Hardware Controller Create Security Key

From OSNEXUS Online Documentation Site
Jump to: navigation, search
Qs hwc create securitykey.png

The "Create Hardware Controller Security Key" feature in QuantaStor serves the purpose of generating a security key for hardware RAID controllers used within the storage environment. Hardware RAID controllers are devices responsible for managing RAID (Redundant Array of Independent Disks) configurations and disk arrays for data storage and redundancy. For controllers like the LSI MegaRAID and OEM derivatives that support LSI Safestore which have hardware encryption support you can assign a key to the controller which will be used to encrypt the data. Self Encrypting Drives (SED) drives, also known as Full Drive Encryption (FDE) are required for hardware encryption so be careful to order the correct model of drive as many manufacturers make specific models which have encryption support.

The purpose of creating a hardware controller security key includes:

  • Data Security: Hardware RAID controllers often support security features such as disk encryption or access controls. Creating a hardware controller security key enables administrators to enhance data security by encrypting data stored on disks managed by the RAID controller. The security key is used to encrypt and decrypt data, ensuring data confidentiality and protection against unauthorized access.
  • Data Protection: Hardware RAID controllers utilize RAID configurations to protect data against disk failures and ensure data availability. By creating a security key, administrators can further enhance data protection by encrypting data stored on RAID volumes. This protects sensitive data from potential security threats, data breaches, or unauthorized access attempts.
  • Compliance Requirements: Many industries and organizations have regulatory compliance requirements or data protection mandates that dictate the use of encryption for sensitive data. Creating a hardware controller security key allows organizations to comply with regulatory requirements by encrypting data stored on RAID volumes managed by the RAID controller.
  • Access Control: Hardware controller security keys can be used to implement access controls for RAID volumes, limiting access to authorized users or systems with the appropriate security credentials. Administrators can configure access policies and authentication mechanisms based on the security key, ensuring that only authorized users or systems can access encrypted data.
  • Data Privacy: Creating a hardware controller security key helps protect data privacy by encrypting sensitive information stored on RAID volumes. This ensures that even if physical disks are compromised or removed from the RAID controller, the data remains encrypted and inaccessible without the corresponding security key, safeguarding data privacy and confidentiality.
  • Risk Mitigation: Encrypting data with a hardware controller security key mitigates the risk of data breaches, unauthorized access, or data theft by rendering the data unreadable without the encryption key. This helps organizations mitigate risks associated with data security and protect sensitive information from potential security threats or vulnerabilities.

Overall, the purpose of creating a hardware controller security key in QuantaStor is to provide administrators with a robust data security mechanism for encrypting data stored on RAID volumes managed by hardware RAID controllers. This feature enhances data security, protects against data breaches, ensures compliance with regulatory requirements, and mitigates risks associated with data privacy and confidentiality within the storage environment.


Navigation: Storage Management --> Controllers & Enclosures --> [target controller] --> Create Security Key (rightclick)


Return to the QuantaStor Web Admin Guide