Table of Contents Table of Contents List of Tables Title and Copyright Information Preface Documentation Accessibility Related Documentation Diversity and Inclusion 1 Secure Installation and Configuration General Security Principles Understand Your Environment Recommended Deployment Topologies Securely Install the Key Management Appliance Considerations When Installing OKM Characteristics of Hardened KMAs Network Connections and the KMA 2 Security Features Authentication Access Control Users and Role-Based Access Control Quorum Protection Audits Secure Communication Hardware Security Module AES Key Wrapping Key Replication Solaris FIPS 140-2 Security Policies Software Upgrades Remote Syslog Hardware Management Pack 3 Encryption Endpoints (Agents) Potential Threats Encryption Endpoint Tools A Secure Deployment Checklist