Table of Contents Table of Contents List of Tables Title and Copyright Information Preface Documentation Accessibility Related Documentation 1 Secure Installation and Configuration General Security Principles Understand Your Environment Recommended Deployment Topologies Securely Install the Key Management Appliance Considerations When Installing OKM Characteristics of Hardened KMAs TCP/IP Connections and the KMA 2 Security Features Authentication Access Control Users and Role-Based Access Control Quorum Protection Audits Secure Communication Hardware Security Module AES Key Wrapping Key Replication Solaris FIPS 140-2 Security Policies Software Upgrades Remote Syslog Hardware Management Pack 3 Encryption Endpoints (Agents) Potential Threats Encryption Endpoint Tools Management Endpoint Tools A Secure Deployment Checklist