1270A350-8.4 HSM 8000 Security Operations Manual
1270A350-8.4 HSM 8000 Security Operations Manual
1270A350-8.4 HSM 8000 Security Operations Manual
List of Chapters
Table of Contents
Table of Contents
List of Chapters ............................................................................................................................................... 2
Table of Contents ........................................................................................................................................... 3
Revision Status................................................................................................................................................. 5
Contact Information ...................................................................................................................................... 6
End User License Agreement ...................................................................................................................... 7
Chapter 1 - Introduction .............................................................................................................................. 9
General ........................................................................................................................................................ 9
About this Manual ..................................................................................................................................... 9
Chapter 2 - Configuration ............................................................................................................................ 10
General ........................................................................................................................................................ 10
Configure the Alarms............................................................................................................................... 10
Configure Security .................................................................................................................................... 11
Chapter 3 - Local Master Keys.................................................................................................................... 17
Types of LMKs ........................................................................................................................................... 17
Multiple LMKs ............................................................................................................................................ 17
LMK Table .................................................................................................................................................. 17
Variant LMKs.............................................................................................................................................. 18
Keyblock LMKs.......................................................................................................................................... 19
Support for Thales Key Blocks ........................................................................................................ 19
LMK Management ..................................................................................................................................... 20
Generate an LMK Component Set ....................................................................................................... 21
Generating Component Set 1 .......................................................................................................... 22
Generating Component Set 2 .......................................................................................................... 23
Generating Additional Components - Set 3, etc. ........................................................................ 23
Password Mode ................................................................................................................................... 23
Loading the LMKs ..................................................................................................................................... 23
Moving Old LMKs Into Key Change Storage ................................................................................... 26
Translating Encrypted Data .................................................................................................................... 27
Verifying the Contents of the LMK Store ........................................................................................... 27
Duplicating LMK Component Sets ....................................................................................................... 28
Loading the Test Keys ............................................................................................................................. 29
Test Variant LMK ................................................................................................................................ 29
Test Keyblock LMK ............................................................................................................................ 30
Chapter 4 - Operating Instructions ............................................................................................................ 31
General ........................................................................................................................................................ 31
Viewing HSM Status Information .......................................................................................................... 31
Secure Mode .............................................................................................................................................. 31
Authorise Activity State .......................................................................................................................... 32
Authorise Activity State .................................................................................................................... 32
Cancelling Authorised Activity ........................................................................................................ 33
View Authorised Activities ............................................................................................................... 33
Smartcards .................................................................................................................................................. 33
Logging Functions...................................................................................................................................... 33
The Error Log ...................................................................................................................................... 34
The Audit Journal ................................................................................................................................ 34
Appendix A - Security Recommendations ................................................................................................ 35
Introduction ............................................................................................................................................... 35
Procedural Security .................................................................................................................................. 35
Audit and records ............................................................................................................................... 36
Identification and Authentication .......................................................................................................... 37
Use of Authorised State (and the Security Officer role of the HSM Manager) ................... 37
Use of Secure State ............................................................................................................................ 37
Use of Offline State ............................................................................................................................ 37
Use of the Operator role of the HSM Manager .......................................................................... 37
Use of the Guest role of the HSM Manager................................................................................. 38
3
Table of Contents
Revision Status
Revision Status
Revision
HSM
Functional
Revision
Changes
Release Date
1270A350-001
First Issue.
December 2002
1270A350-002
June 2004
1270A350-003
September 2005
1270A350-004
November 2005
1270A350-005
March 2006
1270A350-006
December 2006
1270A350-007
March 2008
1270A350-008
March 2009
1270A350-008.1
June 2009
1270A350-008.2
March 2010
1270A350-008.3
Updated EULA.
April 2010
1270A350-008.4
August 2010
This manual describes the functionality within the 3.1d base release of HSM 8000 software. For all other
versions please refer to appropriate manual and associated HSM software specifications.
Contact Information
Contact Information
THALES e-SECURITY
Europe, Middle East, Africa
Americas
Asia Pacific
Suite 200
Long Crendon
Weston, FL 33326
Wanchai
Aylesbury
USA
Support
Telephone: +44 1844 202566
+1 954-888-6211
Support
Support
Fax:
emea.support@thales-esecurity.com
+1 954-888-6233
Fax:
support@thalesesec.com
asia.support@thales-esecurity.com
http://www.thalesgroup.com/iss
Copyright 1987 - 2010 THALES e-SECURITY LTD
This document is issued by Thales e-Security Limited (hereinafter referred to as Thales) in confidence and is not to be
reproduced in whole or in part without the prior written approval of Thales. The information contained herein is the property
of Thales and is to be used only for the purpose for which it is submitted and is not to be released in whole or in part without
the prior written permission of Thales.
This document is a legal agreement between Thales eSecurity Ltd., (THALES) and the company that has purchased a THALES product
containing a computer program (Customer). If you do not agree to the terms of this Agreement, promptly return the product and all
accompanyingitems(includingcables,writtenmaterials,softwaredisks,etc.)atyourmailingordeliveryexpensetothecompanyfromwhom
youpurchaseditortoThaleseSecurity,Ltd,MeadowViewHouse,CrendonIndustrialEstate,LongCrendon,Aylesbury,BucksHP189EQ,United
Kingdomandyouwillreceivearefund.
1.
2.
3.
OWNERSHIP. Computer programs, ("Software") provided by THALES are provided either separately or as a bundled part of a computer
hardwareproduct.Softwareshallalsobedeemedtoincludecomputerprogramswhichareintendedtoberunsolelyonorwithinahardware
machine,(Firmware).Software,includinganydocumentationfilesaccompanyingtheSoftware,("Documentation")distributedpursuanttothis
licenseconsistsofcomponentsthatareownedorlicensedbyTHALESoritscorporateaffiliates.OthercomponentsoftheSoftwareconsistof
freesoftwarecomponents(FreeSoftwareComponents)thatareidentifiedinthetextfilesthatareprovidedwiththeSoftware.ONLYTHOSE
TERMS AND CONDITIONS SPECIFIED FOR, OR APPLICABLE TO, EACH SPECIFIC FREE SOFTWARE COMPONENT SHALL BE APPLICABLE TO SUCH
FREESOFTWARECOMPONENT.EachFreeSoftwareComponentisthecopyrightofitsrespectivecopyrightowner.TheSoftwareislicensedto
Customerandnotsold.CustomerhasnoownershiprightsintheSoftware.Rather,CustomerhasalicensetousetheSoftware.TheSoftwareis
copyrightedbyTHALESand/oritssuppliers.Youagreetorespectandnottoremoveorconcealfromviewanycopyrightortrademarknotice
appearing on the Software or Documentation, and to reproduce any such copyright or trademark notice on all copies of the Software and
Documentationoranyportionthereofmadebyyouaspermittedhereunderandonallportionscontainedinormergedintootherprograms
andDocumentation.
LICENSEGRANT.THALESgrantsCustomeranonexclusivelicensetousetheSoftwarewithTHALESprovidedcomputerequipmenthardware
solelyforCustomersinternalbusinessuseonly.ThislicenseonlyappliestotheversionofSoftwareshippedatthetimeofpurchase.Anyfuture
upgrades are only authorised pursuant to a separate maintenance agreement. Customer may copy the Documentation for internal use.
Customermaynotdecompile,disassemble,reverseengineer,copy,ormodifytheTHALESownedorlicensedcomponentsoftheSoftwareunless
such copies are made in machine readable form for backup purposes. In addition, Customer may not create derivative works based on the
SoftwareexceptasmaybenecessarytopermitintegrationwithothertechnologyandCustomershallnotpermitanyotherpersontodoanyof
the same. Any rights not expressly granted by THALES to Customer are reserved by THALES and its licensors and all implied licenses are
disclaimed. Any other use of the Software by any other entity is strictly forbidden and is a violation of this EULA. The Software and any
accompanyingwrittenmaterialsareprotectedbyinternationalcopyrightandpatentlawsandinternationaltradeprovisions.
NOWARRANTY.EXCEPTASMAYBEPROVIDEDINANYSEPARATEWRITTENAGREEMENTBETWEENCUSTOMERANDTHALES,THESOFTWAREIS
PROVIDED"ASIS."TOTHEMAXIMUMEXTENTPERMITTEDBYLAW,THALESDISCLAIMSALLWARRANTIESOFANYKIND,EITHEREXPRESSEDOR
IMPLIED,INCLUDING,WITHOUTLIMITATION,IMPLIEDWARRANTIESOFMERCHANTABILITYANDFITNESSFORAPARTICULARPURPOSE.THALES
DOESNOTWARRANTTHATTHEFUNCTIONSCONTAINEDINTHESOFTWAREWILLMEETANYREQUIREMENTSORNEEDSCUSTOMERMAYHAVE,
OR THAT THE SOFTWARE WILL OPERATE ERROR FREE, OR IN AN UNINTERUPTED FASHION, OR THAT ANY DEFECTS OR ERRORS IN THE
SOFTWAREWILLBECORRECTED,ORTHATTHESOFTWAREISCOMPATIBLEWITHANYPARTICULARPLATFORM.SOMEJURISDICTIONSDONOT
ALLOW FOR THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY. IF THIS EXCLUSION IS HELD TO BE
UNENFORCEABLEBYACOURTOFCOMPETENTJURISDICTION,THENALLEXPRESSANDIMPLIEDWARRANTIESSHALLBELIMITEDINDURATION
TOAPERIODOFTHIRTY(30)DAYSFROMTHEDATEOFPURCHASEOFTHESOFTWARE,ANDNOWARRANTIESSHALLAPPLYAFTERTHATPERIOD.
4.
LIMITATION OF LIABILITY. IN NO EVENT WILL THALES BE LIABLE TO CUSTOMER OR ANY THIRD PARTY FOR ANY INCIDENTAL OR
CONSEQUENTIAL DAMAGES, INCLUDING WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF
BUSINESS,LOSSOFPROFITS,BUSINESSINTERRUPTION,ORLOSSOFBUSINESSINFORMATION)ARISINGOUTOFTHEUSEOFORINABILITYTO
USETHEPROGRAM,ORFORANYCLAIMBYANYOTHERPARTY,EVENIFTHALESHASBEENADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGES.
THALESAGGREGATELIABILITYWITHRESPECTTOITSOBLIGATIONSUNDERTHISAGREEMENTOROTHERWISEWITHRESPECTTOTHESOFTWARE
ANDDOCUMENTATIONOROTHERWISESHALLBEEQUALTOTHEPURCHASEPRICE.HOWEVERNOTHINGINTHESETERMSANDCONDITIONS
SHALL HOWEVER LIMIT OR EXCLUDE THALES LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM NEGLIGENCE, FRAUD OR
FRAUDULENTMISREPRESENTATIONORFORANYOTHERLIABILITYWHICHMAYNOTBEEXCLUDEDBYLAW.BECAUSESOMECOUNTRIESAND
STATESDONOTALLOWTHEEXCLUSIONORLIMITATIONOFLIABILITYFORCONSEQUENTIALORINCIDENTALDAMAGES,THEABOVELIMITATION
MAYNOTAPPLY.
5.
EXPORT RESTRICTIONS. THE SOFTWARE IS SUBJECT TO THE EXPORT CONTROL LAWS OF THE UNITED KINGDOM, THE UNITED STATES AND
OTHER COUNTRIES. THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ALL APPLICABLE LAWS, REGULATIONS, ORDERS, OR OTHER
RESTRICTIONSONTHEEXPORTOFTHESOFTWAREORINFORMATIONABOUTSUCHSOFTWAREWHICHMAYBEIMPOSEDFROMTIMETOTIME.
CUSTOMER SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION
WITHOUTCOMPLYINGWITHSUCHLAWS,REGULATIONS,ORDERS,OROTHERRESTRICTIONS.
6.
TERM&TERMINATION.ThisEULAiseffectiveuntilterminated.CustomermayterminatethisEULAatanytimebydestroyingorerasingall
copies of the Software and accompanying written materials in Customers possession or control. This license will terminate automatically,
withoutnoticefromTHALESifCustomerfailstocomplywiththeterms andconditionsofthisEULA.Upon suchtermination,Customershall
destroyoreraseallcopiesoftheSoftware(togetherwithallmodifications,upgradesandmergedportionsinanyform)andanyaccompanying
writtenmaterialsinCustomerspossessionorcontrol.
7.
SPECIALPROCEDUREFORU.S.GOVERNMENT.IftheSoftwareandDocumentationisacquiredbythe U.S.Governmentoronitsbehalf,the
Softwareisfurnishedwith"RESTRICTEDRIGHTS,"asdefinedinFederalAcquisitionRegulation("FAR")52.22719(c)(2),andDFAR252.2277013
to 7019, as applicable. Use, duplication or disclosure of the Software and Documentation by the U.S. Government and parties acting on its
behalfisgovernedbyandsubjecttotherestrictionssetforthinFAR52.22719(c)(1)and(2)orDFAR252.2277013to7019,asapplicable.
8.
TRANSFERRIGHTS
Customer may transfer the Software, and this license to another party if the other party agrees to accept the terms and conditions of this
Agreement. If Customer transfers the Software, it must at the same time either transfer all copies whether in printed or machinereadable
form,togetherwiththecomputerhardwaremachineonwhichSoftwarewasintendedtooperatetothesamepartyordestroyanycopiesnot
transferred;thisincludesallderivativeworksoftheSoftware.FORTHEAVOIDANCEOFDOUBT,IFCUSTOMERTRANSFERSPOSSESSIONOFANY
COPY OF THE SOFTWARE TO ANOTHER PARTY, EXCEPT AS PROVIDED IN THIS SECTION 8, CUSTOMERS LICENSE IS AUTOMATICALLY
TERMINATED.
9.
GOVERNINGLAWANDVENUEThisLicenseAgreementshallbeconstrued,interpretedandgovernedbythelawsofEnglandandWaleswithout
regardtoconflictsoflawsandprovisionsthereoforintheeventthattheSoftwarewasdeliveredintheUnitedStates,LatinAmericaorCanada,
thelawsoftheStateofFlorida.TheexclusiveforumforanydisputesarisingoutoforrelatingtothisEULAshallbeanappropriatecourtsitting
inEngland,UnitedKingdomorintheeventthattheSoftwarewasdeliveredintheUnitedStates,LatinAmericaorCanada,thecourtsofFlorida,
UnitedStates.
Introduction
Chapter 1 - Introduction
General
The HSM 8000 (Host Security Module) series of equipment provides cryptographic functions to
support network and point-to-point data security, therefore it is imperative that the HSM itself is
secure. The HSM is made physically secure by locks, electronic switches and tamper-detection
circuits, and must be located in a secure area with controlled access. See Appendix A - Security
Recommendations.
HSM software security is provided by a combination of several security features including:
A Secure mode which requires the presence of two officers holding separate physical
keys to the front panel locks.
An Authorised mode, requiring the presence of two Authorising Officers with encrypted
Smartcards and (optionally) PINs.
Security commands, and operations involving plain text data, are entered by the user via the
associated HSM Console, or via the HSM Manager.
Configuration
Chapter 2 - Configuration
General
This chapter describes the security and alarm configuration of the HSM.
Entry of commands and data at the Console is not case sensitive (i.e., A has the same effect as a).
Additional spaces can be inserted between characters to ease legibility during entry; they are
ignored by the HSM. However they cannot be used between command characters (e.g. the LK
command cannot be successfully entered as L K).
When entering sensitive (clear text) data, use the Inhibit Echo Back facility to ensure that the
HSM does not echo the data to the Console screen. This is set at configuration using the "Echo"
parameter in the CS (Configure Security) command. Instead of displaying the data, the HSM
displays a star for each character entered. Thus:
0123456789ABCDEF
is shown on the screen as:
****************
To exit from a command during data entry, press <Control> and C simultaneously. The HSM
responds with:
TERMINATED
10
Configuration
Configure Security
The security configuration of the HSM and some processing parameters are set by the CS
(Configure Security) console command. The settings can be examined by the QS (Query
Security) console command. The HSM must be offline. See the HSM 8000 Console Reference
Manual for details of these commands.
The parameters that can be set are:
Parameter
Default value
This is the length of the PIN to be stored as an encrypted PIN under the LMK.
Note: The encrypted PIN is one character longer than the length specified for the
PIN by this parameter.
Echo: On or Off
Off
If the answer to this question is On then passwords and other secret values are
displayed on the console as entered. Characters can be hidden by using ^ prior to
entering the component or key.
Note: Enabling Echo is a security hazard and should not be used in a live system.
Atalla ZMK variant support: On or Off
Off
For interoperation with Atalla systems. This enables the optional Atalla variants within
commands. Any console command providing key support will prompt for an Atalla
variant.
Note: Selection has no effect on host commands - Atalla variants can be supplied with
any appropriate command regardless of this setting.
Transaction key scheme: Racal, Australian or None
None
Transaction key schemes are techniques whereby data-encrypting keys change with
each transaction in a manner that cannot be followed by a third party. The HSM
supports three variants of transaction key schemes: Racal, Australian (AS2805) and
DUKPT. There are command conflicts between the Racal and Australian scheme so
only one can be selected. The use of the DUKPT commands is not affected by this
setting.
Note: The default value has changed to None. In this case, none of the Racal or
Australian transaction key scheme commands are available to the host.
User storage key length: Single, Double or Triple
Single
This is the length of the keys stored in user storage; it can be single, double or triple
length. The number of keys that can be stored depends upon this setting.
Select clear PINs: Yes or No
No
This enables the clear PIN support via host commands NG and BA. Authorised state is
a requirement for these commands to be processed by a host application.
Note: This is a security risk unless precautions are taken at the host.
Enable ZMK translate command: Yes or No
No
This enables the BY command that allows the translation of Zone Master Keys from
under another Zone Master Key. Authorised state is required for this command to
process within a host application.
Note: The availability of this command is a significant security risk.
11
Configuration
Parameter
Default value
No
This enables support for the ANSI X9.17 mechanism for key import. When being
imported, each key of double or triple length is encrypted separately using the Electronic
Code Book (ECB) mode of encryption. This is a lower security option. It is strongly
recommended that the X9 TR-31 keyblock is used instead of X9.17.
Enable X9.17 for export: Yes or No
No
1024
A method supported by the HSM to enable customers to self-select their own PINs is
to use Solicitation mailers. This is a turnaround form that is sent to the cardholder. The
cardholder records the PIN selection on the form and returns it to the issuer. The
mailer data consists of the cardholder name and address and a reference number (an
encrypted account number). As a security measure, the form returned to the issuer
contains only the reference number and the PIN selection. A batch process is used to
process these requests when returned.
Enable single-DES: Yes or No
No
This parameter is only valid if ZMK length is double. If enabled, it permits the use of
single-length DES keys.
Note: The default value has been changed to No.
Prevent Single-DES keys masquerading as double or triple-length key:
Yes or No
Yes
When set to Yes, all HSM commands that import double or triple-length DES keys will
ensure that the imported key is not simply a single-length key masquerading as a
double or triple-length key.
ZMK length: Single or Double
Double
The length of the Zone Master Key: single or double. This is a backwards-compatible
mode to enable the switching between 16H and 32H for ZMKs.
Note: The default value of this parameter has been changed to Double.
Decimalisation table Encrypted/Plaintext: Encrypted or Plaintext
Encrypted
This option determines if the decimalisation table will be encrypted or in plain text. The
default setting is encrypted, however, to allow for backward compatibility plaintext
decimalisation tables can be selected. It is recommended that encrypted decimalisation
tables are used to protect against decimalisation table manipulation attacks.
Enable decimalisation table checks: Yes or No
Yes
The values in the decimalisation tables, used for deriving and verifying PIN offset
values, are normally restricted to provide additional security by rejecting values which
are potentially insecure. This can cause problems where existing tables fail the checks,
so for backward compatibility this parameter allows the restrictions to be disabled.
12
Configuration
Parameter
Default value
A (Visa method)
This selects the PIN encryption algorithm to be used when encrypted PINs are stored by
the card issuer. The Racal algorithm is the best choice for a new installation; it is the
stronger of the two methods. The Visa algorithm is offered for compatibility with older
HSMs and for customers who already have a database of encrypted PINs.
When the Racal method is used, the output of the encryption is hex characters whereas
the Visa method produces numeric digits. Commands that use encrypted PINs describe
them as LN or LH.
Card/password authorisation: Card or Password
Card
This option selects the method of authenticating security officers requesting a security
state change. The Authorised State is a mode that the HSM can be placed in for
sensitive data processing. This authorised mode is required when input commands at
the console or host use clear text data such as key components or unencrypted pins.
Authorised mode can be used in both Online and Offline host states and requires the
authorising officers to invoke the higher security level. Before the authorised state can
be set the authorising officers need to be verified by the HSM. Officer verification is
done by checking either a smartcard and PIN or a password (16 alphanumeric
characters.) If the Password option is not set when the LMK is created, the password
option will not be available as no password is created and stored with the LMK
components.
Card issuer password: 8 characters
This option enables Thales to change the card issuer password for LMK and
authorising officer Smartcards. If the password has been changed you will be advised
when new cards are delivered. Special care must be taken that no key is inadvertently
struck, placing a character in this field. If this setting is changed, it will not be possible
to format the Smartcards using the FC command.
Authorised state required when importing DES key under RSA Key:
Yes or No
Yes
This setting determines whether Authorised State is mandatory for the import of DES
keys using RSA keys (host command GI). When set to Yes, the GI command always
requires Authorised State (and the use of the signature field is optional). When set to
No, the GI command does not require Authorised State.
Minimum HMAC verification length in bytes: Yes or No
10
This setting determines the minimum and maximum lengths of HMAC keys that the
HSM can generate. HMAC keys must satisfy the equation L/2 <= key length, where L
= is the size of the hash function output. For SHA-1 HMAC keys, L=20, and therefore
the key length must be at least 10.
Enable PKCS#11 import and export for HMAC keys: Yes or No
No
This setting determines whether the host commands LU and LW can import or export
HMAC keys in PKCS#11 format.
Enable ANSI X9.17 import and export for HMAC keys: Yes or No
No
This setting determines whether the host commands LU and LW can import or
export HMAC keys in ANSI X9.17 format.
13
Configuration
Parameter
Default value
No
This setting determines whether the Message Encryption host commands M0, M2 and
M4 can encrypt/decrypt/translate messages (using a ZEK) where the plaintext contains
only printable ASCII characters.
Enable ZEK encryption of Base94 ASCII chars: Yes or No
No
This setting determines whether the Message Encryption host commands M0, M2 and
M4 can encrypt/decrypt/translate messages (using a ZEK) where the plaintext contains
only Base94 characters.
Enable ZEK encryption of Base64 ASCII chars: Yes or No
No
This setting determines whether the Message Encryption host commands M0, M2 and
M4 can encrypt/decrypt/translate messages (using a ZEK) where the plaintext contains
only Base64 characters.
Enable ZEK encryption of Hex-only ASCII chars: Yes or No
No
This setting determines whether the Message Encryption host commands M0, M2
and M4 can encrypt/decrypt/translate messages (using a ZEK) where the plaintext
contains only hexadecimal ASCII characters.
Restrict Key Check Value to 6 hex chars: Yes or No
Yes
This setting determines whether Key Check Values (KCVs) should be restricted to
consist of only 6 hex characters. The overall length of the KCV field will remain the
same, regardless of this setting. However, when set to Yes, only the first 6 characters
will contain the KCV: any remaining characters will be ignored (when input to the
HSM) or set to 0 (when returned from the HSM).
Enable Multiple Authorised Activities: Yes or No
Yes
If enabled, will allow precise selection of authorised activities (including timeout period
if required). If disabled HSM reverts to global Authorised state.
Enable Persistent Authorised Activities: Yes or No
Yes
No
If enabled, this will allow the IBM 3624 PIN Offset commands to return an Offset
whose length matches the PIN, rather than being restricted to the Check Length
parameter.
Enable weak PIN checking: Yes or No
No
If enabled, the HSM's PIN generation/derivation host commands will check to ensure
that the PIN does not match one of the entries in the appropriate global 'Excluded PIN
Table'. If a match is found in the list, then the command fails, returning error code 86.
Enable PIN Block format 34 as output format for PIN translations to
ZPK: Yes or No
No
If enabled, the HSM will permit PIN block format 34 to be used as the output format
of PIN translation commands. In previous versions of HSM software, translations to this
format were not possible.
14
Configuration
Parameter
Default value
00
Identifies the Default LMK, which the HSM will use if it receives a command that does
not explicitly state which LMK is to be used. The use of the Default LMK provides a
backward-compatible mode, even when multiple LMKs are loaded in the HSM.
Management LMK identifier: 00..99
00
Identifies the Management LMK, which will be used for authorising certain
management functions (e.g. setting the HSMs date/time), and for encrypting the audit
MAC key.
Use HSM clock for date/time validation: Yes or No
Yes
If enabled, the HSM uses its integral real-time clock to validate check the start/end
date/time optional header blocks of keyblocks (when present).
Additional padding to disguise key length: Yes or No
No
If enabled, the HSM disguises the length of single or double length keys within a
keyblock by adding 8 or 16 extra padding bytes, such that single, double and triple
length DES keys all appear to be triple length keys.
Key export and import in trusted format only: Yes or No
Yes
If enabled, the HSM will only import/export keys using a keyblock format. In this case,
any export/import process using keys in variant format (including X9.17 format) will be
prohibited.
Secure Link password: 8 characters
password
This setting allows the user to configure the password which is to be used to protect
the HSM Manager HSM communications. The HSM Manager will be made
available at some future date.
Example
Secure> CS <Return>
PIN length [4-12]: 4 <Return>
Echo [oN/ofF]: F <Return>
Atalla ZMK variant support [oN/ofF]: F <Return>
Transaction key scheme Racal or Australian or None? [R/A/N]: R <Return>
User storage key length [S/D/T]: T <Return>
LMKs must be erased before remaining parameters can be set.
Erase LMKs? [Y/N]: Y <Return>
Select clear PINs? [Y/N]: N <Return>
Enable ZMK translate command? [Y/N]: N <Return>
Enable X9.17 for import? [Y/N]: N <Return>
Enable X9.17 for export? [Y/N]: N <Return>
Solicitation batch size [1-1024]: 1024 <Return>
Enable Single DES? [Y/N]: Y <Return>
Prevent single-DES keys masquerading as double or triple-length key? [Y/N]: Y Y
<Return>
Making default length for ZMKs: [S/D]: D <Return>
Decimalisation table Encrypted/Plaintext [E/P]: E <Return>
Enable Decimalisation Table Checks? [Y/N]: Y <Return>
PIN encryption algorithm [A/B]: A <Return>
Card/password authorisation (local) [C/P]: C <Return>
Card issuer password (local) [Enter = no change]: <Return>
Authorised state required when importing DES key under RSA key [Y/N]: Y <Return>
15
Configuration
16
Multiple LMKs
With version 3.0 (and later) software, it is possible to install multiple LMKs within a single HSM
8000. The precise details of the number and type of installed LMKs are controlled via the HSMs
licence file:
Licence
Description
HSM8-LIC001v3
HSM8-LIC012 LMK x 2
(optional licence)
HSM8-LIC013 LMK x 5
(optional licence)
LMK Table
LMKs are stored in a table within the secure memory of the HSM, with each LMK occupying a
different slot within the table. Each slot has the following attributes:
Attribute
Description
LMK ID
A 2-digit number which uniquely indicates the location of each LMK within
the table. All references to LMKs are made by specifying the LMK Identifier.
Key Scheme
Algorithm
Status
Comments
Authorisation
Indicates the authorisation status of the HSM for this particular LMK
either a flag (for Authorised State) or a list of authorised activities.
LMK Check
Value
The check value of the old LMK (in Key Change Storage).
Use the console command VT (View LMK Tables) to view the contents of the HSMs LMK table.
Local Master Keys are normally generated in component form, and recorded on Smartcards. All
of an LMK's components are loaded into the HSM to recreate that LMK when required.
Variant LMKs
A Variant LMK is a set of 40 DES keys, arranged in pairs, with different pairs (and variants of
those pairs) being used to encrypt different types of keys. This is the standard LMK format
supported in all versions of Racal/Thales HSM firmware.
Note: The term "Variant LMK" refers to the variant method of encrypting keys; a Variant LMK
is not itself a variant of any other key.
LMK Pair
Function
00 - 01
02 - 03
04 - 05
18
06 - 07
08 - 09
10 - 11
12 - 13
The initial set of Secret Values created by the user; used for generating
all other Master Key pairs.
14 - 15
Encrypts Terminal Master Keys, Terminal PIN Keys, and PIN & Card
Verification Keys.
16 - 17
18 - 19
20 - 21
22 - 23
24 - 25
Function
26 - 27
28 - 29
30 - 31
32 - 33
34 - 35
36 - 39
Keyblock LMKs
A Keyblock LMK is a triple-length DES key, and is used to encrypt keys in a keyblock format. It is not
compatible with a Variant LMK, and it can only be used to encrypt keys in keyblock form.
Note: The term "Keyblock LMK" refers to the keyblock method of encrypting keys; a Keyblock LMK is
not itself stored in keyblock form.
Header
(1 byte)
(16 ASCII
characters)
Key Block
Authenticator
(8 ASCII
characters)
19
LMK Management
To generate and load an LMK, at least three "Component Holders" (two Authorising Officers
and at least one other person) are required.
The first Authorising Officer creates a number of Secret Values (and a Password, if the HSM is
configured in Password mode), and enters this data at the Console. The HSM uses these secret
values to produce a Component Set. This set of values is then recorded on a Smartcard.
Using the same procedure, the second Authorising Officer creates another set of Secret Values
(and if necessary, a Password), generates a Component Set and records it on a second
Smartcard.
Each additional Component Holder creates another set of Secret Values, generates a
Component Set and records it on an additional Smartcard.
The above procedures result in a number of Smartcards, each containing one Component Set.
The first and second Smartcards also contain Authorising data. Each Component Holder makes
copies of their Smartcard so that it is stored on a number of Smartcards. At least two copies
should be made, one for storage onsite and one offsite. Serious consideration should be given to
the creation of extra copies to provide a greater level of resilience against the failure of any one
Smartcard. Copies made for resilience against failure can be kept together.
NOTE: AT NO TIME SHOULD ANY ONE PERSON HAVE GAINED ACCESS TO MORE THAN
ONE COMPONENT SETS.
The data contained in the Smartcards is loaded to LMK storage. The load function stores
Authorising data (Passwords, if this mode is used), and mathematically combines each
Component Set with the previous contents of the LMK storage to form the remaining LMK
pairs. The Smartcards must then be separately and securely stored (e.g., in safe deposit boxes).
When new LMKs are generated (for example, if existing keys are known to be compromised), it
is usually necessary to use the old LMK so that existing encrypted data can be translated from
encryption under the old keys to encryption under the new keys. To translate between LMKs, ,
first load the new LMK, then load the old LMK in to a special memory area known as "key
change storage". After this process, use Host commands to translate the old encrypted data.
LMKs in the unit can be verified and the LMK Component Sets on the Smartcards can be
checked. It is recommended that:
20
LMKs on Smartcards (including all the spare copies) are checked at 12-month intervals.
LMKs are changed at 2 year intervals. This ensures that the procedures required for the
change are regularly exercised and updated where necessary.
The three (or more) Component Holders (two Authorising Officers plus at least one
other Component Holder), who are to generate the three (or more) sets of
components. (The two Authorising Officers must be present whenever the HSM is to be
set into the Authorise Activity state.)
At least 6 formatted blank Smartcards (up to 12 can be used). 6 cards provide two copies
of three sets of components, 12 cards provide four copies of three sets. Note that new
cards are supplied un-formatted. Use the FC command to format or re-format the cards.
A log to record the LMK check values that are used to verify the contents of each
Smartcard at a later date. If the HSM is configured in Password mode and the two
Passwords are entered by the Authorising Officers (i.e., not automatically created by the
HSM and stored electronically), the two Passwords must be also recorded in the log.
The results of the process with three Component Holders and two copies of the Smartcards are
three Smartcard sets as follows:
Smartcard set 1, consisting of one original Smartcard plus one duplicate (contains
Component Set 1 (and, if applicable, Password 1)).
Smartcard set 2, consisting of one original Smartcard plus one duplicate (contains
Component Set 2 (and, if applicable, Password 2)).
Smartcard set 3, consisting of one original Smartcard plus one duplicate (contains
Component Set 3).
The Secret Values must each be 16 random characters, and can contain any hexadecimal
characters (0-9, A-F).
Note that during the process of creating an LMK component set a number of values (A, B and C)
can be either entered manually or randomly generated by the HSM which is the recommended
approach; if the values are entered manually and written down for storage, it is possible to
subsequently re-create the LMK components even if the Smartcards are not available. Therefore
the recorded values must be MORE SECURELY STORED than the Smartcards.
Note: When generating Component Sets for a Variant LMK, values A and B contain 16-digit
Secret Values, whilst value C contains an 8-digit value. However, when generating Component
Sets for a Keyblock LMK, values A, B and C each contain 16-digit Secret Values.
21
Keyblock LMK
As in Step 4, just <Return> can be entered, and the HSM will generate a random value. This is
the recommended way of generating the value.
7. The HSM is now ready to copy the LMKs onto Smartcards. It prompts:
Insert blank card and enter PIN: ***** <Return>
Insert the Smartcard in the reader and enter its PIN. PIN entry should not be overlooked.
If there is a fault on the card or it already has data on it, either allow the HSM to write
over the old data or reject the card and use another, as applicable, in reply to prompts
from the HSM.
8. The HSM displays:
22
Writing keys
Checking keys
Device write complete, check: XXXXXX
Remove the Smartcard and store it securely. If a failure has occurred, the Smartcard is
ejected: return to Step 7.
Make a note of the check value for future reference. (It is subsequently used to ensure that
the contents of the Smartcard are correct, and should be recorded so that the correct use
of LMKs can be reliably audited later.)
The HSM prompts:
Make another copy? [Y/N]: Y <Return>
9. Make another copy: repeat Steps 8 and 9 until the required number of copies have been
made, then terminate the command in response to the prompt:
Make another copy? [Y/N]: N <Return>
X copies made
Password Mode
The HSM may be configured for password Mode authorisation using the CS (Configure Security)
console command.
This mode is provided for backward compatibility.
The process is similar to generating component set 1 & 2, except there is an extra step before
(5) where the HSM prompts twice for the (16- character alphanumeric) Password.
The Component Holders responsible for Smartcard custody (no one person should have
access to all Smartcards).
In the description that follows, user entries at the Console are shown underlined. Characters
returned by the HSM that depend on the values entered by the user (and therefore cannot be
predicted) are shown as X.
23
The order in which the Smartcards are loaded into the HSM is not important, but, for
convenience, they are referred to as the first, second and third (etc.) Smartcards.
1. Set the HSM into the Secure state: insert the keys in both of the key switches on the HSM
front panel and rotate them both fully. The Console displays:
HSM going OFFLINE, press Reset to go Online.
Master Key loading facilities now available.
Secure>
2. Initiate the LMK loading. Use the LK command. The HSM responds with a series of
prompts to ensure that the initial starting conditions are achieved.
Secure> LK <Return>
The HSM responds with:
Enter LMK id: 00 <Return>
Enter comments: Live LMK for ABC Bank <Return>
LMK in selected location must be erased before proceeding
Erase LMK? Y <Return>
3. The HSM prompts for the components:
Load LMK from components.
Insert card and enter PIN: <Return>
Insert the first Smartcard into the card reader on the front of the panel of the HSM.
4. When the Smartcard is inserted enter the PIN:
***** <Return>
5. The HSM reads the Smartcard then displays:
CHECK: XXXXXX
Load more components? [Y/N]: Y <Return>
If it displays an error message, rectify the fault and repeat the operation as necessary.
When successful, remove the Smartcard.
6. Insert the next Smartcard and repeat the loading procedure, Steps 3 to 5.
7. Repeat Step 6 for the third (and any subsequent) set of components. When all have been
loaded and the HSM displays the check value, RECORD THE CHECK VALUE (it is the
check on the final LMK pairs and is subsequently used to verify that the LMK pairs are
correct), then press N to terminate the loading procedure:
CHECK: XXXXXX
Load more components? [Y/N]: N <Return>
Use the LO command to load LMKs into key change storage
8. It is now possible to go to step 3 of the procedure for Moving 'Old' LMKs Into Key Change
Storage, if required. Otherwise lock the cam locks on the front panel and remove the keys.
9. Ensure that the HSM can be set into the Authorised state by inserting the Smartcards or
entering the Passwords (as applicable). Use the A command, and insert the Smartcards and
enter the PINs (or enter the Passwords), in response to prompts. If used, the Passwords
must be entered in the correct order (i.e., the first should be the Password loaded with
Component Set 1).
Online> A <Return>
Enter the first PIN (or the Password), as applicable:
First Officer:
Insert card and enter PIN: ***** <Return>
or
Password: **************** <Return>
Enter the second PIN (or the Password), as applicable:
24
Second Officer:
Insert card and enter PIN: ***** <Return>
or
Password: **************** <Return>
When successful the HSM displays:
AUTHORISED
OnlineAUTH>
If one of the PINs (or Passwords) does not have the correct number of characters
(excluding spaces), the HSM re-prompts, and, if one was incorrect it returns NOT
AUTHORISED. In either case, press <Delete> and re-enter the PINs (or Passwords).
10. To reset the HSM and set it online to the Host, press the RESET button on the front panel.
This also removes the HSM from the Authorise Activity state.
11. Check that the yellow Secure LED on the front panel is illuminated.
25
26
27
28
LMK
Contents
00
01
01
01
01
01
01
01
01
01
79
02
CD 1F
D3
6E
F8
BA
02
20
20
20
20
20
20
20
20
03
31
31
31
31
31
31
31
31
04
40
40
40
40
40
40
40
40
05
51
51
51
51
51
51
51
51
06
61
61
61
61
61
61
61
61
07
70
70
70
70
70
70
70
70
08
80
80
80
80
80
80
80
80
09
91
91
91
91
91
91
91
91
10
A1 A1
A1
A1
A1
A1
A1
A1
11
B0
B0
B0
B0
B0
B0
B0
B0
12
C1 C1 01
01
01
01
01
01
13
D0
D0
01
01
01
01
01
01
14
E0
E0
01
01
01
01
01
01
15
F1
F1
01
01
01
01
01
01
16
1C 58
7F
1C 13
92
4F
EF
17
01
01
01
01
01
01
01
01
18
01
01
01
01
01
01
01
01
19
01
01
01
01
01
01
01
01
20
02
02
02
02
02
02
02
02
21
04
04
04
04
04
04
04
04
22
07
07
07
07
07
07
07
07
23
10
10
10
10
10
10
10
10
24
13
13
13
13
13
13
13
13
25
15
15
15
15
15
15
15
15
26
16
16
16
16
16
16
16
16
27
19
19
19
19
19
19
19
19
28
1A 1A
1A
1A
1A
1A
1A
1A
29
1C
1C
1C
1C
1C
1C
1C
1C
30
23
23
23
23
23
23
23
23
31
25
25
25
25
25
25
25
25
32
26
26
26
26
26
26
26
26
33
29
29
29
29
29
29
29
29
34
2A 2A
2A
2A
2A
2A
2A
2A
35
2C
2C
2C
2C
2C
2C
2C
2C
36
2F
2F
2F
2F
2F
2F
2F
2F
37
31
31
31
31
31
31
31
31
38
01
01
01
01
01
01
01
01
39
01
01
01
01
01
01
01
01
Password 1
01 01 01 01 01 01 01 01
Password 2
NOWISTHETIMEFORA
Figure 1 LMK Pairs (and Passwords) on the "Test LMK" Smartcard
01 23 45 67 89 AB CD EF 80 80 80 80 80 80 80 80 FE DC BA 98 76 54 32 10
Password 1
89 89 89 89 89 89 89 89
Password 2
THEQUICKBROWNFOX
Figure 2 LMK Pairs (and Passwords) on the "Test Keyblock LMK" Smartcard
30
Operating Instructions
Query Auxiliary
QC :
Query Console
QH :
Query Host
QL :
Query aLarms
QP :
Query Printer
QS :
Query Security
Version
See the HSM 8000 Console Reference Manual for details of these commands.
Secure Mode
The HSM is put into the secure mode by operating both of the key locks on the front panel.
Secure mode is required for certain secure commands which affect the security status of the
HSM. These are GK, LK, LO, DC, CL, CS, SS, RS, CLEARERR, CLEARAUDIT, AUDITOPTIONS
and MODTIME. Any attempt to use these commands without putting the HSM into secure
mode will cause an error to be logged.
31
Operating Instructions
If the HSM is set up to use Password mode, with Echo off, proceed as follows:
Online> A <Return>
Enter LMK id: 00 <Return>
No activities are authorised for LMK id 00.
List of authorisable activities:
generate
genprint
component
import
export
pin
audit
admin
diagnostic misc
command
Select category: pin <Return>
clear
mailer
Select sub-category, or <RETURN> for all: mailer <Return>
host
console
Select interface, or <RETURN> for all: <Return>
Enter time limit for pin.mailer, or <RETURN> for permanent: <Return>
Make activity persistent? [Y/N]: n <Return>
Enter additional activities to authorise? [y/N]: n <Return>
The following activities are pending authorisation:
pin.mailer
Password: ************* <Return>
32
Operating Instructions
Second Officer:
Password: ************* <Return>
AUTHORISED
Online-AUTH>
Smartcards
The HSM provides Console commands to support the use of Smartcards:
FC :
Format a Smartcard.
CO :
Create an Authorising Officer Smartcard.
VC :
Verify the contents of a Smartcard.
NP :
Change a Smartcard PIN.
RS :
Restore HSM settings from a Smartcard.
RC :
Read Smartcard Details (unidentifiable card).
SS :
Save HSM settings to a Smartcard.
EJECT : Ejects the Smartcard.
See the HSM 8000 Console Reference Manual for details of these commands.
Logging Functions
An Error Log and an Audit Log are provided, each with a command to display the log and a
command to clear the log. There is also a command to enable the user to set their timezone, so
that the correct time is displayed in audit journal reports.
The Audit Log and Error Log are not retained if an alarm event occurs, as they can no longer be
trusted.
See the HSM 8000 Console Reference Manual for details of the logging commands.
33
Operating Instructions
Recoverable (1) Something abnormal happened, but the unit recovered from it without
rebooting or losing data.
Major (2) Something abnormal happened, but the unit recovered from it but may have
lost data/information due to restarting a process or re-initialising hardware. The unit may
not function in a full capacity.
Catastrophic (3) Something abnormal happened, and the unit had to reboot to recover.
Only catastrophic errors cause the HSM to reboot. New errors cause the Fault LED on the
front panel to flash.
34
Security Recommendations
MUST
This word means that the definition is an absolute requirement to
achieve an acceptable overall level of risk;
MUST NOT
This phrase means that the definition is an absolute prohibition of the
specification to achieve an acceptable overall level of risk;
SHOULD
This word means that there may exist valid reasons in particular
circumstances to ignore a particular item, but the full implications must be understood and
carefully weighed before choosing a different course;
SHOULD NOT
This phrase means that there may exist valid reasons in particular
circumstances when the particular behaviour is acceptable or even useful, but the full
implications should be understood and the case carefully weighed before being implemented.
Procedural Security
A system employing an HSM can only operate securely if the HSMs environment provides the
procedural security that it requires, and if the HSMs security enforcing functions are utilised
appropriately.
Note the requirements for procedural security are likely to extend beyond the Secure Area within
which the HSM is used operationally (see the section Measures to Protect Secure Area), and are
likely to include every aspect of an operation that contributes to the continuous secure management
of HSMs and the mitigation of associated risks.
Recommendations for procedural security are as follows:
1. A management process MUST be in place for the system, to enable corrective action to be
taken if any security elements, including procedures, are e.g. not being observed, failing their
objectives, or could be efficiently improved.
2. An incident management process MUST be in place for the system, e.g. to enable action to be
taken if any compromise to the security of the system is detected or suspected, or if any
security elements of the system is in an unplanned or uncontrolled state.
3. The system MUST be audited regularly to help ensure that the intended overall level of risk is
being achieved, by checking that the chosen security elements of the system (e.g. satisfying the
requirements laid down in this appendix) are in place and are being used correctly.
4. The auditor MUST be independent of the operators of the security elements within the
system.
35
Security Recommendations
Every movement of an HSM from one location to another MUST be recorded, together with
reason for movement.
6.
Every access to the HSM Secure Area or PIN printing areas MUST be recorded, including
details of damaged and destroyed PIN mailer material.
7. Every access to an authorising smartcard, LMK or HSM settings smartcard MUST be recorded
and include the name of every officer involved and the reason for access.
8. Where key material or smartcard PINs are written down, every access MUST be recorded and
include the name of every officer involved and the reason for access.
9. Every access to physical (cam) keys MUST be recorded and include the name of every officer
involved.
10. The records MUST be regularly reviewed to aid discovery of any hostile action that may have
occurred.
11. Incident management procedures MUST exist to react to and counter hostile actions however
discovered.
12. The records SHOULD be easy to understand and organised in such a way as to make analysis
both straightforward and useful.
13. Records SHOULD be regularly backed up and copies stored off-site in such a way that they
can be easily restored if necessary.
14. All record entries MUST include a time and date.
15. All record entries MUST include a traceable signature. Where an entry involves more than one
individual, e.g. the granting of access, all the individuals MUST sign the entry.
16. Sufficient resource MUST be available to allow complete records to be created.
17. The records MUST be protected against unauthorised modification.
18. There MUST be a record of all training activities relevant to the security system, and including
any training exercises involving the facilities and equipment of the HSM Secure Area.
19. Before any deletions are made from the HSM's electronic log (e.g. using the CLEARAUDIT
command from the Console to empty the Audit Log) the log MUST be correlated with the
other record(s) of that HSM, and any differences fully investigated.
Note it will be important to check that the first entries in the AUDITLOG correspond exactly with
the last time the AUDITLOG was cleared. This also implies that the AUDITLOG is not configured
to wrap where the oldest entries are automatically overwritten once it becomes full. It is also
important to check that each change to the Secure state was authorised.
36
Security Recommendations
Use of Authorised State (and the Security Officer role of the HSM Manager)
The Security Officer role utilised by the (Local or Remote) HSM Manager requires equivalent
controls to the Authorised State accessed via the Console terminal.
1. At least 2 separate authorised officers MUST be required to put the HSM into Authorised
state.
2. Before the HSM is put into the Authorised state, the identities and authority of both
authorised officers MUST be checked and logged, with audit entries signed by both authorised
officers.
3. Before either one or both authorised officers leave the HSM Secure Area (even temporarily),
the HSM MUST be taken out of Authorised state.
Security Recommendations
Command Security
There are a number of standard features provided by the HSM 8000 that can help lock down the
HSM to perform only the functions that are required by the host application.
1. Use ConfigCmds to disable all unused host and console commands.
2. Use ConfigPB to disable all unused PIN block formats.
3. Use Multiple Authorised Activities instead of the global Authorised state, thus permitting
specific authorised commands, rather than all authorised commands.
4. Use the auditing capabilities to record and detect unexpected commands or events:
38
All HSM commands that require the HSM to be in the Authorised or Secure state must be
audited by the HSM itself. This is achieved using the console command AUDITOPTIONS.
The host system must extract the audit records from inside the HSM, and store them
securely. The audit records can be extracted from the HSM using the host command Q2.
Prior to viewing the extracted audit records, they should be validated by the HSM. This is
achieved using the host command Q8.
Security Recommendations
HOST
COMPUTER
Command
Message
Response
Message
HSM
PRINTER
Setting up
&
Master Keys
HSM MANAGER
or
CONSOLE
TERMINAL
Security Recommendations
40
Security Recommendations
card scheme mandates or other requirements relevant to the application and environment
in which the key is used;
the function of the key (e.g. key encryption, data encryption, data authentication);
the full implications of actual or possible compromise both during and after active use.
3. All cryptographic keys used within the system MUST be updated on a regular basis in an
appropriate manner.
4. When a cryptographic key (in particular the LMK) is updated, data protected by that key might
need to be translated from the old key to the new key. Once this translation process is
complete, the old key SHOULD be removed from the HSM.
Security Recommendations
8. Encryption of key material that is not subsequently subject to physical protection MUST be
performed using an appropriately secure algorithm with a sufficiently large key length.
9. Encryption of key material that is not subsequently subject to physical protection MUST be
performed using a physically secure key or one that is itself encrypted.
10. Procedures MUST exist such that in the event of key material compromise, keys are replaced
as necessary.
11. The utilisation of each key component MUST be controlled by separate authorised officers.
12. Where keys or key components are stored on smartcards, the smartcards MUST be treated
with an adequate degree of physical security to prevent unauthorised access.
4. The frequency for changing passwords SHOULD be stated and be sufficient for the role.
5. Passwords SHOULD NOT be disclosed to others.
6. The process for managing forgotten passwords SHOULD be set out in the user's security
management procedures.
7. If the PINs or passwords are written down, they MUST be stored securely and separately.
8. If a PIN or password is compromised (including a previously authorised individual becoming
unauthorised), it MUST be invalidated and a replacement issued.
9. Everyone, and especially operators and authorised officers, MUST have no unauthorised
knowledge of any PIN or password.
42
Security Recommendations
Smartcard Security
Smartcards are used for storing three distinct types of sensitive information:
Both locks must be opened in order to remove the HSM from the cabinet.
Both locks must be opened to put the HSM into the Secure state.
One lock (either one) must be opened to put the HSM into the Offline state.
Security Recommendations
HSM Integrity
HSM Traceability
1. Procedures MUST exist so that movement of HSM devices from one location to another is
controlled and recorded.
2. This record SHOULD be verified periodically to provide a high level of confidence in the
location of all HSMs in the system.
3. If records show any discrepancy in the location of HSMs, this MUST be investigated, and
immediate consideration SHOULD be given to withdrawing the HSM from service.
HSM Maintenance
1. HSM maintenance MUST only be performed by trusted personnel.
2. Before an HSM is given to the maintenance authority it SHOULD be given a routine inspection.
3.
The HSM SHOULD be removed from the Secure Area for maintenance.
If the HSM is left unattended during maintenance, measures MUST be taken to ensure that no
one else has access to it.
6. Before an HSM is given to the maintenance authority, the LMKs MUST be erased.
7. Before an HSM is given to the maintenance authority, the Test LMK MUST be loaded in place
of each live LMK (i.e. a non-Test LMK).
8. Before an HSM is given to the maintenance authority it MUST be put into the Offline state as
described in the manual.
9. When an HSM is returned by the maintenance authority, it MUST be subject to the inspection
procedures.
10. The return of faulty HSMs to the manufacturer MUST take place under the control of the
incident management process.
44
Security Recommendations
Note that this approach is designed to help ensure that a faulty HSM, e.g. one on which the
deletion of all LMKs cannot be confirmed or from which the AUDITLOG cannot be inspected,
is handled appropriately and within an acceptable level of risk. The necessary decisions are
likely to be more appropriate to the incident management process than to normal operations
as these might not be suitable for handling unusual risks and issues.
45
Security Recommendations
Normal Operations
These measures are applicable whilst the HSM is being held or used within the users Secure Area.
If a functional HSM is to leave the Secure Area this is considered to be a maintenance activity e.g.
the LMK would be replaced by the Test LMK.
The HSM contains an intrusion detection mechanism that is always armed.
1. When the HSM is to have an online connection to the host application it MUST be locked in
position by the action of being put into the Online state.
2. When the HSM contains an LMK, the motion detector MUST be enabled.
3. When the HSM contains an LMK, the temperature sensor MUST be enabled.
4. The HSMs diagnostic tests MUST be run on a regular basis. (These tests exercise the HSMs
cryptographic functions as well as the general operational correctness of the device).
5. Any HSM that develops a fault whilst it contains an LMK MUST become subject to the incident
management process if deletion of the LMK cannot be confirmed or the Audit Log cannot be
inspected.
6. A faulty HSM MUST NOT be given an online connection to the host application.
7. The system design SHOULD include adequate contingencies for system failures, e.g. specific,
isolated, localised, geographical or systemic.
8. Where the system design implies continuous availability of an HSM, in the event of failure of an
HSM, a means of quickly switching operation to another HSM SHOULD be available at all
times. (An automated load-balancing mechanism may be useful for this purpose.)
9. At least two authorised officers MUST control the initialisation of a new HSM.
10. All online HSMs MUST be subject to regular monitoring, particularly with respect to the
management of any HSM where the Error LED or Alarm LED has become illuminated.
Note that normal operations can only continue with an HSM if a benign explanation can be
established for a resettable error or alarm condition.
46
Security Recommendations
Inspection Procedures
This section describes procedures that are carried out to confirm that the HSM has not been subject
to accidental or deliberate tampering that may lead to insecure operation.
1. The inspection procedures MUST be performed by trusted personnel.
2. Details of the personnel performing the inspection procedures MUST be recorded.
3. The results of each step of the inspection procedures MUST be recorded.
Frequency of Inspection
Both the Initial Inspection Procedure and the Routine Inspection Procedure MUST be carried
out whenever the HSM is received from an external source. That is:
at any time after the HSM has travelled outside of the HSM Secure Area.
periodically, e.g. on a three-monthly basis, to confirm continued secure operation of the device
in case of unknown unauthorised entry into the HSM Secure Area or accidental damage to the
HSM.
47
Security Recommendations
The HSMs diagnostic test console DT command, as described in the HSM 8000 Console
Reference Manual, MUST demonstrate the correct basic operation of the HSM. The result of
each test MUST be "OK". The final test MUST be followed by the phrase:
Diagnostics complete
Note that use of the DT command requires the HSM to be in the Secure state.
7. The HSM VR console command, as described in the HSM 8000 Console Reference Manual,
MUST confirm that the version number reported agrees with the record created during the
initial inspection.
8. Any cables connected to the HSM MUST terminate at the expected location/equipment; and
there MUST be no signs of physical damage to the cables themselves.
9. The HSM MUST have no unrecorded physical changes or damage.
10. Any HSM whose authenticity and integrity cannot be adequately established MUST become
subject to the incident management process.
48
Certificate Authority
Each administrator and operator smart card contains an RSA public/private key pair and, similarly, each
HSM is initialised with a public/private key pair. In order to have confidence in the authenticity of the
various public keys, each such key will be held in the form of a certificate, signed by the private key of a
(trusted) Certificate Authority (CA). The corresponding CA public key (used to verify the certificates) is
stored in each smart card and HSM.
The CA functionality is standard in all HSM 8000s that support the remote management solution. All
user interaction with the CA functionality is via the HSMs console interface.
Security Group
The term security group is used to describe a set of administrator and operator smart cards and a
single HSM, such that (secure) remote communication between the cards and the HSM in the group is
permitted. Communication requires both the card and the HSM to have prior knowledge of each other.
A necessary condition for a card and an HSM to communicate is that their RSA public keys are both
signed by the same CA. However, this is not a sufficient condition, and it is quite possible to have nonoverlapping security groups created via the same CA.
49
Recovery
One concern relating to the HSMs used in the remote management solution is that if an HSM is
tampered then it will lose its public and private keys from memory and it will be necessary to generate a
new key pair. This could involve considerable operational inconvenience.
Therefore, a mechanism involving a 3-DES Recovery Master Key (RMK) has been defined and allows a
public/private key pair to be restored into the HSMs secure memory following a tamper.
Assumptions
This appendix assumes that the reader is familiar with the operation of the HSM (including console
functionality) and the Remote HSM Manager.
Terminology
In accordance with Appendix A - Security Recommendations, the terms MUST, MUST NOT,
SHOULD and SHOULD NOT will have the following meanings in this appendix:
50
MUST: this indicates an absolute requirement to achieve an acceptable overall level of risk;
MUST NOT: this indicates an absolute prohibition of the specified activity in order to achieve an
acceptable overall level of risk;
SHOULD: this means that there may exist valid reasons in particular circumstances to ignore a
particular item, but the full implications must be understood and carefully evaluated before
choosing a different course;
SHOULD NOT: this means that there may exist valid reasons in particular circumstances when
the specified activity is acceptable or even useful, but the full implications must be understood
and evaluated before the activity is implemented.
Personnel
Two types of Remote HSM Manager user are defined, namely Administrators and Operators. Specifically,
an Administrator is a user with an administrator smart card and an Operator has an operator smart
card. Administrators are generally responsible for the day-to-day operations of the Remote HSM
Manager, whereas Operators are involved in more sensitive activities, such as key management.
In addition, someone responsible for the overall operation and security of the Remote HSM Manager
needs to be identified. For the purposes of this appendix, this person will be designated as the
Security Manager.
1. The Security Manager MUST have access to a secure area (such as a safe) for the storage of Remote
HSM Manager documentation, procedures, audit records and other sensitive items. Other Remote
HSM Manager users MUST NOT have access to this area.
2. Users of the Remote HSM Manager SHOULD NOT have more than one of the Administrator,
Operator or Security Manager roles.
3. Written justification SHOULD be provided by the Security Manager if it is deemed necessary for a
user to carry out more than one of the roles.
4. An Administrator with a left administrator smart card MUST NOT be allowed to possess (even
temporarily) a right administrator smart card, and vice versa.
5. Every Remote HSM Manager user, including the Security Manager, MUST have a named deputy, with
the same level of access and responsibility.
6. All users MUST be given adequate training to allow them to carry out their roles.
7. All users MUST be made fully aware of their responsibilities regarding the security of the Remote
HSM Manager.
8. All users SHOULD sign affidavits stating that they understand their roles and responsibilities with
respect to the Remote HSM Manager and that they will carry out their duties to the best of their
abilities.
9. Administrators and Operators who no longer need access to the Remote HSM Manager (e.g. have
left the organisation, have been assigned to a new department or are on extended leave, etc) MUST
be deleted immediately from the system and their smart cards MUST have all contents deleted, using
the functionality of either the HSM console, the Remote HSM Manager or by physically destroying
the card.
51
Procedures
All Remote HSM Manager processes and procedures must be fully documented.
1. All procedures relating to the security and operation of the Remote HSM Manager MUST be fully
documented; the Security Manager SHOULD be responsible for the creation, maintenance and
security of such documents.
2. Documentation regarding the security and operation of the Remote HSM Manager SHOULD be
distributed on a need-to-know basis.
3. Documentation regarding the security and operation of the Remote HSM Manager MUST be
reviewed and updated regularly.
4. The Security Manager MUST ensure that all procedures relating to the security and operation of the
Remote HSM Manager are followed correctly.
5. Processes and procedures for the investigation of error conditions and security incidents relating to
the Remote HSM Manager MUST be fully documented; the Security Manager SHOULD be
responsible for the creation, maintenance and security of such documents.
6. The Security Manager MUST ensure that all processes and procedures relating to the investigation of
error conditions and security incidents are followed correctly.
7. Documentation regarding the investigation of error conditions and security incidents MUST be
reviewed and updated regularly, especially following an incident.
52
Audit
Detailed audit logs of all activity relating to the Remote HSM Manager must be maintained. These will
include HSM audit logs, access logs, activity logs and error logs and may be held in electronic or paper
form. The following guidelines should be read in conjunction with the more general guidelines in
Appendix A - Security Recommendations.
1. A detailed audit policy for the Remote HSM Manager MUST be documented; the Security Manager
SHOULD be responsible for the creation, maintenance and security of this policy document.
2. The Security Manager MUST be responsible for ensuring adherence to the audit policy.
3. Records of all Remote HSM Manager activity MUST be made; this MUST include:
HSM management and user events (see, for example, Chapter 3 of HSM 8000 Remote HSM
Manager Users Guide);
personnel;
security incidents;
access to the Remote HSM Manager operations room (access logs and CCTV images);
access to various smart cards and PINs (administrator cards, operator cards, CA private key
share cards, RMK component cards, etc);
access to documents relating to the Remote HSM Manager, including audit and error logs.
Physical Security
Many Remote HSM Manager activities are extremely sensitive and need to be carried out in a secure
environment.
1. The Remote HSM Manager MUST be operated in an Operations Room, which is a physically secure
environment.
2. Access to the Operations Room MUST be controlled and personnel who do not need access MUST
NOT be given access.
3. Users who previously had access to the Operations Room but no longer need access MUST be
revoked on the access control system.
4. Access to the Operations Room SHOULD require a 2-factor mechanism (i.e. something you have,
such as a physical token, and something you know or something you are, such as a
PIN/password or a biometric).
5. If the Operations Room is occupied, there SHOULD be a minimum of 2 personnel present.
6. The loss or theft of a Operations Room physical access token MUST be reported immediately to the
Security Manager and the token revoked on the access control system; the circumstances of the
loss/theft MUST be investigated.
7. It MUST NOT be possible to leave the door to the Operations Room open for longer than a
specified period of time without an alarm being raised; such an alarm MUST be investigated
immediately.
8. All access to the Operations Room MUST be logged; each record MUST contain, as a minimum, a
date/time stamp and a user identifier.
9. Exit from the Operations Room SHOULD be recorded by the access control system.
10. All failed access to the Operations Room MUST be recorded in the access log.
11. Failed access attempts MUST be investigated.
12. The door to the Operations Room SHOULD be covered by a CCTV camera.
13. Authorised users of the Operations Room SHOULD NOT have access to the access logs or CCTV
images.
14. Access logs and CCTV images MUST be retained for inspection for a period of time that is
compatible with organisational policies, but SHOULD be at least 6 months.
15. The Operations Room SHOULD be alarmed outside normal operating hours.
16. CCTV MUST NOT be used inside the Operations Room.
17. All cabling inside the Operations Room MUST be clearly visible.
18. There SHOULD be no network access to the Operations Room, except as necessary to allow
communication with the HSMs.
54
19. The Operations Room MUST contain a dual access safe for the storage of sensitive items; dual
access could be (for example) a physical key and a PIN/password.
20. Access to the safe MUST require two people.
21. All access to the safe MUST be logged and MUST include, as a minimum, a date/time stamp, user
name and the reason for access.
22. The Remote HSM Manager Linux boot CD MUST be stored in the safe when not in use; ideally it
SHOULD be stored in a uniquely-numbered tamper-evident container, with a procedure in place to
check the container number on each access.
23. Smart card readers SHOULD be stored in the safe when not in use.
24. If a laptop is used to run the Remote HSM Manager then it SHOULD be stored in the safe when not
in use.
25. If a desktop PC is used to run the Remote HSM Manager then it SHOULD be locked to prevent
access to the internal circuitry.
26. The software environment of the Remote HSM Manager PC/laptop MUST not be modified (for
example, by installing software after the laptop has started). Additionally, the Remote HSM Manager
Linux boot CD must not be loaded in a virtual operating system environment.
27. The PC/laptop, smart card readers and all cabling MUST be checked for signs of tampering before
each Remote HSM Manager session.
28. Equipment that is not required for the operation of the Remote HSM Manager MUST NOT be
brought into the Operations Room; such equipment includes data analysers, cameras, etc.
29. Loss or theft of any Remote HSM Manager equipment MUST be investigated by the Security
Manager and any necessary remedial action MUST be immediately instigated.
30. The network communications link between the Operations Room and the secure area housing the
physical HSM MUST be secured to provide further protection for the system. Examples of such
protection include virtual private networks, firewalls, encrypted links, etc.
55
authorised state;
decimalisation tables;
2. Non-default security configuration settings MUST be approved, in writing, by the Security Manager.
Such approval SHOULD include a justification for the decision.
3. The temperature alarm and the movement alarm SHOULD be enabled, via the Advanced Settings
menu item.
4. Fraud detection SHOULD be enabled, via the Advanced Settings menu item. The fraud detection
parameters SHOULD be monitored to ensure that they are, and continue to be, appropriate for the
HSM environment.
5. A decision to disable the temperature or movement alarm or to disable fraud detection MUST be
approved, in writing, by the Security Manager. Such approval SHOULD include a justification for the
decision.
6. Host commands that are not required for operations MUST be disabled, via the Host Commands
menu item.
7. PIN block formats that are not required for operations SHOULD be disabled, via the PIN Blocks
menu item. In particular, PIN block formats that do not involve an account number MUST be
disabled unless needed.
8. A decision to enable (i.e. not disable) a host command or a PIN block format that is not an
operational requirement MUST be approved, in writing, by the Security Manager. Such approval
SHOULD include a justification for the decision.
9. All Remote HSM Manager activities and User Events SHOULD be audited by the HSM. These are
enabled via the Auditing menu item. As noted in HSM 8000 Remote HSM Manager Users Guide,
this may impact HSM performance and so the extent of auditable activity SHOULD be reviewed
from time to time.
10. Decisions regarding those Remote HSM Manager activities and User Events that are not to be
audited by the HSM MUST be approved, in writing, by the Security Manager. Such approval
SHOULD include a justification for the decision.
11. All configuration selections SHOULD be saved to files, via the Save Settings menu item. Back-up
copies of such files SHOULD be made.
56
Certificate Authority
The Certificate Authority (CA) is critical to the security of the Remote HSM Manager, although its
functions are not part of the Remote HSM Manager! All HSMs and all administrator and operator smart
cards used in the remote management solution must possess an RSA public/private key pair, with the
public key held in the form of a certificate signed by the CAs private key.
A one-off process to generate the CA public/private key pair is required, involving any HSM whose
firmware supports the remote management solution. This is achieved via the RI console command and
is described in detail in Chapter 3 of HSM 8000 Remote HSM Manager Installation Guide.
Thereafter, individual HSMs generate an RSA public/private key pair and the public key is signed using the
CA private key. The RH console command is used to generate an HSM key pair and is described in
detail in Chapter 4 of HSM 8000 Remote HSM Manager Installation Guide. Similarly, any of the HSMs
can be used to generate public/private key pairs for smart cards (with the public keys signed by the CA
private key) and the results written to the smart cards. This uses the RR console command and is
described in detail in Chapter 5 of HSM 8000 Remote HSM Manager Installation Guide.
The CA public key, in the form of a self-signed certificate, is loaded into each HSM and onto each smart
card as part of the above processes. A transport PIN is set for each smart card (administrator and
operator) as part of the RR command processing.
The use of the various public/private keys allows the creation of the Security Group and forms the basis
of secure communication between the Remote HSM Manager and the HSM(s).
The CA private key is stored on various smart cards (different from the administrator/operator cards)
via a (k, n)-threshold scheme 2 . The only restrictions on the values of the parameters k and n that
are enforced by the HSM are that 3 k n 9. The people responsible for the CA private key shares
are called shareholders.
Remote HSM Manager Administrators and Operators may act as shareholders, but there is no
requirement for them to do so. In general, the choice of shareholders will depend on the organisational
structure.
1. CA-related activities SHOULD take place in a secure area.
2. The Security Manager MUST take overall responsibility for all CA activities and MUST ensure that all
CA-related procedures are followed correctly.
3. The Security Manager MUST maintain a log of shareholder names and the corresponding card
number and share number; the log SHOULD be stored securely.
4. Shareholders MUST be fully briefed by the Security Manager with regard to their roles and
responsibilities.
5. Shareholders SHOULD sign affidavits stating that they understand their roles and responsibilities
with respect to their CA private key shares and that they will carry out their duties to the best of
their abilities.
6. The number of CA private key shares (the parameter n) MUST be such that adequate
contingency is provided in the event of a share card being lost or damaged. The parameters k and
2 A threshold scheme (also known as a secret sharing scheme) is a mechanism that allows a secret to be broken into
shares, so that the secret can be recovered provided a defined number of shares are available, yet no information about the
secret can be obtained if fewer than the required number of shares are presented. Threshold schemes provide a flexible
management solution for sensitive data, whilst at the same time providing an automatic back-up facility. In the case of the
Remote HSM Manager solution, the secret is the CA private key. A (k, n)-threshold scheme means that the secret is
broken into n shares and that the secret can be recovered provided k (different) shares are presented.
57
n SHOULD satisfy 2k n and there may be operational benefit in requiring that k divides n, thus
allowing teams of shareholders to be established.
7. When creating the CA, the CA parameters that provide the highest level of security SHOULD be
used.
Remark: Where a choice exists, the default selection provides the highest level security.
8. Shareholders MUST NOT have access to more than one CA private key share.
9. All shareholder smart cards MUST be protected by strong PINs. For example:
shareholders MUST NOT choose PINs that may be easily guessed by somebody else (e.g. date of
birth, telephone number, etc).
10. Shareholders MUST NOT divulge their smart card PINs to any other party.
11. Shareholders SHOULD change their PINs on a regular basis.
12. New shareholders who take ownership of an existing shareholder card MUST change the
shareholder cards PIN as soon as is practical.
13. All shareholder cards MUST be clearly labelled; as a minimum, the label MUST identify the card as a
shareholder card and the share number.
14. All shareholder cards MUST be stored securely when not in use.
15. Shareholder card PINs MUST be written down and stored securely, separate from the cards, and
separate from other shareholder card PINs.
16. The Security Manager MUST log all access to shareholder cards and PINs.
17. The Security Manager MUST know the location of all shareholder cards and the corresponding PINs
but MUST NOT have access to any of these items (unless, of course, he or she is a shareholder).
Remark: Once the CA private key shares are created there is no facility to create extra shares.
Should a shareholder leave the organisation, the existing shares can continue to be used if this is
deemed to be an acceptable risk. However, the new shareholder MUST change the shareholder card
PIN as soon as is practical.
18. A person who ceases to hold the role of shareholder MUST have their access rights to the share
card revoked immediately.
19. Shareholder cards MUST be tested regularly to ensure that they still function correctly.
20. A shareholder card that is no longer usable MUST be destroyed in a secure manner and a record of
such destruction MUST be retained by the Security Manager.
21. Administrator and operator cards that are created via the RR console command MUST be
distributed securely to the relevant Administrators and Operators and the recipients MUST
acknowledge receipt of the cards.
58
22. The transport PIN for the administrator and operator smart cards SHOULD be distributed
separately from the cards and, ideally, SHOULD NOT be sent until card receipt has been
acknowledged.
23. The Security Manager MUST retain a record of all HSMs and administrator and operator cards that
have been issued (i.e. a public/private key pair has been generated and the public key signed by the
CA private key).
59
shareholders MUST NOT choose PINs that may be easily guessed by somebody else (e.g. date of
birth, telephone number, etc).
9. RMK component holders MUST NOT divulge their smart card PINs to any other party.
10. RMK component holders SHOULD change their PINs on a regular basis.
60
11. All RMK component cards MUST be clearly labelled; as a minimum, the label MUST identify the card
as an RMK component card and the component number.
12. All RMK component cards MUST be stored securely when not in use.
13. RMK component card PINs MUST be written down and stored securely, separate from the cards.
14. The Security Manager MUST log all access to RMK component cards and PINs.
15. The Security Manager MUST know the location of all RMK component cards and the corresponding
PINs but MUST NOT have access to any of these items (unless, of course, he or she is an RMK
component holder).
16. If an RMK component holder leaves the organisation, the Security Manager MUST arrange for a new
RMK to be created and installed into the relevant HSMs, in order to replace the existing RMK.
17. A person who ceases to hold the role of RMK component holder MUST have their access rights to
the component card revoked immediately, and the Security Manager MUST arrange for a new RMK
to be created and installed into the relevant HSMs, in order to replace the existing RMK.
18. RMK component cards MUST be tested regularly to ensure that they still function correctly.
19. An RMK component card that is no longer usable MUST be destroyed in a secure manner and a
record of such destruction MUST be retained by the Security Manager.
61
shareholders MUST NOT choose PINs that may be easily guessed by somebody else (e.g. date of
birth, telephone number, etc).
7. Administrators and Operators MUST NOT divulge their smart card PINs to any other party.
8. Administrators and Operators SHOULD change their PINs on a regular basis.
9. All access to administrator and operator cards and PINs SHOULD be recorded by the Security
Manager.
10. Administrator and operator cards SHOULD be tested regularly to ensure that they still function
correctly.
11. An administrator or operator card that is no longer usable MUST be destroyed in a secure manner
and a record of such destruction MUST be retained by the Security Manager.
62
Operator Cards
Operators of the Remote HSM Manager carry out a range of sensitive functions, including key
management activities and functions that require the HSM to be in Authorised State. Operator cards
typically store Local Master Key (LMK) components and/or authorisation passwords. As such, the
security of the operator cards is critical to the security of the Remote HSM Manager.
In addition to the general security guidelines relating to administrator and operator cards, the following
guidelines apply specifically to operator cards:
1. LMK cards MUST be clearly labelled; as a minimum, the label MUST identify the LMK and the
component number.
2. Authorising password cards SHOULD be created and used for day-to-day operations; LMK cards
SHOULD NOT be used for day-to-day operations.
3. Authorising password cards MUST be clearly labelled; as a minimum, the label MUST indicate LMK
identifier and password number.
Remark: LMK and authorising password cards are specific to a particular LMK and so when multiple
LMKs are used, the labelling of the cards is crucial.
63
Security Group
The term Security Group describes a set of (administrator and operator) smart cards and a set of
HSMs, such that (secure) remote communication between a card in the group and an HSM in the group
is permitted. A necessary pre-requisite for a card and an HSM to be in the same Security Group is that
both must possess an RSA key pair, with the public key signed by the same CA private key.
As cards are added to the Security Group, their details (including public key certificates) are loaded into
the HSMs in the Security Group. Similarly, as HSMs are added to the Security Group, their details (serial
numbers and IP addresses) are stored on the cards. If a card does not contain details of a particular
HSM then communication between the two devices is not possible. The same applies if an HSM does
not contain the public key certificate for a card.
Details of the initialisation and management of the Security Group can be found in Chapter 8 of HSM
8000 Remote HSM Manager Installation Guide and Chapter 7 of HSM 8000 Remote HSM Manager
Users Guide.
1. The Security Manager MUST keep a record of all administrator and operator cards and HSMs that
belong to a particular Security Group; the record MUST be updated as new devices are added to, or
deleted from, the Security Group.
2. If an HSMs Security Group no longer exists, then to prevent confusion, the HSMs details SHOULD
be deleted from all the cards in that Security Group as soon as possible.
3. Details of a lost or stolen card MUST be deleted from all the HSMs in the cards Security Groups as
soon as possible.
64
Back-Up
All equipment, documentation and audit records relating to the Remote HSM Manager must be backedup.
1. All LMK component smart cards and corresponding PINs MUST be backed-up and stored securely,
separate from the primary cards; at least one back-up copy of each component SHOULD be stored
off-site.
2. All RMK component smart cards and corresponding PINs MUST be backed-up and stored securely,
separate from the primary cards; at least one back-up copy of each component SHOULD be stored
off-site.
3. At least one set of CA private key share cards that can be used to re-generate the CA private key
(i.e. k such cards) and the corresponding PINs SHOULD be stored securely off-site and at
different locations.
4. All documentation and audit records relating to the Remote HSM Manager MUST be backed-up and
at least one copy SHOULD be stored off-site.
5. Access control relating to all back-up equipment, documentation and audit records MUST be
equivalent in strength to the controls surrounding the primary items.
65
Operational Security
Details of Remote HSM Manager operations are given in HSM 8000 Remote HSM Manager Users Guide.
These should be complemented by an organisational security and operations document (see, for
example, the earlier section on Procedures). The following guidelines should be used in conjunction
with other guidelines in this document.
Remark: The key guidelines listed below do not attempt to define a key management policy (e.g. key
generation, distribution, update, archive, destruction, etc). Such a policy should already exist within the
organisation and so any of the particular guidelines below that relate to keys should be used to
complement this policy.
1. Administrators and Operators MUST be fully aware of, and follow, security procedures relating to
the operation of the Remote HSM Manager.
2. The Security Manager MUST ensure that all security procedures relating to the operation of the
Remote HSM Manager are followed correctly.
3. Users MUST take their smart cards with them if they exit the Operations Room.
4. Users MUST ensure that nobody else can observe the entry of a PIN at a smart card reader.
5. HSMs MUST NOT be placed in the off-line state or in secure mode for any longer than is absolutely
necessary to complete the required activity.
6. Users MUST NOT be logged into HSMs at the Security Officer level for any longer than is
absolutely necessary.
7. A time-out for user sessions SHOULD be specified.
8. HSMs MUST NOT be placed in Authorised State for any longer than is absolutely necessary to
complete the required activity.
9. A time-out for Authorised State SHOULD be specified.
10. If Multiple Authorised Activities has been configured for the HSMs (see, for example, the earlier
section on HSM Security Configuration), then activities that are not being used MUST NOT be
authorised.
11. LMKs (in particular, old LMKs) MUST be deleted from the HSM when no longer required.
12. Key block header values MUST be chosen with care.
13. Key block header values SHOULD be chosen to be as restrictive as possible for the particular key
type and key usage; special attention SHOULD be given to:
key usage;
mode of use;
exportability.
Remark: Some changes to key block header values are permitted (via a host command), but only
to restrict key usage further. For example, a key initially designated as a MAC generate and verify
key can later have its header changed to make it a MAC generate only key, but the reverse change
is not permitted. Similarly, if a key is designated as non-exportable then it cannot later be changed
to exportable.
66
14. A plaintext key component displayed on the PC/laptop screen MUST NOT be viewed by anybody
other then the operator who generated the component.
15. Plaintext key components SHOULD NOT be saved to file, except for the purpose of printing the
components, after which the file MUST be deleted.
16. The half or third method of forming a key from components SHOULD NOT be used.
17. All error conditions and other incidents relating to any aspect of Remote HSM Manager
operations MUST be recorded in a paper-based incident log (see also the earlier section on Audit),
and passed to an incident management process for further investigation
18. The network communications link between the Operations Room and the secure area housing the
physical HSM MUST be regularly inspected and tested to ensure that it provides sufficient protection
against intrusion and unauthorised access.
67