Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide



Similar documents
Deploying Citrix MetaFrame on IBM eserver BladeCenter with FAStT Storage Planning / Implementation

Requesting Access to IBM Director Agent on Windows Planning / Implementation

Introduction to PCI Express Positioning Information

Intel I340 Ethernet Dual Port and Quad Port Server Adapters for System x Product Guide

TCP/IP ports on the CMM, IMM, IMM2, RSA II, BMC, and AMM management processors 1

ServeRAID M5000 Series Performance Accelerator Key for IBM System x Product Guide

IBM RDX Removable Disk Backup Solution (Withdrawn) Product Guide

io3 Enterprise Mainstream Flash Adapters Product Guide

6Gb SAS Host Bus Adapter Product Guide

Introduction to Windows Server 2016 Nested Virtualization

ServeRAID H1110 SAS/SATA Controller for IBM System x IBM System x at-a-glance guide

ServeRAID M5015 and M5014 SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide

Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers

ServeRAID M5210 and M5210e SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide

ServeRAID M1115 SAS/SATA Controller Product Guide

Solution Brief: Microsoft SQL Server 2014 Data Warehouse Fast Track on System x3550 M5 with Micron M500DC Enterprise Value SATA SSDs

How To Use The Serveraid M1115 Sata Controller On An Ipa 4.5 (Powerpc) Or Ipa (Powerpci) Server

IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide

ServeRAID M5110 and M5110e SAS/SATA Controllers Product Guide

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide

QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide

Red Hat CloudForms for Lenovo Product Guide

DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer

ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide

Integration and Automation with Lenovo XClarity Administrator

QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide

Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide

ServeRAID M5110 and M5110e SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide

Seagate Instant Secure Erase Deployment Options

IBM Flex System FC port 16Gb FC Adapter IBM Redbooks Product Guide

Platform LSF Version 9 Release 1.2. Migrating on Windows SC

Effective Storage Management for Cloud Computing

IBM XIV Management Tools Version 4.7. Release Notes IBM

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

IBM Flex System NAS Solutions Solution Guide

Taking Virtualization

Effective storage management and data protection for cloud computing

EMC VMAX3 DATA AT REST ENCRYPTION

Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series

IBM CommonStore Archiving Preload Solution

Improving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200

Lenovo Partner Pack for System Center Operations Manager

IBM Security SiteProtector System Migration Utility Guide

IBM Storwize V5000 and Windows Storage Server Product Guide

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide

IBM SmartCloud Desktop Infrastructure: Citrix XenDesktop on IBM Flex System Solution Guide

EMC Symmetrix Data at Rest Encryption

VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

IBM System Storage DR550

An Introduction to NIC Teaming with Lenovo Networking Switches

IBM Cognos Controller Version New Features Guide

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

Cisco for SAP HANA Scale-Out Solution on Cisco UCS with NetApp Storage

IBM SmartCloud Desktop Infrastructure: Citrix VDI-in-a- Box on IBM System x Solution Guide

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Enhancing Your Mobile Enterprise Security with IBM Worklight IBM Redbooks Solution Guide

IBM Security QRadar Version (MR1) Checking the Integrity of Event and Flow Logs Technical Note

IBM Security QRadar Version Installing QRadar with a Bootable USB Flash-drive Technical Note

Installing and using the webscurity webapp.secure client

Lenovo SAN Manager. Provisioning and Mapping Volumes. Lenovo Enterprise Product Group. February 2013; Revised April 2015

Online Transaction Processing in SQL Server 2008

IBM Storwize V7000 Unified and Storwize V7000 storage systems

Patch Management for Red Hat Enterprise Linux. User s Guide

IBM Tivoli Storage Manager for Virtual Environments

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution

SecureD Technical Overview

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

IBM Tivoli Storage Manager FastBack

Introduction to VMware EVO: RAIL. White Paper

IBM Storwize Rapid Application Storage solutions

Overcoming Security Challenges to Virtualize Internet-facing Applications

How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power

Linux. Managing security compliance

IBM Network Advisor IBM Redbooks Product Guide

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version First Edition (December 7, 2007)

Sage Compatibility guide. Last revised: October 26, 2015

Microsoft Exchange 2010 on Dell Systems. Simple Distributed Configurations

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Navigating Endpoint Encryption Technologies

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Oracle Database Scalability in VMware ESX VMware ESX 3.5

Remote Control Tivoli Endpoint Manager - TRC User's Guide

2.8.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 16

Running VirtualCenter in a Virtual Machine

EMC Virtual Infrastructure for SAP Enabled by EMC Symmetrix with Auto-provisioning Groups, Symmetrix Management Console, and VMware vcenter Converter

Deployment Options for Microsoft Hyper-V Server

IBM PowerSC Technical Overview IBM Redbooks Solution Guide

IBM Lotus Protector for Mail Encryption. User's Guide

CA Encryption Key Manager r14.5

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Installing on Windows

IBM BladeCenter Layer 2-7 Gigabit Ethernet Switch Module (Withdrawn) Product Guide

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

VMware vsphere Data Protection 6.0

Transcription:

Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often organizations invest heavily in protection against network attacks, but fail to safeguard against the costly exposure that can result from the loss, replacement, redeployment, or retirement of disk drives. Other organizations invest in software-based encryption to secure their data, but receive limited protection at a great cost to performance. Self-encrypting drives (SEDs) can satisfy the requirement for data-at-rest security with cost-effective inline encryption without the performance trade off that is required by software-based encryption. The addition of IBM Security Key Lifecycle Manager (SKLM) allows for lower operating costs by streamlining the configuration and management of SED authentication through one SKLM interface that controls the authentication of several System x servers. Whether you want to protect personal data for legal requirements, such as the Health Insurance Portability and Accountability Act (HIPAA), better secure banking information, or ensure the safety of company and employee records in an efficient manner, this IBM Redbooks Solution Guide provides an overview of how SEDs and SKLM can help accomplish that goal. Figure 1 shows the main components of an SKLM environment, which includes the following features: The interaction between SKLM and the RAID controller to exchange a hidden password. Verification of encryption keys between SEDs and the encryption-capable RAID controller to allow the system to boot and use the drives. Figure 1. Main components for SKLM and SED key exchange Did you know? Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 1

Did you know? The traditional methods of destroying and degaussing disk drives are not standardized and might not guarantee the destruction and protection of data, while overwriting data can take hours or days. SEDs adhere to a certified government standard, the Federal Information Processing Standards or FIPS 140-2 Security Requirements for Cryptographic Models recognized by the US National Institute of Standards and Technology (NIST) and Canadian Communications Security Establishment (CSE). The standards assert that the encryption that is used by self-encrypting drives protects Sensitive but Unclassified and Protect Class Data. AES encryption ensures that sensitive data is safely stored while SEDs are in use. The data also is protected when SEDs are retired from use. When implemented, a solution that uses SEDs eliminates the need to recover lost or stolen drives, and end-of-life drives can be discarded or recycled without any need for costly or inefficient data destruction processes. With the addition of SKLM to the security solution, systems with SEDs become easier to track and maintain and the theft or loss of an entire server is no longer a data security issue because the SEDs cannot function without their SKLM authentication. Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 2

Business value Independently SEDs can add significant security value with minimal cost for any business that must protect its stored data without cumbersome processes for physical security and destruction of failed and retired drives. These SEDs include the following benefits: Inline hardware encryption ensures no performance degradation or risk of data loss because operating system or software corruption. Instant secure erasure allows data to be cleared immediately by using encryption keys. Drives can then be safely reused, sold, or discarded or recycled. Even without performing a secure instant erasure, encryption ensures that data is protected if a drive is removed, stolen, or fails. An SED must be matched back to the same disk controller or data cannot be decrypted. Alternatively, the ability to back up a controller s media encryption keys allows for protection against server and disk controller failure so no SED data is lost. The Federally backed (FIPS: 140-2) data encryption standard provides confidence that erased, disposed of, or stolen drives cannot result in data exposure. SED encryption is always on, which means that self-encrypting capable drives, controllers, and servers can be purchased and used in default configurations with encryption enforcement off. When ready for encryption, turn on encryption at the controller for the wanted RAID arrays or virtual disks and continue with secure operation. Inline encryption eliminates the need for lengthy retroactive data encryption as is necessary with software encryption. Figure 2 shows the interaction between an SED and an encryption-capable RAID controller. At power-on, the encryption processor on the SED begins its key exchange with the RAID controller to ensure that they have matching keys and data can be safely decrypted for use by the server. After that key exchange is successful between the controller and the drive, the encryption processor provides unencrypted data to the server. If the key exchange is unsuccessful, the server boot is halted. Figure 2. Encryption key exchanges between drive and RAID controller When paired with IBM SKLM, SED management and deployment can be simplified. SKLM provides a low-touch, centralized way to manage the authentication exchanges with SEDs and includes the following benefits: With SKLM integration, no SED in the environment can be compromised, even if an entire server is stolen. Management of multiple SEDs, multiple encryption enable controllers, multiple encryption enabled servers, even multiple platforms in one interface. Remote management of SEDs allows keys to be expired and reissued, and drives or servers to be securely retired or reused with only a connection to the System x server s Integrated Management Module (IMM). These concepts are shown in Figure 3. Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 3

Figure 3. Encryption solution with SKLM for centralized management Solution overview and architecture A solution to centrally manage access to SEDs in System x servers by using IBM SKLM requires the following main components: IBM SKLM software The software must be installed on a supported operating system, but can be installed in a virtual instance of that operating system to use high availability safeguards and streamline backup methods. SKLM is a self-contained installer; the necessary components (including DB2 and WebSphere Application Server) are included. Supported System x server (or servers) At least one System x server that supports SEDs is required. To enable the server (or servers) to use external key management for SEDs, one Feature on Demand (FoD) activation key must be purchased for each server and applied to the servers IMM. Supported RAID controller Specific RAID controllers support SEDs. Any server that uses SEDs must have those drives connected to an encryption-enabled RAID controller. The controller also might need a cache or RAID upgrade added to enable SED support. Some of these upgrades are no-charge. SEDs At least two SEDs are required to set up an encrypted solution on a virtual disk or RAID array of SEDs. Implementing a centrally managed SED solution is often easiest from the ground up. Figure 4 shows the components that interact at each stage of the configuration (top to bottom) from local encryption only to centrally managed encryption. Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 4

Figure 4. Stages of an encryption solution and component communication Each stage features the following activities: 1. Data is always being encrypted at the SED level. At first installation, the controller is not requiring a key exchange to enforce matching the SED to the controller and securing the system; therefore, no automatic protection is offered at this point. 2. When disk encryption is enabled at the controller and virtual disks, SEDs must exchange an encryption password with the controller to allow data access, which protects data against drive theft and allows easy and secure retirement or reuse. 3. With external key management enabled at the controller, the controller password exchange with the SEDs is no longer the only requirement for a server to boot and an SED s data to be accessed. The server s IMM now must complete a certificate and password exchange with a key management server for the SED to function. 4. With the SKLM server in place, the server s IMM now completes a certificate exchange with SKLM. SKLM supersedes the authority of the controller and requires a network connection to the server s IMM upon start. SKLM then exchanges the encryption key (or keys) with the controller and protects against drive theft or retirement or reuse and server theft, retirement, and reuse. With centralized key management, the SKLM server and its database become critical components of the SED solution. The loss of SKLM results in the loss of access to the data on all SEDs it is managing. For this reason, it is critical that a backup or disaster recovery process is in place, and preferably high availability. The default SKLM license allows for the installation of two instances (one master Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 5

and one clone). SKLM can replicate to up to three clone instances of the software with a System x environment. This limitation is based on the FoD limitation of the System x IMMs, not the SKLM clone maximum (which is five). In the Usage scenario section, we build on the fundamentals that are shown in Figure 4 with an example of a customer production scenario. Usage scenario Many organizations must protect data on their disk drives that are in their data centers and in remote locations. Banking institutions provide an excellent example of businesses that benefit from local encryption authentication, but need a centralized authentication solution to operate efficiently and securely. Companies that provide banking servers often have servers in data centers and in local branches, both of which contain sensitive client data. The use of self-encrypting drives in each local branch with encryption enabled on the controller and its virtual disks protects against drive theft and provides easy disk retirement via secure instant erase. However, this solution still leaves clients vulnerable to server theft and presents a complex solution from a key management and backup standpoint. IBM SKLM can alleviate these problems by cryptographically securing data over the company network. To protect against server theft or allow for safe retirement or reuse of an entire server, SKLM requires a connection back to SKLM to access data and boot the server from SEDs. With centralized key authentication in place with SKLM, a server that is removed from the company network has the option to secure instant erase its drives upon boot only, which automatically protects against sensitive data form being exposed. Also, SKLM now allows holds all of the data that must be managed and backed up up without much more setup effort than a locally managed SED solution. With SKLM in place, backups are significantly more simple and server certificates or drive encryption keys can be removed safely when servers or drives must be retired. Figure 5 shows multiple bank branches that are use servers with SEDs. Those servers connect to servers that are running SKLM in the corporate data centers to authenticate and allow access to the drive s data in the local branch. The use of SKLM clones to replicate data protects against the corruption or loss of an SKLM instance. In addition, the use of a clustered solution (such as a VMware vsphere High Availability set up with ESXi and vcenter) allows for resiliency to server failures or maintenance that can normally result in a downtime for your SKLM solution. The example in Figure 5 also shows replication to a disaster recovery (DR) site for SKLM. This configuration is also strongly recommended because of the critical nature of the data that is stored by SKLM. Figure 5. SKLM banking example Integration and supported platforms Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 6

Integration and supported platforms Several IBM platforms support the use of many sizes and types of SEDs, not only System x. System z and System p, as well as multiple IBM storage platforms, including NAS, SAN, and tape storage. Each of these platforms are supported by SKLM to centrally manage the exchanges that are required for their encrypted drives in a similar fashion, and all from one interface. System x installation requirements The following components are required for a centrally managed encryption solution: IBM SKLM software At least one SED RAID controller supporting encryption System x server that supports encryption and FoD enablement key to activate external key management on that server The following SKLM hardware requirements must be met: System memory: 4 GB Processor speed: One 3.0 GHz CPU Disk space: 12 GB The following SKLM Windows operating systems are supported: Windows Server 2008 R2 Enterprise and Standard Editions Windows Server 2012 Standard Edition Windows Server 2012 R2 Standard Edition The following SKLM Linux operating systems are supported: SUSE Linux Enterprise Server (SLES) 11 SUSE Linux Enterprise Server (SLES) 10 Red Hat Enterprise Linux (RHEL) Server 6 Red Hat Enterprise Linux (RHEL) Server 5 Ordering information Ordering information is listed in the following tables. At the time of this writing, the System x server systems that are listed in Table 1 are supported for external key management. For more information about supported configurations, see the following Server Proven website: http://www.ibm.com/systems/info/x86servers/serverproven/compat/us/ Table 1. Supported servers Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 7

Server Machine Type System x3100 M5 5457 System x3250 M5 5458 System x3300 M4 7382 System x3500 M4 7383 System x3500 M4 (E5-xxxxV2) 7383, E5-xxxxV2 System x3530 M4 7160 System x3530 M4 (E5-xxxxV2) 7160, E5-xxxxV2 System x3630 M4 7158 System x3630 M4 (E5-xxxxV2) 7158, E5-xxxxV2 System x3550 M4 7914 System x3550 M4 (E5-xxxxV2) 7914, E5-xxxxV2 System x3550 M5 5463 System x3650 M4 7915 System x3650 M4 (E5-xxxxV2) 7915, E5-xxxxV2 System x3650 M4 HD 5460 System x3650 M5 5462 System x3750 M4 8722/8733 System x3750 M4 8752/8718 System x3850 X6/x3950 X6 3837 NeXtScale nx360 M5 5465 Table 2 lists the supported RAID adapters and the corresponding upgrades. For more information about the supported controllers and options, see the following ServerProven website: http://www.ibm.com/systems/info/x86servers/serverproven/compat/us/ Table 2. Supported RAID adapters and the corresponding upgrades Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 8

Option part number Supported RAID adapters M5110 81Y4481 Onboard Description ServeRAID M5110 SAS/SATA Controller for System x ServeRAID M5110e SAS/SATA Controller for System x One of the upgrades below is required to support SEDs with the M5110 RAID controller 81Y4544 81Y4484 81Y4487 81Y4559 47C8670 Supported RAID adapters M5210 46C9110 Onboard ServeRAID M5100 Series Zero Cache/RAID 5 Upgrade for System x ServeRAID M5100 Series 512MB Cache/RAID 5 Upgrade for System x ServeRAID M5100 Series 512MB Flash/RAID 5 Upgrade for System x ServeRAID M5100 Series 1GB Flash/RAID 5 Upgrade for System x ServeRAID M5100 Series 2GB Flash/RAID 5 Upgrade for System x ServeRAID M5210 SAS/SATA Controller for System x ServeRAID M5210e SAS/SATA Controller for System x One of the upgrades below is required to support SEDs with the M5210 RAID controller 47C8708 47C8656 47C8660 47C8664 47C8668 Supported RAID adapters M1215 46C9114 ServeRAID M5200 Series Zero Cache/RAID 5 Upgrade for IBM Systems-FoD ServeRAID M5200 Series 1GB Cache/RAID 5 Upgrade for IBM Systems ServeRAID M5200 Series 1GB Flash/RAID 5 Upgrade for IBM Systems ServeRAID M5200 Series 2GB Flash/RAID 5 Upgrade for IBM Systems ServeRAID M5200 Series 4GB Flash/RAID 5 Upgrade for IBM Systems ServeRAID M1215 SAS/SATA Controller for System x The upgrade below is required to support SEDs with the M1215 RAID controller 46C9114 ServeRAID M1215 SAS/SATA Controller for IBM System x Table 3 lists the supported SEDs as of this writing. This rapidly growing list of devices should be considered as a sub-set of supported options only. For more information about the supported SEDs for a specific server model, see the following IBM ServerProven website: http://www.ibm.com/systems/info/x86servers/serverproven/compat/us/ Table 3. Supported SEDs Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 9

Option part number 90Y8944 00AJ116 00NA281 00NA286 90Y8913 00AJ106 90Y8908 00AJ101 00NA291 81Y9662 00AJ076 00NA296 00AD085 00AJ151 00NA301 00NA476 00NA306 00W1533 00ML218 00FN238 00W1543 00ML223 00FN248 00ML228 00FN258 Description IBM 146GB 15K 6Gbps SAS 2.5" SFF G2HS SED IBM 146GB 15K 6Gbps SAS 2.5" G3HS SED IBM 300GB 15K 12Gbps SAS 2.5" G3HS 512e SED IBM 600GB 15K 12Gbps SAS 2.5" G3HS 512e SED IBM 300GB 10K 6Gbps SAS 2.5" SFF G2HS SED IBM 300GB 10K 6Gbps SAS 2.5" G3HS SED IBM 600GB 10K 6Gbps SAS 2.5" SFF G2HS SED IBM 600GB 10K 6Gbps SAS 2.5" G3HS SED IBM 600GB 10K 12Gbps SAS 2.5" G3HS 512e SED IBM 900GB 10K 6Gbps SAS 2.5" SFF G2HS SED IBM 900GB 10K 6Gbps SAS 2.5" G3HS SED IBM 900GB 10K 12Gbps SAS 2.5" G3HS 512e SED IBM 1.2TB 10K 6Gbps SAS 2.5'' G2HS SED IBM 1.2TB 10K 6Gbps SAS 2.5'' G3HS SED IBM 1.2TB 10K 12Gbps SAS 2.5'' G3HS 512e SED IBM 1.8TB 10K 6Gbps SAS 2.5'' G2HS 512e SED IBM 1.8TB 10K 12Gbps SAS 2.5'' G3HS 512e SED IBM 2TB 7.2K 6Gbps NL SAS 3.5'' G2HS SED IBM 2TB 7.2K 6Gbps NL SAS 3.5" G2HS 512e SED IBM 2TB 7.2K 12Gbps NL SAS 3.5" G2HS 512e SED IBM 4TB 7.2K 6Gbps NL SAS 3.5'' G2HS SED IBM 4TB 7.2K 6Gbps NL SAS 3.5" G2HS 512e SED IBM 4TB 7.2K 12Gbps NL SAS 3.5" G2HS 512e SED IBM 6TB 7.2K 6Gbps NL SAS 3.5" G2HS 512e SED IBM 6TB 7.2K 12Gbps NL SAS 3.5" G2HS 512e SED Not all drives are supported in all servers. For more information about the supported drives, see the ServerProven website. For more information about which drives are supported in a server, see the Configuration and Options Guide that is published quarterly and is available at this website: http://www.ibm.com/systems/xbc/cog/ Related information For more information, see the following resources: IBM Redbooks: Centrally Managing Access to Self-Encrypting Drives in System x Servers Using IBM Security Key Lifecycle Manager, SG24-8247: http://www.redbooks.ibm.com/redpieces/abstracts/sg248247.html IBM Redbooks Product Guide: Self-Encrypting Drives for IBM System X, TIPS0761: http://www.redbooks.ibm.com/abstracts/tips0761.html?open IBM Security Key Lifecycle Manager product page: http://www.ibm.com/software/products/en/key-lifecycle-manager/ IBM Security Key Lifecycle Manager for System X services: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias? subtype=fy&infotype=pm&appname=stge_ql_ql_usen&htmlfid=qlf12409usen&attachment=qlf12409usen.pdf#loaded Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 10

Notices Lenovo may not offer the products, services, or features discussed in this document in all countries. Consult your local Lenovo representative for information on the products and services currently available in your area. Any reference to a Lenovo product, program, or service is not intended to state or imply that only that Lenovo product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any Lenovo intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any other product, program, or service. Lenovo may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: Lenovo (United States), Inc. 1009 Think Place - Building One Morrisville, NC 27560 U.S.A. Attention: Lenovo Director of Licensing LENOVO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. Lenovo may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. The products described in this document are not intended for use in implantation or other life support applications where malfunction may result in injury or death to persons. The information contained in this document does not affect or change Lenovo product specifications or warranties. Nothing in this document shall operate as an express or implied license or indemnity under the intellectual property rights of Lenovo or third parties. All information contained in this document was obtained in specific environments and is presented as an illustration. The result obtained in other operating environments may vary. Lenovo may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Any references in this publication to non-lenovo Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this Lenovo product, and use of those Web sites is at your own risk. Any performance data contained herein was determined in a controlled environment. Therefore, the result obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Copyright Lenovo 2015. All rights reserved. This document was created or updated on Mar 10, 2015. Send us your comments in one of the following ways: Use the online Contact us review form found at: http://lenovopress.com/tips1288 Send your comments in an e-mail to: comments@lenovopress.com This document is available online at http://lenovopress.com/tips1288. Trademarks Lenovo, the Lenovo logo, and For Those Who Do are trademarks or registered trademarks of Lenovo in the United States, other countries, or both. These and other Lenovo trademarked terms are marked on their first occurrence in this information with the appropriate symbol ( or TM), indicating US registered or common law trademarks owned by Lenovo at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of Lenovo trademarks is available on the Web at http://www.lenovo.com/legal/copytrade.html. The following terms are trademarks of Lenovo in the United States, other countries, or both: TM Flex System Lenovo Lenovo(logo) TM Lenovo XClarity System x X5TM The following terms are trademarks of other companies: Intel, Intel Xeon, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 11

Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager 12