Video Tutorial 

Overview


This topic explains how to create a symmetric encryption key inside of the Vormetric Data Security Manager (DSM).


Prerequisites


Before you begin, you must be able to:  


Create a Symmetric Encryption Key

  1. Log in as the Security Administrator.
  2. At the top, click Keys. For the purpose of this exercise, you can disregard the drop-down menu items.



  3. After you click Keys, the window below appears. For now, the only key that should appear is clear_key



  4.  Click Add on either the top or bottom of the window.  



  5. In Name, enter a descriptive name. This name appears when you search through the list of keys used in your policies. This name also appears in your host if you run the secfsd -status GuardPoint command. 



  6. (Optional) In Description, enter additional details for identification and usage purposes.
  7. In Template, the default selection is Choose One. Armor recommends that you keep the default selection. 



  8. In Algorithm, there is the AES256 and AES218 option. For your reference, Advanced Encryption Standard with a 256-bit key (AES256) has a higher level of data security than the DSM default of AES128, while still maintaining low performance overhead. 



  9. In Key Type, select where you want to store the key. There are two options.
  10. (Optional) You can check the Unique to Host box if you want to restrict the key usage to a single host. This option is not commonly used because backups and restores are more complicated when you manage multiple keys.
  11. In Key Creation Method, the default selection is Generate. Armor recommends that you keep the default selection. This option automatically generates a key using a random seed.
  12. In Expiry Date, you can set the expiration date and a reminder to rekey at a specified time. This option is rarely used; however, this option may be needed to fulfil stricter compliance mandates.
  13. In Key Refreshing Period (minutes), the default selection is 10080. Armor recommends that you keep the default selection.


Next Steps

Next, Vormetric Policy Planning.