Encryption Key operation

Audit Log User Guide for VSP 5000 Series

Version
90-09-0x
Audience
anonymous
Part Number
MK-98RD9010-13

The following tables show the function names, operation names and event names of encryption keys for data encryption and each item is listed in alphabetical order. The logs for the operation names listed in the first table are output to Auditlog information file 1, while the logs for the event names listed in the second table are output to Auditlog information file 2.

Function Name

Operation Name

Corresponding GUI Operation

ENC

Add keys to DKC

Creating encryption keys

Configuring encryption environment settings

Backup Keys

Backing up encryption keys on the key management server or backing up encryption keys as a file on the Device Manager - Storage Navigator PC

Backup Keys to File

Backing up encryption keys as a file on the Device Manager - Storage Navigator PC

Backup Keys to Serv

Backing up encryption keys on the key management server

Backup Keys to Serv(Auto)

Automated backing up encryption keys on the key management server

Create KEK Dynamic

Configuring encryption environment settings

Updating key encryption keys

Create Keys

Creating encryption keys

Configuring encryption environment settings

Create Keys On Serv

Creating encryption keys

Backing up encryption keys on the key management server

Configuring encryption environment settings

Delete KEK Dynamic

Configuring encryption environment settings

Updating key encryption keys

Delete Keys

Deleting encryption keys

Delete Keys on Serv

Deleting encryption keys backed up on the key management server

Delete Keys on Serv(Auto)

Deleting encryption keys backed up automatically on the key management server

DEK assign SpareDisk

Configuring encryption environment settings

DEK delete

Configuring encryption environment settings

Edit Encryption

Enabling/disabling the encryption in a parity group level

Edit ENC Settings

Configuring encryption environment settings

Edit Password Policy

Editing password policies for backing up encryption keys

Register KEK Dynamic

Configuring encryption environment settings

Updating key encryption keys

Rekey CEK

Configuring encryption environment settings

Updating certificate encryption keys

Rekey KEK Dynamic

Updating key encryption keys

Configuring encryption environment settings

Restore Keys

Restoring encryption keys from back up copies on the key management server or the Device Manager - Storage Navigator PC

Restore Keys fr File

Restoring encryption keys from back up copies on the Device Manager - Storage Navigator PC

Restore Keys fr File(Forcibly)

Restoring encryption keys forcibly from back up copies on the management client

Restore Keys fr Serv

Restoring encryption keys from back up copies on the key management server

Restore Keys fr Serv(Forcibly)

Restoring encryption keys forcibly from back up copies on the key management server

Retry KEK Dynamic

Reacquisition of key encryption keys

Set Up Key Mng Serv

Configuring encryption environment settings

Succeeded Backup to Serv

Setting of succeeded backup flag

KEK Acquisition

Acquisition Key

Reacquisition of key encryption keys

Set Key

Key Recovery

Restore Keys fr Serv(Boot)

Restoration of encryption keys

Set Key Blob

Function Name

Event Name

Output Trigger

ENC

Change CEK Status

  • When the encryption environment setting is configured from the initial setting.
  • When the certificate encryption key is updated.
  • When the encryption disk board is deleted or replaced.

Change DEK Status

  • When the encryption environment setting is configured from the initial setting.
  • When the encryption environment setting is initialized.
  • When the data encryption is enabled/disabled.
  • When Dynamic sparing, Correction copy or Copy back is performed.
  • When the drive (Hard disk drive, SSD, SCM, or FMD) is added, deleted or replaced after the encryption environmental setting is configured.

Clear Keys

When the encryption environment setting is initialized.

Create Keys

When the encryption key is created.

Delete Keys

When the encryption key is deleted.

Use Keys for CEK/KEK

  • When the encryption environment setting is configured from the initial setting.
  • When the certificate encryption key is updated.
  • When the encryption disk board is added or replaced.