Security in Operation

This section addresses actions and settings with security-related implications.

>Tamper Events

>Security Effects of Administrative Actions

Refer also to Security of Your Partition Challenge.

Tamper Events

Luna USB HSM 7 detects hardware anomalies (such as card over-temperature) and registers them as tamper events.

Tamper event Response
Over/under temperature

Halt the HSM. Deactivate activated partitions.

Decommission the HSM if policy 40: Decommission on Tamper is enabled.

Warnings are logged for mild over/under temperature events. Warnings are self-clearing if the condition is resolved.

Over/under voltage

Halt the HSM. Deactivate activated partitions.

Decommission the HSM if policy 40: Decommission on Tamper is enabled.

Warnings are logged for mild over/under voltage events. Warnings are self-clearing if the condition is resolved.

Recovering from a Tamper Event

If you are using activation on your multifactor quorum-authenticated partitions, it is disabled when a tamper is detected, or if any uncleared tamper conditions are detected on reboot. See Activation on Multifactor Quorum-Authenticated Partitions and Partition Capabilities and Policies for more information.

To recover from a tamper

1.View the output of lunacm:> slot list (displayed by default on login). The reason for the tamper is indicated by the HSM Status field. You can also use lunacm:> hsm tampershow to display the last tamper event.

NOTE   The slot list and hsm tampershow commands only show the last tamper event, even if several tampers have occurred.

2.Resolve the issue(s) that caused the tamper event.

3.If the tamper message indicates that a reset is required, exit LunaCM and use the lunareset utility to reset the HSM.

lunareset <device>

4.Verify that all tampers have been cleared:

lunacm:> hsm tampershow

5.If the Policy 22: Allow Activation and/or Policy 23: Allow AutoActivation are enabled on your multifactor quorum-authenticated partitions, the CO and CU (if enabled) must log in to reactivate those roles:

lunacm:> role login -name <role>

Security Effects of Administrative Actions

Actions that you take, in the course of administering your Luna HSM, can have effects, including destruction, on the roles, the spaces, and the contents of your HSM and its application partition(s). It is important to be aware of such consequences before taking action.

Overt Security Actions

Some actions in the administration of the HSM, or of an application partition, are explicitly intended to adjust specific security aspects of the HSM or partition. Examples are:

>Changing a password

>Modifying a policy to make a password or other attribute more stringent than the original setting

Those are discussed in their own sections.

Actions with Security- and Content-Affecting Outcomes

Other administrative events have security repercussions as included effects of the primary action, which could have other intent. Some examples are:

>HSM factory reset

>HSM zeroization

>Change of a destructive policy

>HSM initialization

>Application partition initialization

This table lists some major administrative actions that can be performed on the HSM, and compares relevant security-related effects. Use the information in this table to help decide if your contemplated action is appropriate in current circumstances, or if additional preparation (such as backup of partition content, collection of audit data) would be prudent before continuing.

Factory Reset HSM

Domain Destroyed
HSM SO Role Destroyed
Partition SO Role Destroyed
Auditor Role Destroyed
Partition Roles Destroyed
HSM or Partition/Contents HSM/Destroyed
HSM Policies Reset
RPV Destroyed

Messaging

You are about to factory reset the HSM. All contents of the HSM will be destroyed. HSM policies will be reset and the remote PED vector will be erased.

Zeroize HSM

Domain Destroyed
HSM SO Role Destroyed
Partition SO Role Destroyed
Auditor Role Unchanged
Partition Roles Destroyed
HSM or Partition/Contents HSM/Destroyed
HSM Policies Unchanged
RPV Unchanged

Messaging

You are about to zeroize the HSM. All contents of the HSM will be destroyed. HSM policies, remote PED vector and Auditor left unchanged.

Change Destructive HSM Policy

Domain Unchanged
HSM SO Role Unchanged
Partition SO Role Destroyed
Auditor Role Unchanged
Partition Roles Destroyed
HSM or Partition/Contents HSM/Destroyed
HSM Policies Unchanged except for new policy
RPV Unchanged

Messaging

You are about to change a destructive HSM policy. All partitions of the HSM will be destroyed.

HSM Initialize When Zeroized (hard init)

Domain Destroyed
HSM SO Role Destroyed
Partition SO Role Destroyed
Auditor Role Unchanged
Partition Roles Destroyed
HSM or Partition/Contents HSM/Destroyed
HSM Policies Unchanged
RPV Unchanged

Messaging

You are about to initialize the HSM. All contents of the HSM will be destroyed.

HSM Initialize From Non-Zeroized State (soft init)

Domain Unchanged
HSM SO Role Unchanged
Partition SO Role Destroyed
Auditor Role Unchanged
Partition Roles Destroyed
HSM or Partition/Contents HSM/Destroyed
HSM Policies Unchanged
RPV Unchanged

Messaging

You are about to initialize the HSM that is already initialized. All partitions of the HSM will be destroyed. You are required to provide the current SO password.

Partition Initialize When Zeroized (hard init)

Domain Unchanged
HSM SO Role Unchanged
Partition SO Role Destroyed
Auditor Role Unchanged
Partition Roles Destroyed
HSM or Partition/Contents Partition/Destroyed
HSM Policies Unchanged
RPV Unchanged

Messaging

You are about to initialize the partition. All contents of the partition will be destroyed.

Partition Initialize From Non-Zeroized State (soft init)

Domain Unchanged
HSM SO Role Unchanged
Partition SO Role Destroyed
Auditor Role Unchanged
Partition Roles Destroyed
HSM or Partition/Contents Partition/Destroyed
HSM Policies Unchanged
RPV Unchanged

Messaging

You are about to initialize the partition that is already initialized. All contents of the partition will be destroyed. You are required to provide the current Partition SO password.

Elsewhere

Certain other actions can sometimes cause collateral changes to the HSM, like firmware update. They usually do not affect contents, unless a partition is full and the action changes the size of partitions or changes the amount of space-per-partition that is taken by overhead/infrastructure. These are discussed elsewhere.