DEFINITIONS ..................................................................................................................9
TABLE 4 – REAR PANEL COMPONENTS DESCRIPTIONS.................................................................................................10
TABLE 5 – REAR PANEL LED DEFINITIONS..................................................................................................................11
TABLE 6 – CRYPTO OFFICER SERVICES ........................................................................................................................11
TABLE 7 – USER SERVICES...........................................................................................................................................13
TABLE 8 – HP USER SERVICES .....................................................................................................................................13
TABLE 9 – CLUSTER MEMBER SERVICES......................................................................................................................14
TABLE 10 – ROLES AND AUTHENTICATIONS ................................................................................................................14
TABLE 11 – LIST OF CRYPTOGRAPHIC KEYS, CRYPTOGRAPHIC KEY COMPONENTS, AND CSPS FOR SSH....................15
TABLE 12 – LIST OF CRYPTOGRAPHIC KEYS, CRYPTOGRAPHIC KEY COMPONENTS, AND CSPS FOR TLS....................16
TABLE 13 – CIPHER SUITES SUPPORTED BY THE MODULE’S TLS IMPLEMENTATION IN FIPS MODE ...........................17
TABLE 14 – OTHER CRYPTOGRAPHIC KEYS, CRYPTOGRAPHIC KEY COMPONENTS, AND CSPS ...................................17
TABLE 15 – ACRONYMS ...............................................................................................................................................25