BlueScale Encryption User Guide
|
|
|
- Abel Glenn
- 10 years ago
- Views:
Transcription
1 BlueScale Encryption User Guide PN Revision E
2 Notices Unless specifically negotiated and except as expressly stated herein, Spectra Logic Corporation makes available its products and associated documentation on an AS IS BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUD- ING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, BOTH OF WHICH ARE EXPRESSLY DISCLAIMED. In no event shall Spectra Logic be liable for any loss of profits, loss of business, loss of use or data, interruption of business, or for indirect, special, incidental or consequential damages of any kind, even if Spectra Logic has been advised of the possibility of such damages arising from any defect or error. Information furnished in this manual is believed to be accurate and reliable. However, no responsibility is assumed by Spectra Logic for its use. Due to continuing research and development, Spectra Logic may revise this publication from time to time without notice, and reserves the right to change any product specification at any time without notice. If you do not agree to the above, do not use the Spectra library; instead, promptly contact Spectra Logic for instructions on how to return the library for a refund. Copyright 2007 Spectra Logic Corporation. All rights reserved worldwide. License You have acquired a Spectra library that includes software owned or licensed by Spectra Logic from one or more software licensors ( Software Suppliers ). Such software products, as well as associated media, printed materials and online or electronic documentation ( SOFTWARE ) are protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. If you do not agree to this end user license agreement (EULA) or to the terms and conditions under Notices above, do not use the Spectra library; instead, promptly contact Spectra Logic for instructions on return of the Spectra library for a refund. Any use of the Software, including but not limited to use on the Spectra library, will constitute your agreement to this EULA (or ratification of any previous consent). Grant of License. The Software is licensed on a non-exclusive basis, not sold. This EULA grants you the following rights to the Software: You may use the Software only on the Spectra library. Not Fault Tolerant. The Software is not fault tolerant. Spectra Logic has independently determined how to use the Software in the Spectra library, and suppliers have relied upon Spectra Logic to conduct sufficient testing to determine that the Software is suitable for such use. No Warranties for the SOFTWARE. The Software is provided AS IS and with all faults. The entire risk as to satisfactory quality, performance, accuracy, and effort (including lack of negligence) is with you. Also, there is no warranty against interference with your enjoyment of the Software or against infringement. If you have received any warranties regarding the SOFTWARE, those warranties do not originate from, and are not binding on Software suppliers. Note on Java Support. The Software may contain support for programs written in Java. Java technology is not fault tolerant and is not designed, manufactured, or intended for use of resale as online control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communications systems, air traffic control, direct life support machines, or weapons systems, in which the failure of Java technology could lead directly to death, personal injury, or severe physical or environmental damage. No Liability for Certain Damages. Except as prohibited by law, Software suppliers shall have no liability for any indirect, special, consequential or incidental damages arising from or in connection with the use or performance of the Software. This limitation shall apply even if any remedy fails of its essential purpose. In no event shall Software suppliers, individually, be liable for any amount in excess of U.S. two hundred fifty dollars (U.S. $250.00). Limitations on Reverse Engineering, Decompilation, and Disassembly. You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation. Software Transfer Allowed with Restrictions. You may permanently transfer rights under this EULA only as part of a permanent sale or transfer of the Spectra library, and only if the recipient agrees to this EULA. If the Software is an upgrade, any transfer must also include all prior versions of the Software. Export Restrictions. Export of the Software from the United States is regulated by the Export Administration Regulations (EAR, 15 CFR ) of the U.S. Commerce Department, Bureau of Export Administration. You agree to comply with the EAR in the export or re-export of the Software: (i) to any country to which the U.S. has embargoed or restricted the export of goods or services, or to any national or any such country, wherever located, who intends to transit or transport the Software back to such country; (ii) to any person or entity who you know or have reason to know will utilize the Software or portion thereof in the design, development or production of nuclear, chemical, or biological weapons; or (iii) to any person or entity who has been prohibited from participating in U.S. export transactions by any federal agency of the U.S. government. You warrant and represent that neither the BXA nor any other U.S. federal agency has suspended, revoked or denied your export privileges. For additional information see
3 Contents Chapter 1. Introduction About This Guide Shipped Items BlueScale Encryption Overview Chapter 2. Encryption Architecture & Strategies BlueScale Encryption Overview Site-Specific Decisions Best Practices Site Security Example: Low Security Site Site Security Example: Medium Security Site Site Security Example: High Security Site Before You Begin Installation Summary: Mandatory Security Procedures Spectra T950 and T120 BlueScale Encryption Chapter 3. Installing and Activating Encryption in Spectra T950 and T120 Libraries Installing Encryption: Upgrading Your Library Activating Encryption Next Steps
4 . Chapter 4. Using Standard Edition in Spectra T950 and T120 Libraries Using Encryption Configuring Encryption Creating an Encryption Key Assigning a Key to a Partition Protecting Keys Deleting a Key Restoring Data Chapter 5. Using Professional Edition in Spectra T950 and T120 Libraries Using Encryption Professional Edition Overview Configuring Encryption Creating an Encryption Key Assigning a Key to a Partition Protecting Keys Restoring Data Deleting a Key Chapter 6. Recycling Encrypted LTO-4 Media in Spectra T950 and T120 Libraries Recycling Media
5 . Spectra T50 BlueScale Encryption Chapter 7. Installing and Activating Encryption in Spectra T50 Libraries Installing Encryption: Upgrading Your Library Activating Encryption Next Steps Encryption Icon BlueScale Encryption Editions Data to Encrypt Getting Started Media Recycling Best Practices Chapter 8. Using Standard Edition in Spectra T50 Libraries Using Encryption Restoring Data Recycling Encrypted Media Chapter 9. Using Professional Edition in Spectra T50 Libraries Using Encryption Professional Edition Overview Configuring Encryption Creating an Encryption Key Assigning a Key to a Partition Restoring Data Chapter 10. Recycling Encrypted Media in Spectra T50 Libraries Recycling Encrypted Media
6 . EDU and BlueScale Encryption Support Chapter 11. Endura Decryption Utility Endura Decryption Utility Overview Requirements Decrypting Data: EDU Command Line Using EDU to Decrypt Data: One Drive Using EDU to Decrypt Data: Two Drives Restoring Data Chapter 12. Technical Support & Spectra Logic Contact Information BlueScale Encryption Support Contacting Spectra Logic Index 132 6
7 1 Introduction About This Guide This guide contains information about BlueScale Encryption for Spectra T950, T120, and T50 libraries. This reviews information on the configuration and use of encryption. Note that the encryption procedures for the Spectra T950 and T120 libraries cover both library-based and drive-based encryption; the Spectra T50 library supports drive-based encryption only. The guide has been divided into the following sections: BlueScale Encryption Overview on page 10 reviews both encryption best practices and information on using BlueScale Encryption and key management on your site, and includes a short glossary. Spectra T950 and T120 BlueScale Encryption on page 26 reviews using Spectra T950/T120 BlueScale Encryption and key management. Spectra T50 BlueScale Encryption on page 71 reviews using Spectra T50 BlueScale Encryption and key management. EDU and BlueScale Encryption Support on page 123 reviews an optional utility that lets you recover data without a library; this section also provides support information. Intended Audience This guide assumes that you are familiar with data backup and data protection strategies. 7
8 1. Introduction Related Publications This guide outlines the configuration and use of BlueScale Encryption software in your Spectra library. For detailed information on the configuration and use of the library itself, see the Spectra Logic publications specific to your library. The library s user guide describes the configuration and use of the library, including specifications and troubleshooting information. The library s release notes provide the most up-to-date information about the library, drives, and media. The most up-to-date versions of all library documentation are available on Spectra Logic s Web site at Conventions Used in this Guide Important information is called out as follows: Note: Provides additional points or suggestions. Caution: Provides information about how to avoid damage to equipment. Warning: Describes ways to avoid personal injury. A caret (>) describes a series of menu selections. For example: Select Configuration > Network means Select Configuration, then select Network. 8
9 1. Introduction Shipped Items The following items are included with the purchase of BlueScale Encryption: One encryption activation key One software support agreement This user guide One t-shirt If you ordered the Endura Decryption Utility (EDU), you also receive one EDU CD. 9
10 BlueScale Encryption Overview
11 2 Encryption Architecture & Strategies BlueScale Encryption Overview BlueScale Encryption is tightly integrated into your Spectra library. Encryption can be handled through the library s encryption-enabled Quad Interface Processors (QIPs), if any are in use, and through LTO-4 drives working with LTO-4 media. BlueScale encryption key management is provided through the library s graphical interface. If a single library has encryption-ready QIPs and LTO-4 drives installed, both can be used for encryption. Set up an encryption-enabled partition for each. The system is based on two major components: The encryption chip on the QIP or LTO-4 drive. By implementing encryption in both types of hardware, the encryption is extremely fast and places no burden on your network. Key management software through the library s graphical interface. The interface displays using the library s touch-screen front panel Library Controller (LC). It also displays from anywhere through the Web, using a Web browser to display the Remote Library Controller (RLC). Optionally, you can secure the Web browser using SSL, which is part of the Telescope suite of management tools. Together, these components let you easily implement the strongest encryption available, as recognized by the federal government: AES encryption using a 256-bit key. BlueScale Encryption incorporates multiple layers of security, some of which are discussed in this chapter. Others are technically implemented and invisible to the user. Site-Specific Decisions To determine a BlueScale Encryption strategy appropriate for your site and your data, decide on the security level appropriate for your site, and the amount and kinds of data to encrypt. Then you can make some choices about how best to implement BlueScale Encryption. 11
12 2. Encryption Architecture & Strategies BlueScale Encryption: Standard Edition vs. Professional Edition All data encrypted using BlueScale Encryption and Key Management Standard and Professional Editions, and LTO-4 drive-based encryption is secured by the strongest available encryption method, AES-256. Through BlueScale Encryption and Key Management, you have additional choices in defining the level of security you can implement in your data center. Whether to implement BlueScale Standard Edition or Professional Edition is your first choice. Feature Standard Edition Professional Edition Keys Encryption Login Passwords Key Export and Import Compression a - Single encryption key on a library at a time - Easier to manage and track - Single encryption password - Easier to manage and track - Import and export functions require a single password - Easier to manage - Not available for QIP-based encryption - Multiple simultaneous encryption keys (maximum is 30 keys) - More secure, with a key for each of multiple data sets - Choice of either one encryption password or three - More secure, with the option of requiring multiple users to export and import keys, etc. - Choice of single password or M-of-N shares with multiple passwords to export/import keys - More secure - Available for QIP-based encryption Compatibility between Versions - Data encrypted using either version can be decrypted by a library running the other version. - Data encrypted and compressed by a library using LTO-4 drives, Professional Edition, or both, can be decrypted and decompressed by a library running Standard Edition. Summary - Less secure, but less to manage - Fewer tapes through compression - More secure, but more to manage a. If you are using drive-based encryption, compression is handled through the drive. Further references to compression in this manual apply to library-based, not drive-based, encryption. 12
13 2. Encryption Architecture & Strategies BlueScale Standard Edition For sites with a primary goal of securing data while it is transported to a remote site and stored there, or only for data that will be stored for a long period of time, BlueScale Standard Edition works well. For information about configuring and using BlueScale Encryption Standard Edition, see Chapter 4. Using Standard Edition in Spectra T950 and T120 Libraries on page 30. BlueScale Professional Edition For sites that want to implement compression along with greater flexibility and security, to protect data wherever it s stored and regardless of the retention period, BlueScale Encryption Professional Edition works well. For information about configuring and using BlueScale Professional Edition, see Chapter 5. Using Professional Edition in Spectra T950 and T120 Libraries on page 45. Security on Initialization Both editions of BlueScale Encryption give you security options at library startup. Choose whether to start the library: In standard mode, so that at library startup, data is encrypted with no further action required. In secure initialization mode, so that at startup, drives are not automatically enabled; encryption is only available and backups only run after a superuser has logged in and the encryption password is entered. 13
14 2. Encryption Architecture & Strategies Multiple Encryption Password Support The Standard Edition of BlueScale Encryption supports one encryption password. The Professional Edition of BlueScale Encryption lets you choose whether to support one encryption password, or three encryption passwords that enforce another level of security. If you choose to implement the triple-password option, then: Three different passwords must be entered when configuring encryption. Any one of the three passwords must be entered to enable encryption when the library is in Secure Initialization mode. Any one of the three passwords must be entered to access encryption key management and configuration options, excluding key import and export. Two of the three passwords must be entered to import and export keys. Data to Encrypt Decide whether to encrypt all data or a subset; then determine if the encrypted data can be grouped together or if it must be isolated into sets. For example, your site may store financial data as one set, separate from consumer identity information. If all data can be encrypted together, the library requires only a single, encryption-enabled partition. Otherwise, create multiple encryption-enabled partitions, one for each set of data, and one or more partitions for data that is not to be encrypted. Users with Professional Edition typically set up multiple partitions, each with its own key. For example, if you are encrypting all your data, you only need one partition. If you are encrypting only some of your data, create a partition dedicated to encryption along with a non-encryption partition. If you want to keep your encrypted data sets isolated, create an encryption-enabled partition for each encrypted data set, along with non-encryption partitions as needed. Note: Implementing encryption after the library has been configured to handle encryption simply requires creating backup jobs with your backup software, which sends data to the proper partitions. Data is automatically encrypted as it is backed up. 14
15 2. Encryption Architecture & Strategies Encryption Methods Choose how to encrypt data. You can use encryption-enabled QIPs, LTO-4 drives, or both to encrypt data. With QIPs, the library handles encryption, and can encrypt data written to any tape type (such as LTO-3 and SAIT). With LTO-4 drives, the drive handles encryption, and encrypts data written to LTO-4 tapes. Note: If a partition uses LTO-4 drive-based encryption, the library can load LTO-3 media into that partition. However, attempts to write to LTO-3 media fail. Note that LTO-4 drives can successfully read data on LTO-3 tapes. Further, if an encryption-enabled QIP and a Fibre Channel LTO-4 drive share a partition, you can only encrypt data using the LTO-4 drive. To decrypt data encrypted using a QIP, use a partition with QIP-based encryption. To decrypt data encrypted using an LTO-4 drive, use a partition with drive-based encryption. Only one encryption key is allowed per LTO-4 tape. Once you stop using that key, you can no longer directly encrypt data to any LTO-4 tape that stores data encrypted using the old key. To write encrypted data using a different key, you must first recycle the tape. Recycling media is easily managed through BlueScale Encryption Key Management. LTO-4 Media Recycling LTO-4 tapes can store only data encrypted using a single key. If you have an LTO-4 tape storing data encrypted using a different key, or encrypted using a QIP, you have to recycle the tape before you can re-use it in an encryption-enabled LTO-4 drive.for more information about recycling media using a T950 or T120 library, refer to Chapter 6. Recycling Encrypted LTO-4 Media in Spectra T950 and T120 Libraries on page 68. For more information about recycling media using a T50, refer to Chapter 10. Recycling Encrypted Media in Spectra T50 Libraries on page
16 2. Encryption Architecture & Strategies Best Practices To effectively use BlueScale Encryption and to ensure data security, plan an encryption strategy and back it up with processes and best practices. Once you ve implemented BlueScale Encryption, which always uses the strongest keys (AES-256), build custom strategies based on your security requirements. As stated in the NIST publication Recommendation for Key Management 1 : Ultimately, the security of information protected by cryptography directly depends on [...] the effectiveness of [...] protocols associated with keys, and the protection afforded the keys. Sound key management policies and procedures and appropriate staff are essential to successful encryption. People Identify the people on your site who are responsible for backing up data. They will be responsible for encrypting data written to tape and to other portable media, such as mobile RXT Media packs. Identify: The person to have superuser privileges on the Spectra Logic library with BlueScale Encryption. The person to have the library s encryption password. Next, identify how many users are to have responsibilities that involve encryption. It may be wise to have more than a single user familiar with passwords, depending on the size of your organization, so that if one person is not available, another can take over. Make sure only the authorized users know the encryption passwords, and that the passwords themselves are secure. Refer to Passwords and Other Identifiers on page 19 for more information on setting up passwords and monikers. 1. Barker, Elaine, W. Barker, W. Burr, W. Polk, and M. Smid. Recommendation for Key Management Part 1: General. NIST Publication , 2005, p
17 2. Encryption Architecture & Strategies Processes On an organizational level, you need to identify the level of security your site requires, and the data to be encrypted for example, you may choose to encrypt all data, or any combination of financial, identity-related information, and strategic data. Consider the following when establishing your encryption procedure: Determine the level of security to use at startup. Both editions of BlueScale encryption permit a standard mode and a secure initialization mode, described in Security on Initialization on page 13. Identify any data sets that must be isolated from other encrypted data sets, described in Data to Encrypt on page 14. Identify when to make copies of encryption keys. AES-256 encryption, a symmetric encryption method, is a private key method. Users must track each key, which BlueScale Encryption identifies only by a nickname, or moniker. The key itself is never displayed, and is encrypted prior to export. Best practices dictate that you make copies of the key immediately following the key s creation. Identify the number of copies to make of each key, and note the location of each key copy. Consider storing multiple copies of keys, that you then track carefully, storing the copies away from the data encrypted using those keys. It is important to make sure that at least one copy of each key is secure and readable (that is, uncorrupted), to make sure you can restore your data. This is important in that keys, once deleted, are not recoverable and once the key is gone, the data is inaccessible; this is typically considered deleted for legal and practical purposes. Identify the key rotation plan how often to create and use new keys. BlueScale Encryption Standard Edition stores one key on the library at a time. Professional Edition permits multiple keys per library, with a one key per encryption-enabled partition. In Standard Edition, you must delete the key currently on the library before you can create another key. Before you delete a key, make sure that at least one copy has been exported and stored securely. 17
18 2. Encryption Architecture & Strategies Identify methods of tracking user passwords, key passwords and monikers. If the data is stored on a computer, make sure it is stored on a computer that enforces encryption and is not available on a network. Optionally, identify a primary and secondary team, so that you have redundancy in your encryption strategy. Although that means the information required to decrypt data is spread across more people, it also means that restoration of encrypted data may be much easier, and you may ultimately have more data protection given the extra layer of coverage; for example, if a user leaves, you aren t in a position to lose data. This returns to your initial decisions on how tightly and in what manner to enforce security for your site. Run drills confirming that your data is being encrypted properly, that keys are stored properly, and that you can recover your data efficiently. Make sure that these drills are included with your overall organizational security strategy. Create procedures to handle encrypted data that has been, or may have been, compromised. For example, you may want to take all data and decrypt it, then re-encrypt it and store it in an alternate location. You will also need to investigate the incident involving compromised data, and take appropriate actions if identity-related data may have been exposed. Archive the Endura Decryption Utility (EDU) for emergency use, such as to recover from a disaster. Use this utility if you have no Spectra Logic libraries on hand but need to decrypt and write data, which you can then restore using backup software. If you are using Professional Edition and multiple keys, make sure that data stored to one tape shares a common expiration date or period (e.g., fourth quarter), regardless of the number of keys used to encrypt data written to the tape. This simplifies tape management and re-use. If you are using Professional Edition, make sure that critically important data is stored using a single key on its own tape, to simplify restoration in case of disaster recovery and to achieve business continuity goals. If you are using Professional Edition, you may want to take advantage of the M-of-N shares option. This lets you select the M-of-N (such as 2 of 3) option to split a single file of encrypted key data into multiple parts, or shares (N, which in this example is 3), and then requires some specified subset (M, which in this example is 2) to import the file containing key data. This further protects data from unauthorized use. 18
19 2. Encryption Architecture & Strategies Passwords and Other Identifiers BlueScale Encryption requires that you supply passwords and monikers (key names). Your site may want to consider whether specific rules govern these. Superuser Login/Encryption Passwords Passwords are standard user security that restrict access. Spectra Logic BlueScale Encryption requires that a superuser is logged in, then an encryption password is supplied. A Professional Edition feature lets you optionally require two of three different encryption passwords to be entered. The passwords involved with all editions of BlueScale Encryption are: Superuser Password: Lets you access all administrative privileges except encryption privileges. To access encryption features, the superuser must be logged in prior to entering the encryption password. Encryption Password: Lets you access encryption features. This password must be entered after the superuser login; then you can select Security --> Encryption to display the encryption password screen. Import/Export Key Password: Lets you import and export encryption keys. This feature is only available after the superuser has logged in and the encryption password has been entered. Optionally, in Professional Edition, you can require two different passwords prior to importing and exporting keys. Password(s) for Key Import and Export Passwords are also used to encrypt keys for export. Your site may consider whether to create different rules for these passwords, such as requiring that these passwords are longer than the encryption access password(s), and therefore more secure. Monikers Your site may want to create rules governing naming conventions for key monikers, an alphanumeric identifier used to refer to the never-revealed true key value, which is a 256-bit key. Password and Naming Standards Examples Create password and naming standards, in part again depending on your site s security requirements. For example, your site may require a high level of security for access to encryption partitions, in which case you need to require some combination of the following: A long password A combination that requires alphabetic and numeric characters No password that corresponds to a dictionary entry Passwords to be reset at predefined schedules 19
20 2. Encryption Architecture & Strategies Site Security Example: Low Security Site Description of organization: Small company with 75 employees. Security Considerations Security goals Encryption principals Data to encrypt Level of security to implement Data sets requiring isolation Key escrow method Copies of each key to store and their locations Key rotation plan Tracking key monikers and passwords Multiple encryption teams (optional) Schedule and run drills Protecting company from legal liability associated with unauthorized access to data stored on tape, both onsite and offsite, including transport to the offsite location. IT administrator, company president, corporate legal counsel. Financial and consumer identity data. BlueScale Standard Edition: single key per library is sufficient. Standard initialization mode: encryption partitions are enabled at all times. None. A single partition for encrypted data is sufficient. Staff at company will escrow keys at a site remote from the data storage location. Keep three copies of each key: one with the senior IT administrator, one with the company president, one in a corporate safety deposit box. Create a new key every six months. On a non-networked computer that supports encryption, create one or more charts or lists with this data, including key moniker, dates used, encryption and superuser passwords, and password used to encrypt exported key. (Because BlueScale prompts for the required encryption key moniker when restoring encrypted data, this company chose not to track monikers and their relationship to media.) Deemed unnecessary given the users already identified as those responsible for encryption. Formalized approach deemed unnecessary. Instead, incorporate review of data decryption into standard six-month check to make sure that backups and restores are working properly. This now includes a test involving data decryption. Passwords Password to access encryption features: minimum of 12 characters, including at least one number and one letter Password to export and import encryption keys: minimum of 30 characters, including at least one number and one letter 20
21 2. Encryption Architecture & Strategies Site Security Example: Medium Security Site Description of organization: Medium-sized organization with 250 employees. Security Considerations Security goals Encryption principals Data to encrypt Level of security to implement Data sets requiring isolation from other encrypted data Key escrow method Number of copies of each key to store, and locations Key rotation plan Tracking key monikers, exported key passwords, and password to permit access to encryption features Multiple encryption teams Schedule and run drills Protecting company from legal liability associated with unauthorized access to data stored on tape onsite and offsite, including transport to the offsite location. IT senior staff, chief operating officer. Intellectual property, financial, customer, and inventory data. BlueScale Professional Edition, with multiple keys Standard initialization mode: encryption partitions enabled at start-up Multi-user mode, with three encryption passwords Separate partitions and keys for these data sets: financial data, inventory data, customer data, and intellectual property data. With this requirement, the site must use a minimum of four encryption-enabled partitions, along with partition(s) for non-encrypted data. Store key copies with corporate legal counsel and a paid, trusted, third-party escrow service. Keep three copies of each key: store one with corporate legal counsel, two with the key escrow service. Create a new key every quarter for each partition dedicated to encryption. Send to key escrow service an encrypted document that includes the password used to access encryption features, superuser password, and all passwords necessary to import encryption keys. This file cannot be created or stored on a networked computer. Delete file from computer after the document or file is transmitted securely to key escrow service. Three IT administrators, along with the senior IT admin and the COO. Annual evaluation and review, along with wider corporate security plan. Passwords Passwords to access encryption features: minimum of 12 characters, including at least one number and one letter Password to export and import encryption keys: minimum of 30 characters, including at least one number and one letter 21
22 2. Encryption Architecture & Strategies Site Security Example: High Security Site Description of organization: Enterprise organization. Security Considerations Security goals Encryption principals Data to encrypt Level of security to implement Data sets requiring isolation Key escrow method Copies of each key to store, and the stored key locations Key rotation plan Tracking key monikers and passwords Multiple encryption teams (optional) Schedule and run drills Protecting all stored data. IT senior staff, chief operating officer, chief security officer, chief technology officer. All. BlueScale Professional Edition, with multiple keys Secure Initialization Mode: After library power is turned on, encryption user must enter password to enable partitions dedicated to encryption Multi-user mode, with three encryption passwords. Each data set is separately keyed, as defined by the department generating data. Store key copies with two remote corporate legal counsel offices and also with a paid, trusted third-party escrow service. Keep three copies of each key: one to the main office of corporate legal counsel, two to the key escrow service. Create a new key every month for each partition dedicated to encryption. Send to the key escrow service an encrypted file with encryption access passwords and superuser passwords. Send to corporate legal office a list of passwords used to export keys. Files with this data cannot be created or stored on a networked computer; delete file or files from computer once data is transmitted securely. Senior IT admin, chief operating officer, chief security officer, chief technology officer. Quarterly evaluation and review, in conjunction with wider corporate security plan. Passwords Passwords to access encryption features: minimum of 15 characters, including at least one number and one letter Password to export and import encryption keys: minimum of 40 characters, including at least one number and one letter 22
23 2. Encryption Architecture & Strategies Before You Begin Installation Glossary AES-256: Advanced Encryption Standard (AES) algorithm that uses a 256-bit key. AES is the NIST-approved encryption algorithm that is used by the federal government and that is being broadly adopted. BlueScale: Software available on Spectra Logic libraries that supports library intelligence along with the Spectra Logic encryption solution and key management. Cleartext: Text that is not encrypted. EDU: Endura Decryption Utility is a command-line data decryption utility that can be installed on any computer running the Linux operating system, to be used if no Spectra library is available at time of data decryption and restoration. To use EDU, attach the recommended two tape drives to the Linux host running the utility, then use EDU to decrypt data from the encrypted tape and write the decrypted data back to tape. If you have only one tape drive, make sure that the Linux host has enough available disk space to store the data as it s decrypted from the tape. Once the data is decrypted and written to tape, it can then be restored using backup software. Endura Decryption Utility: See EDU. Endura Key Management: The software that permits encryption key creation, deletion, and management, all within the library. Use the library front panel or a Web browser to manage the library and encryption. Moniker: The nickname an administrator assigns to an encryption key. This moniker hides the true value of the key, while still giving administrators a method of managing and referring to the key. NIST: National Institute of Standards and Technology. Partition: A logical library; that is, a part of a physical library that appears to the external backup environment as its own physical library. 23
24 2. Encryption Architecture & Strategies Summary: Mandatory Security Procedures The most important key management tasks are: Always make two or more copies of each key. The key must be protected, but it must also be available. If you choose to store only a single copy of a key, and then something happens to the device storing the key, you ve lost both your key and all data encrypted using the key. To emphasize: if you lose the key, your data is unrecoverable. You need to balance the number of copies of the key to store to guarantee access to the encrypted data against the security risk associated with storing multiple keys. Make sure that the key has been successfully stored prior to removing a key from the library. Store keys in a location apart from the location used to store the data encrypted using one of the keys. Create a list of every password associated with each key and securely store the list. Never keep this list as cleartext on a networked computer, or send it through as cleartext, etc. To decrypt and restore data, you need the data, key, and password protecting the key and data. Track every copy of each key. This is critical to meet requirements that may govern data retention and data destruction. Destroying all keys associated with encrypted data is sufficient to satisfy data destruction requirements, since encrypted data can t be accessed without the key used to encrypt it. For example, you may want to track the information about your keys. For suggestions, see the table on page
25 2. Encryption Architecture & Strategies Spectra Logic recommends tracking the following information about every key that you create. Key Moniker: Number of key copies and location of each copy: Detailed Information Password(s) associated with exported copy of the moniker: Location of data stored on mobile media, which has been encrypted using this moniker: Dates of moniker creation and proposed expiration: 25
26 Spectra T950 and T120 BlueScale Encryption
27 3 Installing and Activating Encryption in Spectra T950 and T120 Libraries Installing Encryption: Upgrading Your Library If your library uses BlueScale 9.5 firmware or higher, then your library supports BlueScale Encryption that is library-based (handled by QIPs); no firmware upgrade is required for this encryption method. For drive-based encryption, you must install a minimum firmware level of BlueScale 10.0, if it is not already installed. Check with SpectraGuard Support to see if upgrades to this firmware should be installed for your library. Encryption is handled either through the library or through LTO-4 drives. Configuring encryption and managing encryption keys are handled through the LC or RLC. 1. Make sure that you have the appropriate library hardware installed: A QIP that supports encryption (such as the G3 or G5 F-QIP) or An LTO-4 tape drive is installed and LTO-4 media loaded or Both are installed and LTO-4 media loaded if you intend to use drive-based encryption for a partition with both types of hardware installed. If you intend to use library-based encryption, any type of supported media can be loaded. 2. Update your library firmware level to BlueScale 9.5 or higher. See the description above for more information. Note that the firmware upgrade may require up to twelve minutes or more to complete, during which time the library enters a quiescent state. Warning: Do not turn off the library once you begin the firmware upgrade. 3. Have on hand the activation key code that came with your BlueScale Encryption package to enable encryption features and key management on your library. 27
28 3. Installing and Activating Encryption in Spectra T950 and T120 Libraries Activating Encryption Once your library has an encryption-enabled QIP installed, or an LTO-4 tape drive installed and LTO-4 media loaded, you can activate encryption with a BlueScale Encryption key. To activate encryption for the Spectra T950 and T120 libraries: 1. Log in as superuser and then select Configuration > System. The System Setup screen displays. 2. To enable encryption, enter the BlueScale Encryption activation key in the Key field (circled above) and then select Save. The screen refreshes to show Encryption in the list of activated keys. Encryption is now activated and can be configured. 28
29 3. Installing and Activating Encryption in Spectra T950 and T120 Libraries Next Steps Once you have activated BlueScale Encryption, you can configure and use it. Configuration Encryption configuration entails selecting an encryption mode and creating one or more encryption passwords (the number of passwords depends on if you have BlueScale Standard Edition or BlueScale Professional Edition). The encryption password enables you to access the encryption features. Configuring encryption is described in Configuring Encryption on page 30 for BlueScale Standard Edition and Configuring Encryption on page 47 for BlueScale Professional Edition. Accessing and Using Encryption Features To access BlueScale Encryption features, the following steps are required for every session (that is, every time a user logs in using the library front panel or every instance of running the RLC through a Web browser). A user with superuser privileges logs in and selects Security > Encryption. The Encryption User Login screen displays. A user who is entrusted with the password(s) enters an encryption password in the Password field, then selects OK. The Encryption Configuration screen that enables access to all encryption features displays. Note that security is greatly enhanced when the user who knows the password is different than the one logging into the system. If you have three passwords, consider having different individuals responsible for each password. Working with the encryption features is described in Using Encryption on page 30 for BlueScale Standard Edition and Using Encryption on page 45 for BlueScale Professional Edition. 29
30 4 Using Standard Edition in Spectra T950 and T120 Libraries Using Encryption Once BlueScale Encryption is configured on your library, configure your backup software so that data to be encrypted while it is backed up is sent to a partition that has encryption enabled and has been assigned an encryption key. Restoring data is also transparent. If the encryption key required to decrypt the data is not on the library, the library displays the moniker of the key to import. Restoring Data on page 40 contains information about data restoration. Configuring Encryption Accessing Encryption Features for the First Time 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Select OK. No login or password is required the first time you log in. The Encryption Configuration screen displays. 30
31 4. Using Standard Edition in Spectra T950 and T120 Libraries Configuring Encryption 1. From the Encryption Configuration screen, select Configure. The Encryption Settings screen displays. 2. Configure how you want the library to be used: Standard Mode: When the library is powered on during startup, data can be backed up to partitions that support encryption without entering an encryption password. Secure Initialization Mode: When the library is powered on during startup, partitions dedicated to encryption are not available, so backups sent to them cannot run. To initialize the encryption partitions, someone must log in as a superuser, then enter the encryption password. To use Secure Initialization Mode, select Enable Secure Initialization. To use Standard Mode, make sure that Enable Secure Initialization is not selected. 31
32 4. Using Standard Edition in Spectra T950 and T120 Libraries 3. In the New Encryption User Password field, type in a password, using any combination of the numbers 0-9, lower and upper case alphabetic characters (a-z and A-Z), and the at sign (@), dash (-), underscore (_), and colon (:) characters. 4. Re-enter the password in the Retype Password field, then select OK. The Encryption Configuration screen again displays. At this point, no encryption key has been created, so no key moniker displays, as illustrated in the screen below. 32
33 4. Using Standard Edition in Spectra T950 and T120 Libraries Creating an Encryption Key 1. From the Encryption Configuration screen, select Add Key. The New Encryption Key screen displays. 2. Enter a name in the Moniker field that has not been used for any other encryption key, and that uses any combination of the numbers 0-9, lower and upper case alphabetic characters (a-z and A-Z), and the at sign (@), dash (-), and colon (:) characters. Use an underscore character instead of an empty space to separate characters. This moniker is the name that you will use to reference the key. Note that the real key value never displays and that administrators don t ever need to specify the real key value in order to encrypt data or manage keys. The moniker helps to protect data encrypted using the key; it does so by making sure that the true key value isn t displayed. Rules for Creating Monikers Each moniker must be a unique string of characters, independent of case. Make a habit of using a single case (all upper or all lower) for monikers. After export, case is ignored, so that keys associated with the monikers Moniker1, moniker1, and MONIKER1 are interpreted as a single key. If you have two monikers that are identical except for case, then you may not be able to retrieve some of your data after importing such a key. 33
34 4. Using Standard Edition in Spectra T950 and T120 Libraries 3. Select OK. The Encryption Configuration screen displays, showing the key moniker, along with its creation time and date and a message reminding you to create a copy of the key for safekeeping. If the key is lost, data cannot be recovered, so promptly copying the key and storing it safely (that is, away from the data encrypted using the key) is extremely important to data decryption and recovery. This is covered in Protecting Keys on page 37. Because the key, identified by its moniker, isn t yet assigned to a partition that is, used by a partition to encrypt data None is listed in the Primary Key For column. Also, because BlueScale Standard Edition only supports using one key, the Import Key and Add Key selections no longer display. If you delete the key, they display again. 34
35 4. Using Standard Edition in Spectra T950 and T120 Libraries Assigning a Key to a Partition After creating a key, you can assign it to one or more library partitions when adding or editing a partition through the partition configuration wizard. The Encryption screen for partition configuration lets you enable encryption for the partition. It only displays if the encryption password has been entered and there is at least one key available on the library. Depending on your library and partition configuration, you may have up to three choices available on the partition configuration encryption screen: No encryption QIP-based encryption LTO-4 drive-based encryption Partitions with encryption-enabled QIPs offer an additional option: Enable Clear File at BOT. Choose this option if you want to enable all drives to be able to read the headers of encrypted tapes, which is a useful option for sites with a large number of tapes to manage. To assign a key to a partition: 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. 3. Select Configuration > Partitions. The Shared Library Services screen displays. 4. Select New to add a partition, or select Edit to modify the settings for an existing partition. 5. Navigate through the partition configuration screens by selecting Next until the Encryption screen displays. 6. If the partition can support encryption, the encryption choices that display and are available depend on the hardware for the partition. Note that the content of the Encryption screen varies accordingly. See the options described on the next page. 35
36 4. Using Standard Edition in Spectra T950 and T120 Libraries To encrypt data using the QIP, select QIP-based Encryption. Also, if you want readable (that is, non-encrypted) data at the beginning of the tape, also select Enable Clear File at BOT. or Select Drive-based Encryption. or If the data written through this partition does not need to be encrypted, make sure the No Encryption option is selected. 36
37 4. Using Standard Edition in Spectra T950 and T120 Libraries 7. Navigate through the remaining partition configuration screens by selecting Next. 8. Once the Save Partition screen displays, select Save. All data sent to this partition will be encrypted, using the key currently active on the library. Protecting Keys Data cannot be recovered without the encryption key used to encrypt the data, so protecting encryption keys is extremely important to data decryption and recovery. Protect encryption keys by: Making copies of every key through Key Export Storing the keys in a secure location Tracking the location of the keys and the passwords required to import them Protect your keys by making sure that copies of the keys reside elsewhere. Two methods are available for key export: copying the encrypted key to a USB device, and ing an encrypted version of the key as an attachment to a user who has been configured as a mail user through the library. Best practices recommend storing keys offsite in a location other than the site used for media storage. Confirm that the key is stored correctly on the USB device or has been received by the intended recipient before deleting the key from your system. If you delete the key, you must import the key to decrypt the data. Importing keys is described in Importing Keys on page 41. You may want to make two copies of a key, storing each in a secure location. Note the location of these keys, so that you can easily find the key when you need to restore or delete data. 37
38 4. Using Standard Edition in Spectra T950 and T120 Libraries Exporting Encryption Keys To export the current encryption key: 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Select Export Key. The Export Type screen displays. 4. Select either Export Single File to USB or Exported Key. If you select Export Single File to USB, plug a USB device into the USB library port (see the library documentation for information about the location of this port). Then, select Next. If you select Exported Key, select an user from the Mail single key file to drop-down menu. To send the key to a user who isn t listed as a library user, you must first create the recipient. For instructions on how to do this, see the library s user guide. 5. After you either insert the USB device or select an alias, select Next. 6. Enter a password, which is used to encrypt the key. 38
39 4. Using Standard Edition in Spectra T950 and T120 Libraries 7. Note the password, which you will need to import the key. Without it, you cannot import the key, and the data encrypted using the key is lost. 8. Select Next. If you exported the key to a USB device: Confirm that the encrypted key copied correctly by selecting Check Key Files. If you are not sure, delete all data from the USB device so that no trace of the failed key attachment remains, then use another USB device and start again with Step 2 above. If you exported the key using Confirm the receipt of the attachment by checking with the user to whom you sent the encrypted key file. Caution: Make sure you track, in conformance with your security plan, where you have stored the key or who received an message with the key. You need the password created when exporting the key and the encrypted file containing the key to import the encryption key. 39
40 4. Using Standard Edition in Spectra T950 and T120 Libraries Deleting a Key To use a new key to encrypt data, you must first delete the existing key. Then you can create the new key and assign it to one or more partitions. Note that you will need a copy of the existing key to restore data that was encrypted with the existing key. With drive-based encryption, only one key is allowed per LTO-4 tape. To use a tape encrypted with a deleted encryption key, you must first scratch the tape through BlueScale Encryption. This procedure is described in Chapter 6. Recycling Encrypted LTO-4 Media in Spectra T950 and T120 Libraries on page 68. To delete a key: 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Confirm that at least one copy of the key has been exported and stored safely. 4. Select Delete Key and respond to the confirmation screens to delete the key. Restoring Data Restoring encrypted data from tape follows the standard data restore processes that you use with your backup software. The only difference is that the key used to encrypt the data being restored needs to be on the library and assigned to the partition with the encrypted media, so the data can be decrypted. If the key is available, standard restore procedures simply work. If the key isn t on the library, the library displays the moniker of the key to import. You can use the key moniker to identify the key, then import the key from a USB device or through the RLC. You also need the password used to encrypt the key when it was exported. Endura Decryption Utility (EDU) is an optional safeguard, providing a method that lets you restore data without a library. Review information about the command-line encryption utility in Chapter 11. Endura Decryption Utility. 40
41 4. Using Standard Edition in Spectra T950 and T120 Libraries Restoring Data if Required Key is Available If the right key isn t available on the library when you need to restore encrypted data, the library prompts you with the moniker of the key that is required to decrypt the data. You can then import the key so that it is on the library as long as there isn t already a key on it (if there is, delete the existing one first). After you assign it to the partition with the encrypted media, it is available for decryption. If you don t have a library available and need to restore the key, you need the password created when exporting the key, the key, and the command-line encryption utility described in Chapter 11. Endura Decryption Utility, along with a Linux computer to run the utility. To restore data: 1. Load the tape to be decrypted. 2. Assign the key to the partition with the tape if it is not already assigned to it. 3. Use the backup software to automatically decrypt and restore data. If the key is not available, a message indicates this. To import a key so that you can restore data, continue to the next set of steps. Importing Keys If the key is not available on the library, you can import it from a USB device or through the RLC. The RLC option only displays if you are logged in remotely. See the following sections for details instructions: Importing Keys from a USB Device and Restoring Data on page 42 Importing Keys through the RLC and Restoring Data on page 43 41
42 4. Using Standard Edition in Spectra T950 and T120 Libraries Importing Keys from a USB Device and Restoring Data To import a key stored on a USB device: 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Insert the USB device into the library s USB port. 4. Select Import Key. The Import Key Selection screen displays. 5. Choose the key to import from the Key List field, then select Next. The Import Password screen displays. 6. Enter the password that was used to encrypt the key when it was being exported, then select Next. The Encryption Configuration Import Password screen displays, showing the moniker of the newly imported key. 7. Assign the imported key to the partition with the encrypted media. 8. Use your backup software to restore the data. 42
43 4. Using Standard Edition in Spectra T950 and T120 Libraries Importing Keys through the RLC and Restoring Data You can import keys using the RLC if you can access the key from your computer. To import a key using the RLC: 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays, showing Import Key and Add Key. 3. Select Import Key. The Encryption Key Files Source screen displays. Note that this screen only displays when you are using the RLC. 43
44 4. Using Standard Edition in Spectra T950 and T120 Libraries 4. Select Import key from RLC, then select Next. The RLC Encryption Key Upload screen displays. 5. To identify the key file, either Type in the full path and file name in the Encryption Key File field. Select Browse. Locate and select the key, then select Open. The path for the key displays in the Encryption Key File field. 6. Select Next. The Import Password screen displays. 7. Enter the password that was used to encrypt the key when it was being exported, then select Next. The Encryption Configuration Import Password screen displays, showing the moniker of the newly imported key. 8. Assign the imported key to the partition with the encrypted media. 9. Use your backup software to restore the data. 44
45 5 Using Professional Edition in Spectra T950 and T120 Libraries Using Encryption Once BlueScale Encryption is configured on your library, configure your backup software for your encrypted backups. the software sends the data to be encrypted to a partition that has encryption enabled and that has been assigned an encryption key. Encryption during backup is transparent it happens automatically. Restoring data is also transparent. If the encryption key required to decrypt the data is not on the library, the library displays the moniker of the key to import. Once the key is on the library and applied to the partition with the encrypted media, the data restores without requiring additional steps. Restoring Data on page 63 contains more information about data restoration. 45
46 5. Using Professional Edition in Spectra T950 and T120 Libraries Professional Edition Overview Professional Edition supports multiple keys on the library simultaneously. Each partition that is enabled for encryption uses one key to encrypt data backed up through that partition. To streamline decryption, you can further configure the system to associate multiple monikers with a single partition. When you need to restore data, the Endura Key Management software looks at the keys you ve assigned to the partition for both encryption and decryption. If it finds the right key, that key is used. If a key is required that isn t assigned to the partition, the software displays the moniker of the key it needs to decrypt and restore the data. For example, a single tape or RXT pack may contain data encrypted using multiple keys (that is, during Week 1, the data is encrypted with Key1; during Week 2,the key is Key2 and so on). You may want to keep Key1 on the library for decryption only, while Key2 is used to encrypt data currently written through that partition. Key2 is automatically used for decryption as needed. Best practices recommend that you track keys associated with data on the media, so that you can readily decrypt and restore data. Library-based Encryption Professional Edition provides additional advantages for partitions that encrypt data through a QIP: Compression Rapid decryption of data on a single tape Compression greatly reduces the number of tapes required to store encrypted data and reduces the time that it takes to back up data. 46
47 5. Using Professional Edition in Spectra T950 and T120 Libraries Configuring Encryption Accessing Encryption Features To access encryption features: 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Select OK. No login or password is required the first time you log in. The Encryption Configuration screen displays. 47
48 5. Using Professional Edition in Spectra T950 and T120 Libraries Configuring Encryption Features To configure encryption features: 1. From the Encryption Configuration screen, select Configure. The Encryption Users screen displays. 2. Select either: Single User Mode: Requires one encryption password to access all encryption features. Multi-User Mode: Requires three unique encryption passwords. Once you have set up the three passwords, use them as follows: Enter any one of the three to permit a library in Secure Initialization mode to initialize encryption when the library is starting up and to otherwise access most encryption features, excluding export and import encryption features. Enter a second password, when prompted, to access export and import encryption features. 48
49 5. Using Professional Edition in Spectra T950 and T120 Libraries 3. Select Next. The Encryption Settings screen displays. Note: If you selected Single User Mode, only one set of New Encryption User Password and Retype Password fields display. 4. Configure how you want the library to be used: Standard Mode: When the library is powered on, data can be backed up to partitions that support encryption without entering an encryption password. Secure Initialization Mode: When the library is powered on, partitions dedicated to encryption are unavailable, so those backups do not run. To initialize encryption partitions, someone must log in as a superuser and enter the encryption password. To use Secure Initialization Mode, select Enable Secure Initialization. To use Standard Mode, make sure that Enable Secure Initialization is not selected. 49
50 5. Using Professional Edition in Spectra T950 and T120 Libraries 5. Enter the number of passwords requested, using any combination of the numbers 0-9, lower and upper case alphabetic characters (a-z and A-Z), and the at sign, dash, underscore, and colon characters 6. Enter each password again in the Retype Password field. 7. When all passwords have been entered, select OK. The Encryption Configuration screen again displays. 50
51 5. Using Professional Edition in Spectra T950 and T120 Libraries Creating an Encryption Key 1. From the Encryption Configuration screen, select Add Key. The New Encryption Key screen displays. 2. Enter a name in the Moniker field that has not been used for any other encryption key, and that uses any combination of the numbers 0-9, lower and upper case alphabetic characters (a-z and A-Z), and the at sign (@), dash (-), underscore (_), and colon (:) characters. Use an underscore character instead of a space to separate characters. This name references the key. Rules for Creating Monikers The real key value never displays, and administrators don t need to specify the real key value to encrypt data or manage keys. The moniker protects encrypted data by making sure that the true key value isn t displayed. Each moniker must be a unique string of characters, independent of case. Make a habit of using a single case (all upper or all lower) for monikers. After export, case is ignored, so that keys associated with the monikers Moniker1, moniker1, and MONIKER1 are interpreted as a single key. If you have two monikers that are identical except for case, then you may not be able to retrieve some of your data after importing such a key. 51
52 5. Using Professional Edition in Spectra T950 and T120 Libraries 3. Select OK. The Encryption Configuration screen displays, showing the key moniker, along with its creation time and date and a message reminding you to create a copy of the key for safekeeping. If the key is lost, data cannot be recovered, so copying the key and storing it safely is extremely important to data decryption and recovery. Because the key, identified by its moniker, isn t yet assigned to a partition that is, used by a partition to encrypt data None is listed under Primary Key For and Decryption-Only Key For. - After you create a key, it s very important the you create a copy of it, as covered in Protecting Keys on page
53 5. Using Professional Edition in Spectra T950 and T120 Libraries Assigning a Key to a Partition After creating keys, you can assign one primary encryption key to each library partition. You can also specify multiple decryption-only keys. Displaying the Partition Configuration Encryption Screen You can assign keys to a library partition when adding the partition or editing its settings through the partition configuration wizard. The Encryption screen for partition configuration lets you to enable encryption for the partition and associate keys with it. It only displays if the encryption password has been entered and there is at least one key available on the library. Depending on your library and partition configuration, you may have up to three choices available on the partition configuration encryption screen: No encryption QIP-based encryption LTO-4 drive-based encryption Partitions with encryption-enabled QIPs offer additional options: Enable Compression and Enable Clear File at BOT. Choose compression if you want to use less media by backing up more data to each tape. Choose the file clearing option if you want to enable all drives to be able to read the headers of encrypted tapes. These options do not display for drive-based encryption because those functions are handled by the drive, not by BlueScale Encryption. To display the Encryption screen: 1. Log in as superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. 3. Select Configuration > Partitions. The Shared Library Services screen displays. 4. Choose a partition and select Edit. 5. Navigate through the partition configuration screens by selecting Next until the Encryption screen displays. The encryption method options and a list of keys available on the library appear on this screen. 53
54 5. Using Professional Edition in Spectra T950 and T120 Libraries Associating Keys with a Partition If the partition can support encryption, the encryption choices that display and are available depend on the hardware for the partition. The content of the Encryption screen varies accordingly. With drive-based encryption, only one encryption key is allowed per LTO-4 tape. If you associate a different encryption key with a partition, you must first scratch tapes encrypted with the previous key to re-use them. Refer to Chapter 6. Recycling Encrypted LTO-4 Media in Spectra T950 and T120 Libraries on page 68 for more information. To associate keys with a partition: 1. If the partition can support encryption, these encryption choices display: QIP-based Encryption to encrypt data using the QIP. If you want readable (that is, non-encrypted) data at the beginning of the tape, select Enable Clear File at BOT. To compress the data for the partition, select Enable Compression. 54
55 5. Using Professional Edition in Spectra T950 and T120 Libraries or Drive-based Encryption to encrypt data using the drives. or If the data written through this partition does not need encryption, make sure that you select the No Encryption option. 2. Select the key to use to encrypt data. Only one key can be assigned as the active encryption key. 3. From the list of keys at the bottom of the screen, select none, one, or more keys to be associated with this partition and for use in decrypting data through this partition. Note: Keys selected for data decryption are not used for encryption. 4. Navigate through the remaining partition configuration screens by selecting Next. 5. Once the Save Partition screen displays, select Save. 55
56 5. Using Professional Edition in Spectra T950 and T120 Libraries 6. When you display the Security > Encryption screen, the results of the key assignment are listed. In this example, the key Bob is used as the active (primary) encryption key for both Partition 1 and Partition 2. The key Jeff is kept available for rapid data decryption for data restored using library partitions one and two. 7. To assign this or another key to another partition, select the partition through the partition configuration wizard and repeat the procedure. 56
57 5. Using Professional Edition in Spectra T950 and T120 Libraries Protecting Keys Protect encryption keys by: Making copies of every key through Key Export Storing the keys in a secure location Tracking the location of the keys and the passwords required to import them. Protect your keys by making sure that copies of the keys reside elsewhere. Two methods are available for key export: copying the encrypted key to one or more USB devices and ing an encrypted version of the key as an attachment to one or more users who have been configured as library mail users. Methods of Securing Keys You can add another layer of key protection by using the three encryption passwords option, so that two of three different passwords must be entered to access export and import key functions. Review Configuring Encryption Features on page 48 for information about configuring the library to support multiple passwords. M-of-N Shares in Exporting Keys to USB Devices and Mail Users To export the key, you can copy the encrypted key to USB devices or send encrypted copies through . Note that the only way to import a key is to use a USB device. You may choose to add another safeguard to key export and import by choosing to split the key into multiple portions when you export it. This is referred to as M-of-N shares; this option lets you define a total number of portions (N) to split the key into and the subset of that number (M) required to access the encrypted key file protected using this method. 57
58 5. Using Professional Edition in Spectra T950 and T120 Libraries For your site, select one of these as your M-of-N shares: 2-of-3 2-of-4 3-of-4 2-of-5 3-of-5 4-of-5 For example, if you choose 2 of 3, then the encrypted key, already encrypted using a key-specific password, is split into three shares (i.e., files). You can then export the key shares using USB devices or through . If you choose to export using USB devices, you will be prompted to supply three USB devices, one after the other. To shares using 2 of 3, select three different users (configured on the library with information), each receiving one share as an attachment. Keys that have been split into shares can only be imported using USB devices; they cannot be uploaded through the RLC. To restore data that has been sent through , copy the attachment to a USB device. Building on this example, note that only two of the three USB devices, along with the password, are needed to import the key. Selecting the M-of-N shares option when exporting a key is covered below in Exporting Encryption Keys. Storing Exported Keys Best practices recommends storing keys offsite in a location other than the site used for media storage. Make sure that the key has been sent and can be accessed, is stored correctly on the USB device, or both, before deleting the key from your system. You may want to make two copies of a key, storing each in a secure location. Note the location of these keys, so that you can easily find the key when you need to restore or delete data. 58
59 5. Using Professional Edition in Spectra T950 and T120 Libraries Exporting Encryption Keys To export the current encryption key: 1. Log in as superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Select Export Key. If you selected multi-user mode and supplied only one encryption password, a prompt asks you to enter another password. Enter it, then select Next. The Export Type screen displays. Otherwise, the Export Type screen immediately displays. 59
60 5. Using Professional Edition in Spectra T950 and T120 Libraries 4. Select to export the key as a single file or as M-of-N shares to either USB or . Export Method Export Single File to USB (Standard and Professional Editions) Exported Key (Standard and Professional Editions) Steps to Follow Select this option, then put a USB device into the library s USB port. See the library s user guide for the location of this port. Select Next. Select this option, then select an user. If the intended recipient is not available as an user, first create the recipient; see the library s user guide. Select Next. Export M-of-N Shares to USB A screen displays that asks you to select the minimum shares required to restore the encrypted key, along with the total number of shares. Put the first USB device into the USB library port. See the library documentation for information about the location of this port. Have on hand the number of USB devices that equals the total number of shares. Select Next. M-of-N Shares A screen displays that asks you to select the minimum shares required to restore the encrypted key, along with the total number of shares. Select from the list users; you must select the same number of users as the total number of shares. Select Next. 60
61 5. Using Professional Edition in Spectra T950 and T120 Libraries 5. Enter a password twice, then select Next. This password is used to encrypt the key, and needs to be available before you can import and use the key. The key encrypted with this password is copied to one or more USB devices or attached in an to one or more users. USB If you exported the key to a single USB device, confirm that the encrypted key copied correctly by selecting Check Key Files. If you are not sure, delete all data from the USB devices so that no trace of the failed key attachment remains, then start again with Step 2 of this procedure. If you selected the option to split the key across M-of-N shares on multiple USB devices, eject the USB device after a share has been written to it, and at every prompt, insert another USB device. After the shares have been written, insert each USB device into the library, one by one, and select Check Key Files. If you are not sure if the key has been copied correctly, delete all data from the USB device so that no trace of the failed key attachment remains, then use another USB device and start again. If sending keys using , you may want to confirm the receipt of the attachment by checking with each user to whom you sent the encrypted key file. 61
62 5. Using Professional Edition in Spectra T950 and T120 Libraries 6. Note the password, which you will need to import the key. Without it, you cannot import the key and the data encrypted using the key is lost. Caution: Track where you have stored the key or who received an message with the key, in conformance with your security plan. You need both the password and the encrypted file containing the key to import the encryption key. 62
63 5. Using Professional Edition in Spectra T950 and T120 Libraries Restoring Data Restoring encrypted data from tape follows the standard data restore processes that you use with your backup software. The only difference is that the key used to encrypt the data being restored needs to be on the library and assigned to the partition with the tape, so the data can be decrypted. If it s available and assigned, then standard restore procedures simply work. If the key either isn t on the library or is on the library but not assigned to the partition with the encrypted media, the library displays the moniker of the key to import. To import the key, you need the exported key (or keys, if the M-of-N shares option was used) and a copy of the password used to encrypt it. Endura Decryption Utility (EDU) is an optional safeguard, providing a method that lets you restore data without a library. Review information about the command-line encryption utility in Chapter 11. Endura Decryption Utility. Restoring Data if Required Key is Available To restore data: 1. Load the tape to be decrypted. 2. Assign the key or keys to the partition with the tape if they are not already assigned to it. 3. Use the backup software to automatically decrypt and restore data. If the key or keys are not available, a message indicates this. To import a key so that you can restore data, continue to the next set of steps. Importing Keys If a key is not available on the library, you can import it from a USB device. Or, if you are using the RLC and can access the key, you can use it to upload the encryption key. This option only displays if you are logged in remotely. Note that you cannot import a key through this method if it has been split into M-of-N shares. 63
64 5. Using Professional Edition in Spectra T950 and T120 Libraries Importing Keys from a USB Device To import a key stored on a USB device: 1. Log in as a superuser. 2. Select Security > Encryption. The Encryption User Login screen displays. 3. Enter the password, then select OK. The Encryption Configuration screen displays. 4. Select Import Key. If you selected multi-user mode, and only one encryption password has been supplied, a prompt asks you to enter another password. Enter it, then select Next. 5. A screen displays asking that you insert a USB device. 6. Insert the USB device with the exported key (or a share of the exported key) into the library s USB port. The Import Key Selection screen displays. Note: You must use a USB device to import a key if it has been split into M-of-N shares. If attachments with the shares of the encrypted key were transmitted through , they must be copied to USB devices before the key can be imported and used to decrypt and restore data. 7. Choose the key to import from the Key List field, then select Next. 8. Enter the password that was used to encrypt the key when exporting it. If you are using the M-of-N shares option, insert multiple USB devices one after the other, as requested. The Encryption Configuration Import Password screen displays, showing the newly imported key. 9. Assign the imported key or shares of a key to the partition with the encrypted media. 10. Use your backup software to restore the data. 64
65 5. Using Professional Edition in Spectra T950 and T120 Libraries Importing Keys through the RLC As long as you are importing a single key, not one split into M-of-N shares, you can upload it through the RLC. To do so, you must be able to access the key from your computer. To import a key using the RLC: 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Select Import Key. The Encryption Key Files Source screen displays. Note that this screen only displays when you are using the RLC. 65
66 5. Using Professional Edition in Spectra T950 and T120 Libraries 4. Select Import key from RLC, then select Next. The RLC Encryption Key Upload screen displays. 5. To identify the key, either: Type the path for the key in the Encryption Key File field. Select Browse, locate and select the key, and select Open. The path for the key displays in the Encryption Key File field. 6. Select Next. The Import Password screen displays. 7. Enter the password that was used to encrypt the key when it was being exported, then select Next. The Encryption Configuration Import Password screen displays, showing the moniker of the newly imported key. 8. Assign the imported key to the partition with the encrypted media. 9. Use your backup software to restore the data. 66
67 5. Using Professional Edition in Spectra T950 and T120 Libraries Deleting a Key To delete a key: 1. Log in as a superuser. 2. Select Security > Encryption. The Encryption User Login screen displays. 3. Enter the password, then select OK. The Encryption Configuration screen displays. 4. Export at least one copy of the key you will be deleting or you will never be able to access data encrypted using that key. 5. Select Delete Key and respond to confirmation screens to delete the key. 67
68 6 Recycling Encrypted LTO-4 Media in Spectra T950 and T120 Libraries Recycling Media LTO-4 drives require that all data encrypted and written to a single tape is encrypted using the same key that is, a single key is associated with each tape storing encrypted data. Once the encrypted data is written to a tape, the drive won't overwrite the encrypted data to re-use the tape until you recycle the tape through BlueScale Encryption. This option is available on the Import/Export screen that displays only in partitions using drive-based encryption. To recycle the media so you can re-use it with LTO-4 drives: 1. From the toolbar menu, select General > Import/Export. For the Spectra T120 library, the Import/Export Media screen displays. For the Spectra T950 library, the Import/Export TeraPacks screen displays. 2. Select Recycle Encryption Media. The Partition screen displays. 68
69 6. Recycling Encrypted LTO-4 Media in Spectra T950 and T120 Libraries 3. Select the partition with the media from the Partition drop-down list, then select Next. The Select Media to Recycle screen displays. 69
70 6. Recycling Encrypted LTO-4 Media in Spectra T950 and T120 Libraries 4. Select the media to recycle from the Available Media list, then select Add Media. The items appear in the Media to Recycle list. To narrow down the media choices in the Available Media list, enter a partial or entire bar code in the Find by Barcode field and select Find. The list displays media with bar codes that match the values that you entered. 5. Select Next. The Select Drive to Recycle Media screen displays. 6. Select the drive to scratch the media from the Drive list, then select Recycle Encryption Media. Note: Make sure that the backup software cannot use the drive during the media recycling operation. 70
71 Spectra T50 BlueScale Encryption
72 7 Installing and Activating Encryption in Spectra T50 Libraries If your library has LTO-4 drives, your library supports encryption and key management. Data is encrypted by the LTO-4 drives during backup, and the encryption process and keys are managed through the BlueScale Encryption and Key Management features. You can choose between Standard and Professional Editions of BlueScale Encryption and key management for the features you need at your site; overviews of both are provided in this chapter. Installing Encryption: Upgrading Your Library For drive-based encryption, you must install on the library a minimum firmware level of BlueScale 10.0, if it is not already installed. Check with SpectraGuard Support to see if further upgrades to this firmware should be installed for your library. Encryption is handled through the LTO-4 drives. Configuring encryption and managing encryption keys are handled through the library s graphical interface. 1. Make sure that an LTO-4 tape drive is installed and LTO-4 media is loaded. 2. Update your library firmware level to BlueScale 10.0 or higher. Note that the firmware upgrade may require up to twelve minutes or more to complete, during which time the library enters a quiescent state. Warning: Do not turn off the library once you begin the firmware upgrade. 3. Have on hand the Spectra Logic activation key code that came with your BlueScale Encryption package to enable encryption features and key management on your library. 72
73 7. Installing and Activating Encryption in Spectra T50 Libraries Activating Encryption Once your library has at least one LTO-4 tape drive installed and LTO-4 media loaded, you can activate the encryption option with a BlueScale Encryption key. To activate BlueScale encryption: 1. Have the option key(s) on hand. 2. Log into the library as a superuser or administrator. 3. Select Configuration --> Option Keys. The Option Keys screen displays. 73
74 7. Installing and Activating Encryption in Spectra T50 Libraries 4. Select New. The New Option Key screen displays. 5. Enter the activation key then select Save. 6. Enter your activation key in the Enter Key field. 7. Select Save. The LC goes through a short series of progress screens, then refreshes to again show the Option Keys screen. The encryption option key and its description appear in the list. 74
75 7. Installing and Activating Encryption in Spectra T50 Libraries Next Steps Once you have activated BlueScale Encryption, you can configure and use it. Configuration Encryption configuration entails selecting an encryption mode and creating one or more encryption passwords (the number of passwords depends on if you have BlueScale Standard Edition or BlueScale Professional Edition). The encryption password enables you to access the encryption features. Configuring encryption is described in Configuring Encryption on page 85 for BlueScale Standard Edition and Configuring Encryption on page 102 for BlueScale Professional Edition. Accessing and Using the Encryption Features To access the encryption features, the following steps are required for every session (that is, every time a user logs in using the library front panel or every instance of running the RLC through a Web browser). A user with superuser privileges logs in and selects Security > Encryption. The Encryption User Login screen displays. A user who is entrusted with the password enters an encryption password in the Password field, then selects OK. The Encryption Configuration screen that enables access to all encryption features displays. Note that security is greatly enhanced when the user who knows the password is different than the one logging into the system. If you have three passwords, consider having different individuals responsible for each password. Working with the encryption features is described in Using Encryption on page 85 for BlueScale Standard Edition and Using Encryption on page 101 for BlueScale Professional Edition. 75
76 7. Installing and Activating Encryption in Spectra T50 Libraries Encryption Icon Use the encryption icon, displayed by selecting the Security menu, to access library encryption features such as encryption configuration and key generation. Encryption icon 76
77 7. Installing and Activating Encryption in Spectra T50 Libraries BlueScale Encryption Editions BlueScale Standard Edition: For sites with a primary goal of securing data while it is transported to a remote site and stored there, or only for data that will be stored for a long period of time, BlueScale Standard Edition works well. Standard edition lets you store one key on the library at a time. For information about configuring and using BlueScale Standard Edition, see Chapter 8. Using Standard Edition in Spectra T50 Libraries. BlueScale Professional Edition: For sites that want with greater flexibility and security, to protect data wherever it s stored and regardless of the retention period, BlueScale Professional Edition works well. Professional edition provides additional security features, and permits the use of multiple keys on the library at single time. For information about configuring and using BlueScale Professional Edition, see Chapter 9. Using Professional Edition in Spectra T50 Libraries. The table below provides a brief comparison between the two versions of BlueScale Encryption. Feature Standard Edition Professional Edition Keys Encryption Login Passwords Key Export and Import Single encryption key on a library at a time Easier to manage and track Single encryption password Easier to manage and track Import and export functions require a single password, so easier to manage Multiple simultaneous encryption keys (maximum is 30 keys) More secure, with a key for each data set Choice of either one encryption password or three More secure, with the option of requiring multiple users to export and import keys, etc. Choice of a single password or M-of-N shares with multiple passwords to export/import keys More secure Compatibility between versions Data encrypted using either version can be decrypted by a library running the other version. Data encrypted and compressed by a library using drive-based encryption and running Standard Edition can be decrypted and decompressed using Professional Edition. LTO-4 drives natively compress data while encrypting it. Standard Edition through the QIP does not support compression. Summary Less secure, but less to manage More secure, but more to manage 77
78 7. Installing and Activating Encryption in Spectra T50 Libraries Security on Initialization Both editions of BlueScale Encryption give you security options at library startup. You can choose whether to start the library: In standard mode, so that at library startup, data is encrypted with no further action required. In secure initialization mode, so that at startup, drives that encrypt data are not automatically enabled; encryption is only available and backups only run after a superuser has logged in and the encryption password is entered. Multiple Encryption Password Support To access the Standard Edition of BlueScale Encryption, create and use a single encryption password. To access the Professional Edition of BlueScale Encryption, choose whether to create one encryption password, or three encryption passwords. If you choose to implement the triplepassword option, then you will need to: Create three different passwords for access to encryption features. Enter any one of the three passwords enable encryption when the library is in Secure Initialization mode. Enter any one of the three passwords to access encryption key management and configuration options, excluding key import and export. Enter two of the three passwords to import and export keys. 78
79 7. Installing and Activating Encryption in Spectra T50 Libraries Data to Encrypt When you implement BlueScale Encryption, decide whether to encrypt all data or a subset; then determine if the encrypted data can be grouped together or if it must be isolated into sets. For example, your site may store financial data as one set, separate from consumer identity information. If all data can be encrypted together, you can use a single, encryption-enabled partition. Otherwise, create multiple encryption-enabled partitions, one for each set of data, and one or more partitions for data that is not to be encrypted. Note: To set up more than one library partition, purchase a key for each additional partition and enter the key to activate the partition. Further, note that the T50 permits only one partition per drive. Users with Professional Edition typically set up multiple partitions, each with its own key. For example, if you are encrypting all your data, you only need one partition. If you are encrypting some of your data, but not all, create a partition dedicated to encryption along with a non-encryption partition. If you want to keep your encrypted data sets isolated, create one encryption-enabled partition for each encrypted data set, and another partition for non-encrypted data. Note: It s easy to implement encryption once the library has been configured to handle encryption. Simply create backup jobs with your backup software, which sends data to the proper partitions. The data is automatically encrypted as it is backed up. 79
80 7. Installing and Activating Encryption in Spectra T50 Libraries Getting Started Activate BlueScale Encryption and key management; then you can configure and use it. Configuring Encryption: Configuration procedures are different for the two editions. If you are using Standard Edition, refer to Configuring Encryption on page 85. If you are using Professional Edition, refer to Configuring Encryption on page 102. Accessing Encryption Features For every session that requires access to the encryption features (after configuration), complete the following steps: Make sure a user with superuser privileges logs in and selects Security --> Encryption. The Encryption User Login screen displays. Have a user who is entrusted with the password enter an encryption password in the Password field, then select OK. This provides access to Encryption Configuration features. Media Recycling For both editions of BlueScale Encryption, only one encryption key is allowed per tape. If you want to re-use a tape that was encrypted with another key, you must first scratch it through BlueScale Encryption. See Chapter 10. Recycling Encrypted Media in Spectra T50 Libraries for more information on scratching encryption media. 80
81 7. Installing and Activating Encryption in Spectra T50 Libraries Best Practices To effectively use BlueScale Encryption and to ensure data security, plan an encryption strategy and back it up with processes and best practices. Once you ve implemented BlueScale Encryption, build custom strategies based on your security requirements. Sound key management policies and procedures and appropriate staff are essential to successful encryption. People Identify the people at your site who are responsible for backing up data. They will be responsible for encrypting data written to tape and to other portable media. Identify: The person to have superuser privileges on the Spectra Logic library with BlueScale Encryption. The person to have the library s encryption password. Next, identify how many users are to have responsibilities that involve encryption. It may be wise to have more than a single user familiar with passwords, depending on the size of your organization, so that if one person is not available, another can take over. Make sure only the authorized users know the encryption passwords, and that the passwords themselves are secure. Refer to Passwords and Other Identifiers on page 83 for more information on setting up passwords and monikers. 81
82 7. Installing and Activating Encryption in Spectra T50 Libraries Processes On an organizational level, identify the level of security your site requires, and the data to be encrypted for example, you may choose to encrypt all data, or any combination of financial, identity-related information, and strategic data. Consider the following when establishing your encryption procedure: Determine the level of security to use at startup. Both editions of BlueScale encryption permit a standard mode and a secure initialization mode, described in Security on Initialization on page 78. Identify any data sets that must be isolated from other encrypted data sets, described in Data to Encrypt on page 79. Identify when to make copies of encryption keys. AES-256 encryption, a symmetric encryption method, is a private key method. Users must track each key, which BlueScale Encryption identifies only by a nickname, or moniker. The key itself is never displayed, and is encrypted prior to export. Best practices dictate that you make copies of the key immediately following the key s creation. Identify the number of copies to make of each key, and note the location of each key copy. Consider storing multiple copies of keys that you then track carefully, storing the copies away from the data encrypted using those keys. It is important to make sure that at least one copy of each key is secure and readable (that is, uncorrupted) to make sure you can restore your data. This is important in that keys, once deleted, are not recoverable and once the key is gone, the data is inaccessible; this is typically considered deleted for legal and practical purposes. Identify the key rotation plan how often to create and use new keys. BlueScale Encryption Standard Edition stores one key on the library at a time. In Standard Edition, you must delete the key currently on the library before you can create another key. Professional Edition permits multiple keys per library at a single time, with one key per encryption-enabled partition. Before you delete a key, make sure that at least one copy has been exported and stored securely so that data encrypted with the key can be decrypted later. Identify methods of tracking user passwords, key passwords, and monikers. If the data is stored on a computer, make sure it is stored on a computer that enforces encryption and is not available on a network. 82
83 7. Installing and Activating Encryption in Spectra T50 Libraries Optionally, identify a primary and secondary team, so that you have redundancy in your encryption strategy. Although that means the information required to decrypt data is spread across more people, it also means that restoration of encrypted data may be much easier, and you may ultimately have more data protection given the extra layer of coverage; for example, if a user leaves, you aren t in a position to lose data. This returns to your initial decisions on how tightly and in what manner to enforce security for your site. Create procedures to handle encrypted data that has been, or may have been, compromised. For example, you may want to take all data and decrypt it, then re-encrypt it and store it in an alternate location. You will also need to investigate the incident involving the compromised data, and take appropriate actions if identity-related data may have been exposed. Archive the Endura Decryption Utility (EDU) for emergency use, such as recovering from a disaster. Use this utility if you have no Spectra Logic libraries on hand but need to decrypt and write data, which you can then restore using backup software. See Chapter 11. Endura Decryption Utility for information on EDU. If you are using Professional Edition, you may want to take advantage of the M-of-N shares option. This lets you select the M-of-N (such as 2-of-3) option to split a single file of encrypted key data into multiple parts, or shares (N, which in this example is 3), and then requires some specified subset (M, which in this example is 2) to import the file containing key data. This further protects data from unauthorized use. Passwords and Other Identifiers BlueScale Encryption requires that you supply passwords and monikers (key names). Your site may want to consider whether specific rules govern these. Monikers Your site may want to create rules governing naming conventions for key monikers, an identifier used to refer to the never-revealed true key value, which is a 256-bit key. Superuser Login/Encryption Passwords To access BlueScale Encryption, first a superuser logs in, then an encryption password is supplied separately. A Professional Edition feature lets you optionally require two of three different encryption passwords to be entered to access specific features. The passwords involved with all editions of BlueScale Encryption are: Superuser password: Lets you access all administrative privileges except encryption. Encryption password: Lets you access encryption features. After the superuser login, select Security > Encryption to display the encryption password screen. 83
84 7. Installing and Activating Encryption in Spectra T50 Libraries Import/Export Key password: Lets you import and export encryption keys. This feature is only available after the superuser has logged in and the encryption password has been entered. Optionally, in Professional Edition, you can require two different passwords prior to importing and exporting keys. Note that security is greatly enhanced when the user who knows the password is different than the superuser logging into the system. If you have three passwords, consider having different individuals responsible for each password. Mandatory Security Procedures The most important key management tasks are: Always make two or more copies of each key. The key must be protected, but it must also be available. If you choose to store only a single copy of a key, and then something happens to the device storing the key, you ve lost both your key and all data encrypted using the key. To emphasize: if you lose the key, your data is unrecoverable. You need to balance the number of copies of the key to store to guarantee access to the encrypted data against the security risk associated with storing multiple keys. Make sure that the key has been successfully stored prior to removing a key from the library. Store keys in a location apart from the location used to store the data encrypted using one of the keys. Create a list of every password associated with each key and securely store the list. Never keep this list as cleartext on a networked computer, or send it through as cleartext, etc. To decrypt and restore data, you need the data, key, and password protecting the key and data. Track every copy of each key. This is critical to meet requirements that may govern data retention and data destruction. Destroying all keys associated with encrypted data is sufficient to satisfy data destruction requirements, since encrypted data can t be accessed without the key used to encrypt it. 84
85 8 Using Standard Edition in Spectra T50 Libraries Using Encryption Once BlueScale Encryption Standard Edition is configured on your library, configure your backup software so that data to be encrypted during backup is sent to a partition that has encryption enabled and has been assigned an encryption key. Restoring data is also transparent. If the encryption key required to decrypt the data is not on the library, the library displays the moniker of the key to import. Restoring Data on page 94 contains information about data restoration. Configuring Encryption To configure BlueScale Encryption Standard Edition: 1. Log in as a superuser. 2. Select Security --> Encryption. The Encryption User Login screen displays. 3. Select OK. No login or password is required the first time you log in. The Encryption Configuration screen displays. 85
86 8. Using Standard Edition in Spectra T50 Libraries 4. Select Configure. The Encryption Settings screen displays. 5. Configure how you want the library to be used: Standard Mode: When the library is powered on during startup, data can be backed up to partitions that support encryption without entering an encryption password. To use Standard Mode, make sure that Enable Secure Initialization is not selected. Secure Initialization Mode: When the library is powered on during startup, partitions dedicated to encryption are not available, so backups sent to them cannot run. To initialize the encryption partitions, someone must log in as a superuser, then enter the encryption password. To use Secure Initialization Mode, select Enable Secure Initialization. 6. In the Password field, type in a password, using any combination of alphanumeric characters and the at sign (@), dash (-), and underscore (_) characters. 86
87 8. Using Standard Edition in Spectra T50 Libraries 7. Re-enter the password in the Confirm field, then select OK. The Encryption Configuration screen again displays. At this point, no encryption key has been created, so no key moniker displays, as illustrated in the screen at right. Creating an Encryption Key To create an encryption key: 1. From the Encryption Configuration screen, select Add Key. The New Encryption Key screen displays. 2. Enter a name in the Moniker field that has not been used for any other encryption key, and that uses any combination of alphanumeric characters and the at sign (@), dash (-), and underscore (_) characters. Use an underscore character instead of an empty space to separate characters. This moniker is the name that you will use to reference the key. Note that the real key value never displays and that administrators don t ever need to specify the real key value in order to encrypt data or manage keys. The moniker helps to protect data encrypted using the key; it does so by making sure that the true key value isn t displayed. 87
88 8. Using Standard Edition in Spectra T50 Libraries Important Notes on Creating Passwords and Monikers Each moniker must be a unique string of characters, independent of case. Monikers entered with the same name but with alphabetical characters in different cases may display as entered using upper and lower case. However, they are recognized as a single key that is, Key1, key1, and KEY1 are seen as a single key. Do not re-use a moniker. If you use a moniker for a key, later delete the key, then create a new key using the same moniker, then attempt to restore data from the first tape using the first moniker, the library would use the wrong encryption key and the data would not be recoverable. 3. Select OK. The Encryption Configuration screen displays, showing the key moniker, its creation time and date, and a message reminding you to create a copy of the key for safekeeping. If the key is lost, data cannot be recovered, so promptly copying the key and storing it safely (that is, away from the data encrypted using the key) is extremely important to data decryption and recovery. Because the key, identified by its moniker, isn t yet assigned to a partition that is, used by a partition to encrypt data None is listed in the Primary Key For column. Also, because BlueScale Standard Edition only supports using one key, the Import Key and Add Key selections no longer display. If you delete the key, they display again. 88
89 8. Using Standard Edition in Spectra T50 Libraries Assigning a Key to a Partition After creating a key, you can assign it to one or more library partitions. Assign it by selecting the option to enable encryption in this partition, when adding or editing a partition through the partition configuration wizard. The Encryption screen for partition configuration lets you enable encryption for the partition. It only displays if the encryption password has been entered and there is at least one key available on the library. When you assign a new key to a partition, or replace the existing one, BlueScale Encryption uses the new key the next time that the library loads a tape for the partition. If a key is removed or assigned while a drive is loaded, the drive continues using the previous key configuration with the tapes that are loaded. Only one encryption key is allowed per tape. If you replace the encryption key for a partition, you must first scratch tapes encrypted with the previous key to re-use them. Refer to Recycling Encrypted Media on page 98 for more information. To assign a key to a partition: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. 3. Select MENU --> Configuration --> Partitions. The Partitions screen displays. 4. Select New to add a partition, or choose a partition and select Edit to modify the settings for an existing partition. 5. Navigate through the partition configuration screens by selecting Next until the Encryption screen displays. 6. Select Enable Encryption, then select Next. 7. Navigate through the remaining partition configuration screens by selecting Next. 8. Once the Summary screen displays, select Save. All data sent to this partition will be encrypted, using the key currently active on the library. 89
90 8. Using Standard Edition in Spectra T50 Libraries Protecting Keys Data cannot be recovered without the encryption key used to encrypt the data, so protecting encryption keys is extremely important to data decryption and recovery. Protect encryption keys by: Making copies of every key through Key Export Storing the keys in a secure location Tracking the location of the keys and the passwords required to import them Protect your keys by making sure that copies of the keys reside elsewhere. Two methods are available for key export: copying the encrypted key to a USB device, and ing an encrypted version of the key as an attachment to a user who has been configured as a mail user through the library. Best practices recommend storing keys offsite in a location other than the site used for media storage. Confirm that the key is stored correctly on the USB device or has been received by the intended recipient before deleting the key from your system. If you delete the key, you must import the key to decrypt the data. Importing keys is described in Importing Keys on page 95. You may want to make two copies of a key, storing each in a secure location. Note the location of these keys, so that you can easily find the key when you need to restore or delete data. 90
91 8. Using Standard Edition in Spectra T50 Libraries Exporting Keys To export the current encryption key: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Select Export. The Export Type screen displays. 4. Select either Export Single File to USB or Exported Key. If you select Export Single File to USB, plug a USB device into the USB library port (see the library s user guide for information about the location of this port). If you select Exported Key, select an user from the Mail single key file to drop-down menu. To send the key to a user who isn t listed as a library user, you must first create the recipient. For instructions on how to do this, refer to the library s user guide. 5. After you either insert the USB device or select an alias, select Next. The Export Password screen displays. 91
92 8. Using Standard Edition in Spectra T50 Libraries 6. Enter a password, which is used to encrypt the key. Note the password, which you will need to import the key. Without it, you cannot import the key, and the data encrypted using the key is lost. 7. Select Next. The Encryption Configuration screen displays. If you exported the key to a USB device: Confirm that the encrypted key copied correctly by selecting Check Key Files. If you are not sure, delete all data from the USB device so that no trace of the failed key attachment remains, then use another USB device and start again with Step 2 above. If you exported the key using Confirm the receipt of the attachment by checking with the user to whom you sent the encrypted key file. Caution: Make sure you track, in conformance with your security plan, where you have stored the key or who received an message with the key. You need both the password created when exporting the key and the encrypted file containing the key to import the encryption key. 92
93 8. Using Standard Edition in Spectra T50 Libraries Deleting a Key To use a new key to encrypt data, you must first delete the existing key. Then you can create the new key and assign it to one or more partitions. Note that you will need a copy of the existing key to restore data that was encrypted with the existing key. Only one key is allowed per LTO-4 tape. To use a tape encrypted with a deleted encryption key, you must first scratch the tape through BlueScale Encryption. This procedure is described in Recycling Encrypted Media on page 98. To delete a key: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Confirm that at least one copy of the key has been exported and stored safely. 4. Select Delete. The Delete Encryption Key screen displays. 5. Select OK. 93
94 8. Using Standard Edition in Spectra T50 Libraries Restoring Data Restoring data is transparent. If the encryption key required to decrypt the data is not on the library, the library displays the moniker of the key to import. Restoring encrypted data from tape follows the standard data restore processes that you use with your backup software. The only difference is that the key used to encrypt the data being restored needs to be on the library and assigned to the partition with the encrypted media, so the data can be decrypted. If the key is available, standard restore procedures simply work. If the key isn t on the library, the library displays the moniker of the key to import. You can use the key moniker to identify the key, then import the key from a USB device or through the RLC. You also need the password used to encrypt the key when it was exported. Endura Decryption Utility (EDU) is an optional safeguard, providing a method that lets you restore data without a library. If you choose to purchase the command-line encryption utility, review information in Chapter 11. Endura Decryption Utility. Restoring Data if Required Key is Available If the right key isn t available on the library when you need to restore encrypted data, the library prompts you with the moniker of the key that is required to decrypt the data. You can then import the key so that it is on the library as long as there isn t already a key on it. After you assign it to the partition with the encrypted media, it is available for decryption. If you don t have a library available and need to restore the key, you need the password created when exporting the key, the key, media for the decrypted data, and the command-line encryption utility described in Chapter 11. Endura Decryption Utility, along with a Linux computer to run the utility. To restore data: 1. Load the encrypted tape in the library. 2. Assign the key to the partition with the tape if it is not already assigned to it. 3. Use the backup software to automatically decrypt and restore data. If the key is not available, a message indicates this. To import a key so that you can restore data, continue to the next set of steps. 94
95 8. Using Standard Edition in Spectra T50 Libraries Importing Keys If the key is not available on the library, you can import it from a USB device or through the RLC. The RLC option only displays if you are logged in remotely. Importing Keys from a USB Device To import keys from a USB device to restore data: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Insert the USB device into the library s USB port. 4. Select Import Key. The Import Key Selection screen displays. 5. Choose the key to import from the Key List field, then select Next. The Import Password screen displays. 6. Enter the password that was used to encrypt the key when it was being exported, then select Next. The Encryption Configuration screen displays, showing the moniker of the newly imported key. 7. Assign the imported key to the partition with the encrypted media. 8. Use your backup software to restore the data. 95
96 8. Using Standard Edition in Spectra T50 Libraries Importing Keys through the RLC You can import keys using the RLC if you can access the key from your computer. To import a key using the RLC: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays, showing Import Key and Add Key. 3. Select Import Key. The Encryption Key Files Source screen displays. Note that this screen only displays when you are using the RLC. 4. Select Import key from RLC, then select Next. The RLC Encryption Key Upload screen displays. 96
97 8. Using Standard Edition in Spectra T50 Libraries 5. To specify the key file, you can: Type in the full path and file name in the Encryption Key File field. Select Browse, then locate and select the key. Select Open. The path for the key displays in the Encryption Key File field. 6. Select Next. The Import Password screen displays. 7. Enter the password that was used to encrypt the key when it was being exported, then select Next. The Encryption Configuration screen displays, showing the moniker of the newly imported key. 8. Assign the imported key to the partition with the encrypted media. 9. Use your backup software to restore the data. 97
98 8. Using Standard Edition in Spectra T50 Libraries Recycling Encrypted Media LTO-4 drives require that all data encrypted and written to a single tape be encrypted using the same key (that is, a single key is associated with each tape storing encrypted data). Once the encrypted data is written to a tape, the drive won't overwrite the encrypted data to re-use the tape until you scratch the tape through BlueScale Encryption. Note that this option is available on the Import/Export screen that displays only in partitions using encryption. To recycle encrypted media: 1. From the toolbar menu, select General --> Import/Export. The Import/Export screen displays. 2. If your library has more than one partition, use the Import/Export drop-down menu to select the partition with the media to be recycled, then select Go. The Import/Export screen refreshes with the information for the selected partition displayed. Note: If you only have one partition, the drop-down menu does not appear. 98
99 8. Using Standard Edition in Spectra T50 Libraries 3. Select Recycle. The Select Tapes screen displays. 4. Select a tape to recycle, then select Add. The Tapes to Recycle screen appears with the tape displayed in the list. 5. To add other tapes to recycle: Select Add Tape. The Select Tapes screen displays. Repeat Step 4 to add the tape. Repeat the entire procedure to add further tapes. To delete tapes from the list of tapes to recycle: Select the tape in the Tapes to Recycle screen list. Select Delete Selected. The tape is removed from the list. Repeat this procedure to delete additional tapes. - or - Select Delete All to remove all tapes from the list. 99
100 8. Using Standard Edition in Spectra T50 Libraries 6. Select Next in the Tapes to Recycle screen once you have selected all of the tapes that you want to recycle. The Select Drive screen displays. 7. Choose the drive that you want to use to scratch the media, then select Next. The Summary screen displays. Figure 8-1 The Summary screen for recycling media. 8. Verify your selections, then select Recycle to scratch the tapes. 100
101 9 Using Professional Edition in Spectra T50 Libraries Using Encryption Once BlueScale Encryption Professional Edition is configured on your library, configure your backup software so that data to be encrypted is sent to a partition that has encryption enabled and has been assigned an encryption key. Encryption during backup is transparent it happens automatically. Restoring data is also transparent. If the encryption key required to decrypt the data is not on the library, the library displays the moniker of the key to import. Once the key is on the library and applied to the partition with the media, data restores without requiring additional steps. Restoring Data on page 115 contains information about data restoration. Professional Edition Overview Professional Edition supports multiple keys on the library simultaneously. Each partition that is enabled for encryption uses one key to encrypt data backed up through that partition. To streamline the reverse process of decryption, you can further configure the system to associate multiple monikers with a single partition. When you need to restore data, the BlueScale key management software looks at the keys you ve assigned to the partition for both encryption and decryption. If it finds the right key, that key is used. If a key is required that isn t assigned to the partition, the software displays the moniker of the key it needs to decrypt and restore the data. Best practices recommend that you track keys associated with data on the tape, so that you can readily decrypt and restore data. 101
102 9. Using Professional Edition in Spectra T50 Libraries Configuring Encryption Once BlueScale Encryption Professional Edition is configured on your library, configure your backup software so that data to be encrypted during backup is sent to an encryption-enabled partition that has been assigned an encryption key. To configure BlueScale Encryption Professional Edition: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Select OK. No login or password is required the first time you log in. The Encryption Configuration screen displays. 3. Select Configure. The Encryption Users screen displays. 4. Select either: Single User Mode: Requires the creation of one encryption password to access all encryption features. Multi-User Mode: Requires the creation of three unique encryption passwords. Once you have set up the three passwords, use them as follows: Enter any one of the three to permit a library in Secure Initialization mode to initialize encryption when the library is starting up and to otherwise access most encryption features, excluding export and import encryption features. Enter a second password, when prompted, to access export and import encryption features. 102
103 9. Using Professional Edition in Spectra T50 Libraries 5. Select Next. The Encryption Settings screen displays. Note: If you selected Single User Mode, only one set of New Encryption User Password and Retype Password fields display. 103
104 9. Using Professional Edition in Spectra T50 Libraries 6. In the Encryption setting screen, configure how you want the library to be used: Standard Mode: When the library is powered on during startup, data can be backed up to partitions that support encryption without entering an encryption password. To use Standard Mode, make sure that Enable Secure Initialization is not selected. Secure Initialization Mode: When the library is powered on during startup, partitions dedicated to encryption are not available, so backups sent to them cannot run. To initialize the encryption partitions, someone must log in as a superuser, then enter the encryption password. To use Secure Initialization Mode, select Enable Secure Initialization. 7. Enter password or passwords as requested; each password can be made up of any combination of alphanumeric characters, and the at sign (@), dash(-), and underscore (_) characters. 8. Enter each password again in the relevant Confirm field. 9. When all passwords have been entered, select OK. The Encryption Configuration screen again displays. 104
105 9. Using Professional Edition in Spectra T50 Libraries Creating an Encryption Key To create an encryption key: 1. From the Encryption Configuration screen, select Add Key. The New Encryption Key screen displays. 2. Enter a name in the Moniker field that has not been used for any other encryption key, and that uses any combination of alphanumeric characters and the at sign (@), dash (-), and underscore (_) characters. It may be helpful to use an underscore character instead of an empty space to separate parts of the moniker (as in, finance_fourth_quarter). This moniker is the name that you will use to reference the key. Note: Note that the real key value never displays and that administrators don t ever need to specify the real key value in order to encrypt data or manage keys. The moniker helps to protect data encrypted using the key; it does so by making sure that the true key value isn t displayed. Rules for Creating Monikers Each moniker must be a unique string of characters, independent of case. Make a habit of using a single case (all upper or all lower) for monikers. After export, case is ignored, so that keys associated with the monikers Moniker1, moniker1, and MONIKER1 are interpreted as a single key. If you have two monikers that are identical except for case, then you may not be able to retrieve some of your data after importing such a key. 105
106 9. Using Professional Edition in Spectra T50 Libraries 3. Select OK. The Encryption Configuration screen displays, showing the key moniker, its creation time and date, and a message reminding you to create a copy of the key for safekeeping. If the key is lost, data cannot be recovered, so promptly copying the key and storing it safely (that is, away from the data encrypted using the key) is extremely important to data decryption and recovery. Because the key, identified by its moniker, isn t yet assigned to a partition that is, used by a partition to encrypt data None is listed in the Primary Key For column. 106
107 9. Using Professional Edition in Spectra T50 Libraries Assigning a Key to a Partition After creating keys, you can assign one primary encryption key to each library partition. You can also specify multiple decryption-only keys. When you assign a new encryption key to a partition, or replace the existing one, BlueScale Encryption uses the new key the next time that the library loads a tape for the partition. If a key is removed or assigned while a drive is loaded, the drive continues using the previous key configuration with the tapes that are loaded. Displaying the Partition Configuration Encryption Screen You can assign keys to a library partition when adding the partition or editing its settings through the partition configuration wizard. The Encryption screen for partition configuration lets you enable encryption for the partition and associate keys with it. It only displays if the encryption password has been entered and there is at least one key available on the library. For more information on working with partitions, refer to the library s user guide. To display the Encryption screen: 1. Log in as superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. 3. Select MENU --> Configuration-- > Partitions. The Partitions screen displays. 4. Select New to add a partition, or choose a partition and select Edit to modify the settings for an existing partition. 5. Navigate through the partition configuration screens by selecting Next until the Encryption screen displays. The option to enable encryption and a list of keys available on the library appear on this screen. 107
108 9. Using Professional Edition in Spectra T50 Libraries Associating Keys with a Partition Only one encryption key is allowed per tape. If you replace the encryption key for a partition, you must first scratch tapes encrypted with the previous key to re-use them. Refer to Recycling Encrypted Media on page 98 for more information. To associate a key with a partition: 1. Follow the procedure in Displaying the Partition Configuration Encryption Screen on page 107 to display the Encryption screen. 2. Select Enable Encryption. 3. If you have more than one encryption key, select the key to use to encrypt data. Only one key can be assigned as the active encryption key. 4. If you have more than one encryption key, from the list of keys at the bottom of the screen, select none, one, or more keys to be associated with this partition and for use in decrypting data through this partition. Note: Keys selected for data decryption are not used for encryption. 108
109 9. Using Professional Edition in Spectra T50 Libraries 5. Select Next. 6. Navigate through the remaining partition configuration screens by selecting Next. 7. Once the Summary screen displays, select Save. All data sent to this partition will be encrypted, using the key currently active on the library. Protecting Keys Protect encryption keys by: Making copies of every key through Key Export Storing the keys in a secure location Tracking the location of the keys and the passwords required to import them. Protect your keys by making sure that copies of the keys reside elsewhere. Two methods are available for key export: copying the encrypted key to one or more USB devices and ing an encrypted version of the key as an attachment to one or more users who have been configured as library mail users. 109
110 9. Using Professional Edition in Spectra T50 Libraries Methods of Securing Keys You can add another layer of key protection by using the three encryption passwords option, so that two of three different passwords must be entered to access export and import key functions. Review Configuring Encryption on page 102 for information about configuring the library to support multiple passwords. M-of-N Shares in Exporting Keys to USB Devices and Mail Users To export the key, you can copy the encrypted key to USB devices or send encrypted copies through . Note that the only way to import a key is to use a USB device. You may choose to add another safeguard to key export and import by choosing to split the key into multiple portions when you export it. This is referred to as M-of-N shares; this option lets you define a total number of portions (N) to split the key into and the subset of that number (M) required to access the encrypted key file protected using this method. For your site, select one of these as your M-of-N shares: 2-of-3 2-of-4 3-of-4 2-of-5 3-of-5 4-of-5 For example, if you choose 2 of 3, then the encrypted key, already encrypted using a keyspecific password, is split into three shares (i.e., files). You can then export the key shares using USB devices or through . If you choose to export using USB devices, you will be prompted to supply three USB devices, one after the other. To shares using 2 of 3, select three different users (configured on the library with information), each receiving one share as an attachment. Keys that have been split into shares can only be imported using USB devices; they cannot be uploaded through the RLC. To restore data that has been sent through , copy the attachment to a USB device. Building on this example, note that only two of the three USB devices, along with the password, are needed to import the key. Selecting the m-of-n shares option when exporting a key is covered below in Exporting Keys on page
111 9. Using Professional Edition in Spectra T50 Libraries Storing Exported Keys Best practices recommends storing keys offsite in a location other than the site used for media storage. Make sure that the key has been sent and can be accessed, is stored correctly on the USB device, or both, before deleting the key from your system. You may want to make two copies of a key, storing each in a secure location. Note the location of these keys, so that you can easily find the key when you need to restore or delete data. Exporting Keys To export the current encryption key: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 111
112 9. Using Professional Edition in Spectra T50 Libraries 3. Select Export. If you selected multi-user mode and supplied only one encryption password, a prompt asks you to enter another password. Enter it, then select Next. The Export Type screen displays. Otherwise, the Export Type screen immediately displays. 4. Select either an option to export the key as a single file or as M-of-N shares to either USB or , as described in the table on page
113 9. Using Professional Edition in Spectra T50 Libraries Export Method Export Single File to USB (Standard or Professional Edition) Exported Key (Standard or Professional Edition) Export M-of-N Shares to USB M-of-N Shares Steps to Follow - Select this option, then put a USB device into the library s USB port. See the library s user guide for information on using the USB and about the location of this port. - Select Next. The Export Password screen displays. - Select this option, then select an user. If the intended recipient is not available as an user on this library, first create the recipient. For instructions on how to do this, refer to the library s user guide. - Select Next. The Export Password screen displays. - A screen displays that asks you to select the minimum shares required to restore the encrypted key, along with the total number of shares. - Put the first USB device into the USB library port. See refer to the library s user guide for information about the location of this port. Have on hand the number of USB devices that equals the total number of shares. - Select Next. The Export Password screen displays. - A screen displays that asks you to select the minimum shares required to restore the encrypted key, along with the total number of shares. - Select from the list users; you must select the same number of users as the total number of shares. - Select Next. The Export Password screen displays. 113
114 9. Using Professional Edition in Spectra T50 Libraries 5. Enter a password twice in the Export Password screen, then select Next. The Encryption Configuration screen displays. This password is used to encrypt the key, and needs to be available before you can import and use the key. The key encrypted with this password is copied to one or more USB devices or attached in an to one or more users. USB If you exported the key to a single USB device, confirm that the encrypted key copied correctly by selecting Check Key Files. If you are not sure, delete all data from the USB devices so that no trace of the failed key attachment remains, then start again. If you selected the option to split the key across M-of-N shares on multiple USB devices, eject the USB device after a share has been written to it, and at every prompt, insert another USB device. After the shares have been written, insert each USB device into the library, one by one, and select Check Key Files. If you are not sure if the key has been copied correctly, delete all data from the USB device so that no trace of the failed key attachment remains, then use another USB device and start again. If sending keys using , you may want to confirm the receipt of the attachment by checking with each user to whom you sent the encrypted key file. 6. Note the password, which you will need to import the key. Without it, you cannot import the key and the data encrypted using the key is lost. Caution: Track where you have stored the key or who received an message with the key, in conformance with your security plan. You need both the password and the encrypted file containing the key to import the encryption key. 114
115 9. Using Professional Edition in Spectra T50 Libraries Restoring Data Restoring encrypted data from tape follows the standard data restore processes that you use with your backup software. The only difference is that the key used to encrypt the data being restored needs to be on the library and assigned to the partition with the tape, so the data can be decrypted. If it s available and assigned, then standard restore procedures simply work. If the key either isn t on the library or is on the library but not assigned to the partition with the encrypted media, the library displays the moniker of the key to import. To import the key, you need the exported key (or keys, if the m-of-n shares option was used) and a copy of the password used to encrypt it. Endura Decryption Utility (EDU) is an optional safeguard, providing a method that lets you restore data without a library. Review information about the command-line encryption utility in Chapter 11. Endura Decryption Utility. Restoring Data if Required Key is Available To restore data: 1. Load the encrypted tape in the library. 2. Assign the key or keys to the partition with the tape if they are not already assigned to it. 3. Use the backup software to automatically decrypt and restore data. If the key or keys are not available, a message indicates this. To import a key so that you can restore data, continue to the next set of steps. Importing Keys If a key is not available on the library, you can import it from a USB device. Or, if you are using the RLC and can access the key, you can use it to upload the encryption key. This option only displays if you are logged in remotely. Note that you cannot import a key through this method if it has been split into m-of-n shares. 115
116 9. Using Professional Edition in Spectra T50 Libraries Importing Keys from a USB Device If the key is stored on a USB device, import it by following this procedure. To import keys from a USB device to restore data: 1. Log in as a superuser, then select Security > Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Insert the USB device into the library s USB port. 4. Select Import Key. The Import Key Selection screen displays. If you selected multi-user mode, and only one encryption password has been supplied, a prompt asks you to enter another password. Enter it, then select Next. 5. Choose the key to import from the Key List field, then select Next. The Import Password screen displays. 6. Enter the password that was used to encrypt the key when it was being exported, then select Next. If you are using the M-of-N shares option, insert multiple USB devices one after the other, as requested. The Encryption Configuration screen displays, showing the moniker of the newly imported key. 7. Assign the imported key to the partition with the encrypted media. 8. Use your backup software to restore the data. 116
117 9. Using Professional Edition in Spectra T50 Libraries Importing Keys through the RLC As long as you are importing a single key, not one split into M-of-N shares, you can upload it through the RLC. If you are using the RLC and can access the key from your computer, import it by following this procedure. To import keys through the RLC: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Select Import Key. The Encryption Key Files Source screen displays. Note that this screen only displays when you are using the RLC. 4. Select Import key from RLC, then select Next. The RLC Encryption Key Upload screen displays. 5. To identify the encryption key file, either: Type the path for the key in the Encryption Key File field. Select Browse, locate and select the key. Select Open. The path for the key displays in the Encryption Key File field. 6. Select Next. The Import Password screen displays. 117
118 9. Using Professional Edition in Spectra T50 Libraries 7. Enter the password that was used to encrypt the key when it was being exported in both fields, then select Next. The Encryption Configuration screen displays, showing the moniker of the newly imported key. 8. Assign the imported key to the partition with the encrypted media. 9. Use your backup software to restore the data. Deleting a Key Only one key is allowed per LTO-4 tape. To use a tape encrypted with a deleted encryption key, you must first scratch the tape through BlueScale Encryption. This procedure is described in Recycling Encrypted Media on page 98. To delete a key: 1. Log in as a superuser, then select Security --> Encryption. The Encryption User Login screen displays. 2. Enter the encryption password, then select OK. The Encryption Configuration screen displays. 3. Confirm that at least one copy of the key has been exported and stored safely. 4. Select Delete. The Delete Encryption Key screen displays. 5. Select OK. 118
119 10 Recycling Encrypted Media in Spectra T50 Libraries Recycling Encrypted Media LTO-4 drives require that all data encrypted and written to a single tape be encrypted using the same key (that is, a single key is associated with each tape storing encrypted data). Once the encrypted data is written to a tape, the drive won't overwrite the encrypted data to re-use the tape until you recycle the tape through BlueScale Encryption. This option is available on the Import/Export screen for partitions using encryption. To recycle encrypted media: 1. From the toolbar menu, select General --> Import/Export. The Import/Export screen displays. 119
120 10. Recycling Encrypted Media in Spectra T50 Libraries 2. If your library has more than one partition, use the Import/Export drop-down menu to select the partition with the media to be recycled, then select Go. The Import/Export screen refreshes with the information for the selected partition displayed. If you only have one partition, the drop-down menu does not appear on this screen. 3. Select Recycle. The Select Tapes screen displays. 4. Select a tape to recycle, then select Add. The Tapes to Recycle screen appears with the tape displayed in the list. 5. To add more tapes, continue to Adding More Tapes to Recycle on page 121. To recycle the selected tape, proceed to Finishing the Tape Recycling on page
121 10. Recycling Encrypted Media in Spectra T50 Libraries Adding More Tapes to Recycle To add other tapes to recycle: 1. From the Tapes to Recycle screen, select Add Tape. The Select Tapes screen redisplays. 2. Repeat Step 4 and Step 5 on page Repeat this procedure as many times as necessary to add even more tapes. To delete tapes from the list of tapes to recycle, proceed to Deleting Tapes from the List, below. 4. Proceed to Finishing the Tape Recycling on page 122 Deleting Tapes from the List To delete tapes from the list of tapes to recycle, either: Select a tape in the Tapes to Recycle screen list and select Delete Selected. The tape is removed from the list. Select Delete All to remove all tapes from the list. 121
122 10. Recycling Encrypted Media in Spectra T50 Libraries Finishing the Tape Recycling To finish the tape recycling 1. When the list shows all of the tapes you want to recycle, select Next in the Tapes to Recycle screen. The Select Drive screen displays. 2. Choose the drive to scratch the media, then select Next. The Summary screen displays. 3. Verify your selections, then select Recycle to scratch the tapes. 122
123 EDU and BlueScale Encryption Support
124 11 Endura Decryption Utility Endura Decryption Utility Overview The optional Endura Decryption Utility (EDU) lets you restore data with a minimum of equipment, which may be important in recovering data following a crisis or disaster. Use this command-line utility on a host that is running Linux and has one or more tape drives connected and online. The EDU utility decrypts the data stored on tape and writes it to the same or a different tape. You can then restore the data with the backup software used to back up the data. Requirements To decrypt data, assemble the following: Tapes with encrypted data Tape(s) to hold decrypted data (optional but recommended) The key or keys required to decrypt the data; the keys must be stored on media that the host computer can read. The password or passwords that are used to access the key. The EDU binary stored on media that the host computer can read. A host running Linux; Red Hat Enterprise Linux running kernel 2.4 or 2.6 is recommended. Two stand-alone SCSI-attach drives that the host computer can read from and write to - or- One stand-alone SCSI-attach drive that the host computer can read from and write to. 124
125 11. Endura Decryption Utility Note: If only one drive is available, confirm that the host has enough available disk space in /tmp to store the contents of the tape. If you don t know the exact amount of data on the tape, make sure the disk space is large enough to hold the maximum amount of data that can be stored on the tape. To decrypt data from an LTO-4 tape, make sure you have 800 GB of space in /tmp. To decrypt data from an LTO-3 tape, make sure you have 400 GB. To restore decrypted data, have on hand a system running the backup software used to write the data to tape. Decrypting Data: EDU Command Line Review the command line arguments for EDU. Arguments edu i drive_w_encryptape o drive_w_blank_tape n [number of keys] -i /dev/nst0 (indicating the tape drive with the encrypted tape in it) -o /dev/nst1 (indicating a different full path to a tape drive with a tape with capacity sufficient to hold decrypted data) -n [number of keys] EDU returns with system prompts, requesting the full path and file names of the files containing the key as well as passwords. Enter the number of keys and press Enter on your keyboard. If you enter the same value for i and o arguments, then EDU decrypts the tape, writes the decrypted data to local disk, and then asks you to load a tape to store the decrypted data. 125
126 11. Endura Decryption Utility Using EDU to Decrypt Data: One Drive Preparing to Decrypt Data to Tape Make sure the system is set up as follows: 1. Make sure Linux is running on the hardware and one SCSI-attach drive is mounted. 2. Make sure the host is using a file system that can support files equal to the maximum data capacity of the tape to be decrypted. For LTO-4, the file system must handle 800 GB files 3. Make sure the host has enough space in the /tmp directory to store the maximum data capacity of the tape to be decrypted (or, if you know the amount of data on the tape, the equivalent amount of disk space). For LTO-4, make sure /tmp has 800 GB of space free. 4. Log in as a user with permissions to write to the drive. For example, you may need to log in as a superuser to access it. 5. Write-protect the tape or tapes storing the encrypted data. Note: EDU restores data that has been encrypted through the Spectra library using QIP-based encryption. 6. Insert the write-protected tape into the drive. Note the device name (this example uses /dev/nst1). Have an empty tape on hand. 7. Copy EDU onto the system (optional but recommended); note the full path and file name. 126
127 11. Endura Decryption Utility 8. Copy the key file from the USB device that contains the encrypted key or keys to the system. Note the full path and filename for each key. Also have on hand the key s password in human readable form Running EDU to Decrypt Data To run EDU to decrypt data: 1. At the command line, enter the command, specifying the drive: In this example, only one key is required. This example assumes that you have copied the EDU binary to /root/decrypt/edufile1.3.3 enter the command at a system prompt: /root/decrypt/edufile i /dev/nst1- -n1 then press enter. 2. The system prompt displays along with a request for the password. Type it in, then press Enter. 3. The system then prompts for the full path and file name of the key. Type it in, then press Enter. 4. The system begins copying the data to /tmp. Messages display as the data is decrypted. The system indicates when the copy is complete, and prompts you to insert an empty tape. Note: Although you can choose to turn off write-protect on the original tape and decrypt and restore data to the same tape, this is strongly discouraged. Doing so overwrites the original data set. If the system has had any problem copying data, then the original data is erased and cannot be recovered. 5. Insert the empty tape then press Enter. EDU decrypts data and writes it to the tape now in the drive. 6. Repeat this procedure for every tape to be decrypted. 127
128 11. Endura Decryption Utility Using EDU to Decrypt Data: Two Drives Preparing to Decrypt Data to Tape With two stand-alone SCSI drives mounted on the host: 1. Make sure Linux is running on the hardware and has two SCSI-attach drives are mounted. 2. Log in as a user with permissions to write to drive. For example, you may need to log in as a superuser to access them. 3. Write-protect the tape or tapes storing the encrypted data. Note: EDU restores data that has been encrypted through the Spectra library using QIP-based encryption. 4. Insert the write-protected tape into a drive. Note the device name (this example uses / dev/nst1). 5. Insert the empty tape into the remaining drive. Note the device name (this example uses /dev/nst2). 6. Copy EDU onto the system (optional but recommended). Note the full path and file name. 7. Copy the key file from the USB device that contains the encrypted key or keys to the system. Note the full path and filename for each key. Also have on hand the key s password in human readable form 128
129 11. Endura Decryption Utility Running EDU to Decrypt Data 1. At a system prompt, enter the command, making sure: the input drive has loaded the write-protected tape with encrypted data the output drive has an empty tape loaded In this example, only one key is required. This example assumes you have copied the EDU binary to /root/decrypt/edufile1.3.3 enter the command at a system prompt: /root/decrypt/edufile i /dev/nst1- o/dev/nst2 -n1 then press enter. 2. The system prompt displays along with a request for key s password. Enter it, then press Enter. The system prompts for the key: enter the full path and file name of the key, then press Enter. 3. The system begins decrypting data and writing it to the empty tape. Messages display as the data is decrypted. The system indicates when the decryption is complete. 4. Remove the tapes. Repeat starting at step 1 for each tape storing data that is to be decrypted. Restoring Data Use the backup software to restore the data. Note that, if you are using a library to restore data, you may want to make sure the tape with the decrypted data has the same bar code as the tape on which the encrypted data was stored. The backup software may require the tape to have its original bar code; otherwise, the data may not be restored. This requires moving the label from one tape to the other, or creating a duplicate of the original bar code label and putting it on the tape storing the decrypted data. 129
130 12 Technical Support & Spectra Logic Contact Information BlueScale Encryption Support Spectra Logic BlueScale Encryption Support is available for one, two, or three years at sites located in North America and the European Union. For sites outside North America and the European Union, please contact your local Spectra Logic sales representative. Following are some advantages of BlueScale Encryption support: Key Management Support Most encryption questions revolve around key management. Spectra Logic helps customers with all key management issues and provides best practices advice. New Features Upgrades The encryption environment is rapidly evolving. New features developed for BlueScale Encryption will be made available for locations with BlueScale encryption support. Troubleshooting We will help you deal with encryption-related issues as they arise. Firmware Patches and Fixes BlueScale Encryption support customers receive all necessary firmware patches and fixes while under contract. Environment Optimization We will help you get the most out of your backup environment. Onsite and Telephone Support Onsite and telephone support for BlueScale Encryption is defined by the customer s hardware support selection. Reference the library contract for specific days and times. Online Support The SpectraGuard Web page at provides extensive product documentation, user manuals, and online training for customer reference. 130
131 12. Technical Support & Spectra Logic Contact Information Contacting Spectra Logic Sales United States and Canada Mexico, Central America, South America, Asia, Australia, and New Zealand Europe, Africa, and Middle East Phone Phone Phone (0) SpectraGuard Technical Support United States and Canada Mexico, Central America, South America, Asia, Australia, and New Zealand Europe, Africa, and Middle East Phone Phone Phone (0)
132 Index A accessing encryption 80 activating encryption 28, 73 activation key 28 AES-256, definition of 23 arguments, EDU 125 assigning a key to a partition 53 assigning an encryption key BlueScale Encryption Professional Edition 108 BlueScale Encryption Standard Edition 89 B best practices, encryption 16, 81 BlueScale Encryption 72 getting started 80 BlueScale Encryption overview 11 BlueScale Encryption Professional Edition Assigning keys 108 configuring encryption 102 importing keys from a USB device 116 importing keys through the RLC 117 overview 101 BlueScale Encryption Standard Edition assigning an encryption key 89 configuring encryption 85 creating an encryption key 87 exporting encryption key 91 exporting encryption key using 91 importing keys from a USB device 95 importing keys through the RLC 96 BlueScale Professional Edition, description 12 BlueScale Standard Edition, description 12 BlueScale, definition of 23 C Check Key Files 39, 61, 92 cleartext, definition of 23 command-line utility, edu 125 configuring encryption BlueScale Encryption Professional Edition 102 BlueScale Encryption Standard Edition 85 contacting Spectra Logic sales 2, 131 creating an encryption key 33, 51 BlueScale Encryption Professional Edition 105 BlueScale Encryption Standard Edition 87 D deleting an encryption key 44, 67 E EDU arguments 125 EDU, definition of 23 encryption accessing 80 best practices procedures 82 key management tasks 84 mandatory security procedures 84 encryption features access 19 encryption key exporting to USB in BlueScale Encryption Standard Edition 91 exporting using in BlueScale Encryption Standard Edition 91 encryption key monikers, rules for creating 33, 51, 88, 105 encryption keys assigning in BlueScale Encryption Professional Edition 108 assigning in BlueScale Encryption Standard Edition 89 creating in BlueScale Encryption Professional Edition creating an encryption key 105 creating in BlueScale Encryption Standard Edition 87 encryption keys, copies of 17 encryption methods drive-based 15 library-based 15 encryption passwords multiple password support 78 encryption passwords, rules for creating 88 Endura Decryption Utility overview
133 Index Endura Decryption Utility, definition of 23 Endura Key Management, definition of 23 exporting encryption keys 90 M-of-N shares 110 exporting key to USB 38 exporting key using 38 exporting keys 37, 57 I importing encryption keys 90 importing encryption keys in BlueScale Encryption Professional Edition from a USB device 116 through the RLC 117 importing encryption keys in BlueScale Encryption Standard Edition from a USB device 95 through the RLC 96 importing keys 37, 57 from a USB device 42, 64 through the RLC 43, 65 importing keys, USB device 64 initializing the library, encryption availability 13, 78 K key management tasks 24 P partition, definition of 23 partition, encryption-enabled 14 phone Spectra Logic sales 131 protecting encryption keys 90 protecting keys 37, 57 R Recycling Encrypted LTO-4 Media 68 recycling encrypted LTO-4 media 15 Recycling encrypted media 98, 119, 122 Remote Library Controller 11 restoring encrypted data 40, 63, 94, 115 S sales, contacting 131 secure initialization mode, no encryption on startup 13, 78 software license, for library 2 Spectra Logic sales 131 standard mode, encryption at library startup 13, 78 superuser, encryption access 29, 75 support, BlueScale Encryption 130 L library software license 2 license (library software) 2 LTO-4 drives, encryption support 15 LTO-4 media, recycling 15 M media recycling 68, 98, 119, 122 M-of-N shares 110 moniker, definition of 23 monikers 19 N NIST, definition of 23 O overview, Endura Decryption Utility
Spectra Encryption User Guide
SpectraLogic.com Copyright Notices Trademarks Part Number Revision History Copyright 2006 2015 Spectra Logic Corporation. All rights reserved. This item and the information contained herein are the property
C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.
ENGLISH APPLE INC. SOFTWARE LICENSE AGREEMENT FOR APPLE STORE APPLICATION PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE APPLE SOFTWARE. BY USING THE APPLE SOFTWARE,
System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation
Contents System Requirements... 3 Installation... 3 Microsoft SQL Express 2008 R2 Installation... 3 Microsoft.NET Framework 4.0 Installation... 7 InFocus Management Tool Installation... 8 Log In... 10
Spectra T50e Flash (SD) Card Installation Instructions
Spectra T50e Flash (SD) Card Installation Instructions PN 90970021 Revision A Notices Notices Except as expressly stated herein, Spectra Logic Corporation makes available this Spectra library and associated
FILEMAKER PRO ADVANCED SOFTWARE LICENSE
FILEMAKER PRO ADVANCED SOFTWARE LICENSE IMPORTANT -- READ CAREFULLY: BY INSTALLING, COPYING, DOWNLOADING, ACCESSING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.
MDM Zinc 3.0 End User License Agreement (EULA)
MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA
TATUKGIS SOFWARE LICENSE AGREEMENT
TATUKGIS SOFWARE LICENSE AGREEMENT READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY BEFORE INSTALLING THE TATUKGIS, SOFTWARE PROVIDED WITH THIS AGREEMENT (THE SOFTWARE ). USE OF THE SOFTWARE CONSTITUTES
Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement
Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2003 AND MICROSOFT WINDOWS SERVER 2003 R2 PRODUCTS
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2003 AND MICROSOFT WINDOWS SERVER 2003 R2 PRODUCTS These license terms are an agreement between you and [OEM]. Please read them. They apply to
PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.
Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SQL SERVER 2005 (CAL VERSIONS)
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SQL SERVER 2005 (CAL VERSIONS) These license terms are an agreement between you and [OEM]. Please read them. They apply to the software included on this server.
Copy Tool For Dynamics CRM 2013
Copy Tool For Dynamics CRM 2013 Page 1 of 15 Copy Tool 2013 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2013 Dynamics Professional Solutions. All rights reserved.
Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Tower Software License Agreement
fournova Software GmbH Tower Software License Agreement PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. BY USING THE SOFTWARE, YOU ARE AGREEING TO BE BOUND BY THE TERMS
Installing CPV Lab Version 2.17
Installing CPV Lab Version 2.17 END-USER LICENSE AGREEMENT ( EULA ) FOR CPV LAB This End-User License Agreement ("EULA") pertains to the CPV Lab product (called Software" in this Agreement). Read the terms
Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement)
Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) I. INTRODUCTION PARTIES AND DEFINITIONS This Mobile Banking Service Agreement (as amended from time to time,
SUBSCRIPTION SERVICES.
SUSE Manager Server SUSE Manager Server with Database SUSE Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY PURCHASING, INSTALLING AND/OR USING THE SOFTWARE (INCLUDING ITS COMPONENTS),
General Terms and Conditions for Online Sales of TomTom Inc ( TomTom )
General Terms and Conditions for Online Sales of TomTom Inc ( TomTom ) 1) Scope a) These Terms and Conditions shall apply to all purchase orders submitted or to be submitted by you for any item, service
1. GRANT OF LICENSE. Formdocs LLC grants you the following rights provided that you comply with all terms and conditions of this EULA:
END-USER LICENSE AGREEMENT FOR FORMDOCS SOFTWARE IMPORTANT-READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and Formdocs
THE SOFTWARE MAY NOT BE SOLD, TRANSFERRED, OR FURTHER DISTRIBUTED EXCEPT AS AUTHORIZED BY LICENSOR.
Novell ZENworks Suite 11 (SP4) Novell ZENworks Configuration Management 11 Novell ZENworks Asset Management 11 Novell ZENworks Full Disk Encryption 11 Novell ZENworks Patch Management 11 Novell Endpoint
SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED
SOLARWINDS, INC ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED IMPORTANT -- READ CAREFULLY BEFORE USING THIS SOFTWARE: THIS IS A LEGAL AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2003 R2 STANDARD EDITION, ENTERPRISE EDITION, STANDARD x64 EDITION, ENTERPRISE x64 EDITION
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2003 R2 STANDARD EDITION, ENTERPRISE EDITION, STANDARD x64 EDITION, ENTERPRISE x64 EDITION These license terms are an agreement between you and
Version 2.17 Update Installation Guide
Page 1 of 11 Version 2.17 Update Installation Guide Page 2 of 11 END-USER LICENSE AGREEMENT ( EULA ) FOR CPV LAB This End-User License Agreement ("EULA") pertains to the CPV Lab product (called Software"
NetSuite End User License Agreement for Mobile Applications
Last Revision: October 30, 2015 NetSuite End User License Agreement for Mobile Applications This NetSuite End User License Agreement for Mobile Applications, including without limitation, all attachments
InnoCaption TM Service Terms of Use
PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.
Mobile Banking and Mobile Deposit Terms & Conditions
Mobile Banking and Mobile Deposit Terms & Conditions PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: This Mobile Banking and Mobile Deposit Addendum ( Addendum ) to the Old National
ENTERPRISE EDITION INSTALLER END USER LICENCE AGREEMENT THIS AGREEMENT CONSISTS OF THREE PARTS:
ENTERPRISE EDITION INSTALLER END USER LICENCE AGREEMENT THIS AGREEMENT CONSISTS OF THREE PARTS: A. VNC SERVER ENTERPRISE EDITION END USER LICENCE AGREEMENT B. VNC VIEWER ENTERPRISE EDITION END USER LICENCE
If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:
IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL
C-DAC Medical Informatics Software Development Kit End User License Agreement
C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL
LICENSOR: Specify the total number of server licenses for which the end user is licensed under this agreement.
(For ISV Royalty Program Only) Microsoft SQL Server 2008 R2 Standard 1 (Runtime) Server Licenses: User Client Access Licenses: Device Client Access Licenses: 2 3 4 END-USER LICENSE AGREEMENT These license
Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services.
Service Description: Cisco Prime Home Hosted Services This document describes the Cisco Prime Home Hosted Services. Related Documents: The following documents also posted at www.cisco.com/go/servicedescriptions/
Full Disk Encryption Agent Reference
www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
MICROSOFT SOFTWARE LICENSE TERMS WINDOWS 7 ULTIMATE FOR EMBEDDED SYSTEMS WINDOWS 7 PROFESSIONAL FOR EMBEDDED SYSTEMS (ALL VERSIONS)
MICROSOFT SOFTWARE LICENSE TERMS WINDOWS 7 ULTIMATE FOR EMBEDDED SYSTEMS WINDOWS 7 PROFESSIONAL FOR EMBEDDED SYSTEMS (ALL VERSIONS) These license terms are an agreement between you and Kontron Europe GmbH.
PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.
Novell ZENworks Mobile Management Novell ZENworks Mobile Management Enterprise App Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE,
McAfee End User License Agreement
Page 1 of 7 McAfee End User License Agreement NOTICE TO ALL USERS: PLEASE READ THIS CONTRACT CAREFULLY. BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY)
SOFTWARE DISTRIBUTION AGREEMENT
SOFTWARE DISTRIBUTION AGREEMENT APPLE COMPUTER, INC. Software Licensing Department 12545 Riata Vista Circle MS 198 3-SWL Austin, TX 78727 E-Mail Address: [email protected] Licensee Individual to Contact
THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE
THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the
End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011
End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 We appreciate your selection of South Jersey CrashPlan, the premier online/offsite backup service offered
EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT
EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT This Application End User License Agreement ( License ) is an agreement between you and ViaSat, Inc., with its principal place of business at
THIS PRODUCT DOES NOT TRANSMIT ANY PERSONALLY IDENTIFIABLE INFORMATION FROM YOUR COMPUTER TO MICROSOFT COMPUTER SYSTEMS WITHOUT YOUR CONSENT.
Microsoft Windows XP Media Center Edition 2005 SUPPLEMENTAL END-USER LICENSE AGREEMENT IMPORTANT READ CAREFULLY: This supplemental end-user license agreement ( Supplemental EULA ) is a legal agreement
MyShortcut. Administrator's Guide
MyShortcut Administrator's Guide January 2011 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.
Flobo Hard Disk Repair User guide
Flobo Hard Disk Repair User guide by Flobo Recovery www.floborecovery.biz Data Recovery as Art! Legal Notices Disclaimer The information contained in this publication is subject to change without notice.
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD These license terms are an agreement between you and [OEM]. Please read them. They apply to the software included
PocketSuite Terms of Service. Last modified: November 2015
PocketSuite Terms of Service Last modified: November 2015 These Terms of Service (these Terms ) constitute the agreement (this Agreement ) between PocketSuite, Inc. (the Company ) and the User (as defined
Specific Program Documentation ( License SPD )
Specific Program Documentation ( License SPD ) 1. CA Europe sarl ( CA ) licenses to Customer the CA software program(s) listed below under the following terms and conditions. By using the CA Software,
SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360
SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT ( LICENSE AGREEMENT ) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW).
Extension Module (XMOD): Batch Order Management (BOM)
Extension Module (XMOD): Batch Order Management (BOM) 1999-Present Kryptronic, Inc. All rights reserved worldwide. Kryptronic, the Kryptronic logo and all Kryptronic software names and logos are trademarks
BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS
BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS IMPORTANT: READ THIS CAREFULLY BEFORE INSTALLING, USING OR ELECTRONICALLY
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Microsoft Dynamics GP. Electronic Signatures
Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without
Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive
Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have
Terms and Conditions.
Terms and Conditions. We ask that you read them through and keep a copy for your own records, just in case you need to refer back to them at any time. By ordering or using a Systems Integration (UK) Ltd.service
jchartfx Plus End User License Agreement (EULA)
jchartfx Plus End User License Agreement (EULA) READ CAREFULLY BEFORE INSTALLING THE SOFTWARE. By installing jchartfx Plus (hereinafter the Software or Software ), you are accepting the following License
The software on this device includes software licensed by Company from Microsoft Corporation or its affiliates.
WINDOWS PHONE 7 SOFTWARE LICENSE TERMS These license terms are an agreement between you and Nokia ( Company ), the party distributing the software and device. These terms apply to the software that came
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
ios Team Administration Guide (Legacy)
ios Team Administration Guide (Legacy) Contents About ios Development Team Administration 5 At a Glance 6 Team Admins Manage Team Membership and Assign Roles in the Member Center 6 Development Devices
Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
FME SOFTWARE LICENSE AGREEMENT
FME SOFTWARE LICENSE AGREEMENT IMPORTANT READ CAREFULLY: This FME Software License Agreement ("Agreement") is a legal agreement between You (either an individual or a single legal entity) and Safe Software
SERVICE TERMS AND CONDITIONS
SERVICE TERMS AND CONDITIONS Last Updated: April 19th, 2016 These Service Terms and Conditions ( Terms ) are a legal agreement between you ( Customer or you ) and Planday, Inc., a Delaware corporation
TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014)
TOLEDOTEL INTERNET SERVICE AGREEMENT (As of July, 2014) This agreement sets forth the terms and conditions under which ToledoTel will provide Internet service to you at your home or business. 1. The Service
PLEASE READ CAREFULLY BEFORE DOWNLOADING OR STREAMING THIS APP.
Version dated 30 April 2015 PLEASE READ CAREFULLY BEFORE DOWNLOADING OR STREAMING THIS APP. This end-user licence agreement (EULA) is a legal agreement between you (Enduser or you) and The West Midlands
Mayfair EULA for Journal Office
Mayfair EULA for Journal Office 9-April-2014 Page 1 of 9 Mayfair EULA for Journal Office Mayfair Software End User License Agreement Software programs which you received either installed on on the device
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 R2 FOR EMBEDDED SYSTEMS TELECOMMUNICATIONS STANDARD
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 R2 FOR EMBEDDED SYSTEMS TELECOMMUNICATIONS STANDARD These license terms are an agreement between you and Unify GmbH & Co. KG. Please read
Dell Advanced Network Monitoring Services Service Description
Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Tape RAID Option Guide r11.5 D01183-1E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
Terms and Conditions- OnAER Remote Monitoring Service
Terms and Conditions- OnAER Remote Monitoring Service TERMS OF SERVICE Please read these terms of user ( Agreement or Terms of Service ) carefully before using the services offered by AERCO International,
SOFTWARE AS A SERVICE AGREEMENT
SOFTWARE AS A SERVICE AGREEMENT YOU SHOULD READ CAREFULLY THE FOLLOWING TERMS AND CONDITIONS BEFORE UTILIZING THE SOFTWARE This is an agreement to remotely provide you with access to the functionality
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Service Description: Dell Backup and Recovery Cloud Storage
Service Description: Dell Backup and Recovery Cloud Storage Service Providers: Dell Marketing L.P. ( Dell ), One Dell Way, Round Rock, Texas 78682, and it s worldwide subsidiaries, and authorized third
Microsoft SQL Server 2012 Standard Edition, Runtime-Restricted Use Software. Core Licenses: 2
Microsoft SQL Server 2012 Standard Edition, Runtime-Restricted Use Software Core Licenses: 2 END-USER LICENSE AGREEMENT These license terms are an agreement between the licensor of the software application
Infineon Technologies North America Corp. Terms and Conditions of Sale
Infineon Technologies North America Corp. Terms and Conditions of Sale 1. GENERAL 1.1 Contract Terms. These Terms and Conditions of Sale (the Agreement ) shall apply to any offer made by Infineon Technologies
END- USER LICENSE AGREEMENT FOR Helpdesk Pilot
END- USER LICENSE AGREEMENT FOR Helpdesk Pilot Last Updated: 01st May 2014 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE CONTINUING WITH THIS PROGRAM INSTALL.
TotalShredder USB. User s Guide
TotalShredder USB User s Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without
Installing Your MS Access Database (Manual Installation Instructions)
Installing Your MS Access Database (Manual Installation Instructions) Installation and Setup Instructions... 1 Single User Setup... 1 Multiple User Setup... 2 Adjusting Microsoft Access 2003 Macro Security...
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Evaluation, Development and Demonstration Software License Agreement
Evaluation, Development and Demonstration Software License Agreement IMPORTANT PLEASE CAREFULLY READ THE FOLLOWING LICENSE AGREEMENT, WHICH IS LEGALLY BINDING. DO NOT DOWNLOAD OR INSTALL THE LICENSED MATERIALS
ZENworks Patch Management. Your license to use ZENworks Patch Management is also subject to the terms and conditions in the attached Appendix.
Novell Endpoint Lifecycle Management Suite Novell ZENworks Configuration Management Advanced Edition Novell ZENworks Configuration Management Enterprise Edition Novell ZENworks Configuration Management
APP SOFTWARE LICENSE AGREEMENT
APP SOFTWARE LICENSE AGREEMENT This App Software License Agreement (the Agreement ) is made by and between AvePoint, Inc., a Delaware company, with offices at Harborside Financial Center, Plaza 10, 3 Second
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
Website Hosting Agreement
Website Hosting Agreement 6 oak grove avenue This Hosting Contract governs your purchase and use, in any manner, of all Web site hosting services, including the Shared Hosting Services, (collectively,
USER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Page 2 of 18 TABLE OF CONTENTS INTRODUCTION 3 Safe European Storage How does this really work? 3 3 GETTING STARTED 4 Setting up an account Setting up a company account
USER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting
SPYDERS END USER LICENSE AGREEMENT TERMS AND CONDITIONS
SPYDERS END USER LICENSE AGREEMENT TERMS AND CONDITIONS 1. IMPORTANT NOTICE PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (THE AGREEMENT ) CAREFULLY BEFORE PROCEEDING TO USE THE ENCLOSED
for this software, unless other terms accompany those items. If so, those terms apply.
MICROSOFT SOFTWARE LICENSE TERMS WINDOWS VISTA ENTERPRISE SERVICE PACK 1 Your use of this software is subject to the terms and conditions of your volume license agreement. You may not use this software
Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited.
STRATUS TECHNOLOGIES IRELAND LIMITED ( STRATUS ) END-USER LICENSE AGREEMENT AND SOFTWARE SUPPORT TERMS AND CONDITIONS FOR STRATUS everrun SOFTWARE PRODUCTS Please read this end user license agreement ("EULA")
prevailing of JAMS/Endispute. The arbitrator's award shall be binding and may be entered as a judgment in any court of competent jurisdiction.
Safety Alert Apps, Inc. End User License Agreement By installing and using any of the personal safety app software from Safety Alert Apps, Inc., you are agreeing to be bound by the terms of this End User
RockWare Click-Wrap Software License Agreement ( License )
RockWare, Inc. ( RockWare ) 2221 East Street, Suite 101 Golden CO 80401 USA RockWare Click-Wrap Software License Agreement ( License ) IMPORTANT - READ ALL OF THE TERMS AND CONDITIONS IN THIS LICENSE CAREFULLY
INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User)
INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User) By clicking the Accept button, I signify that I have read and accept the terms below. IMPORTANT - READ BEFORE COPYING, INSTALLING
1.3 The Terms are accepted by the Customer upon registration or ordering of the Products or renewal of any such subscription.
September 2015 WEBCRM SUBSCRIPTION TERMS AND CONDITIONS COMMERCIAL USE ONLY 1. Introduction 1.1 These subscription terms and conditions ("Terms") govern your ("Customer") subscription for and use of the
QuickBack. User s Guide
QuickBack Data backup, volume cloning and file / folder archiving utility. Features automated scheduling, compression, encryption, CD/DVD burning and can preserve volume backup bootability. Part of the
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0
Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the
Adaptec Event Monitor Utility. User s Guide
Adaptec Event Monitor Utility User s Guide 2 Copyright Copyright 2013 PMC-Sierra, Inc. All rights reserved. The information in this document is proprietary and confidential to PMC-Sierra, Inc., and for
TOOLS for CC121 Installation Guide
TOOLS for CC121 Installation Guide ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE THIS
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Universal Content Management Version 10gR3. Security Providers Component Administration Guide
Universal Content Management Version 10gR3 Security Providers Component Administration Guide Copyright 2008 Oracle. All rights reserved. The Programs (which include both the software and documentation)
