Creating a Cloud VM Set

A VM must be part of a Cloud VM Set before it can be encrypted. The set controls global options for the VMs it contains. It also allows you to enable the BoundaryControl feature that uses Policy Rules and constraints in HyTrust CloudControl (HTCC) to authenticate and authorize delivery of encryption keys for the data encrypted by the HyTrust DataControl Policy Agent and managed by KeyControl.

Before You Begin 

  • If you want to use a Key Encryption Key (KEK) with the Cloud VM Set, KeyControl must have access to a hardware security module (HSM) in which it can store the KEK. For more information, see KEKs with Cloud VM Sets and Hardware Security Modules with KeyControl.

    Note: If you are using IBM Hyper Protect Crypto Services (HPCS), the KEK is not stored in the HSM.

  • If you are using the BoundaryControl feature, make sure you know the URL or IP address of the CloudControl server you want to use. A link between KeyControl and the CloudControl server must already be established before you can use it in the Cloud VM Set. For details about establishing the link, see Linking KeyControl with CloudControl.

    Important: You cannot change whether the BoundaryControl feature is enabled or disabled after you have created the Cloud VM Set. If you do not select a CloudControl server link during this procedure, you cannot go back and add one. Conversely, if you do select a link you cannot go back and disable BoundaryControl later.

Procedure 

  1. Log into the KeyControl webGUI using an account with Cloud Admin privileges.

  2. In the top menu bar, click Cloud.
  3. Select Actions > Create New Cloud VM Set.
  4. On the VM Set tab:
    1. Enter a name for the Cloud VM Set.
    2. Select the group to which this set should belong.
    3. Optionally enter a description for the set.
    4. If you want to use the BoundaryControl feature, select the CloudControl app server link that you want to use from the drop-down list. You can change the server link after you save the Cloud VM Set but you cannot enable BoundaryControl later if you do not select a server at this point.

  5. If you want to specify additional options, click the Additional Properties tab specify the options you want to use.

  6. If you want to specify when the VMs in the Cloud VM Set need to be re-authenticated, click the Reauthentication Settings tab and specify the options you want to use.

  7. If you want to specify a key encryption key (KEK), click the Key Encryption Key tab, choose the type of Key Encryption Key Association, and then specify the required information.

    A KEK provides an extra layer of security by encrypting the individual data encryption keys on the VMs associated with this Cloud VM Set. It also controls the expiration and revocation of those data encryption keys. To protect the KEK, KeyControl requires that the KEK be stored in the hardware security module (HSM) associated with this KeyControl cluster. For more information, see KEKs with Cloud VM Sets.

    Note: If you are using IBM HPCS (Hyper Protect Crypto Services), the KEK is not stored in the HPCS HSM.

    You cannot change whether the Cloud VM Set uses a KEK, or what type of KEK, after the Cloud VM Set has been created.

    Important: For an HPCS KEK, you must specify the HPCS server information when you create the Cloud VM Set.

    1. Determine whether KeyControl creates a KEK for this Cloud VM Set. Choose one of the following: 

      • Select Use KEK from the drop-down list and click Save to view the KEK properties.
      • Select Use HPCS KEK from the drop-down list and click Save to view the HPCS KEK properties.

      If you do not make a selection, then the default value is No KEK Association is used, and the tab is not populated.

    2. Complete the required information for your choice: 

  8. If you want the VMs in this Cloud VM Set to use a Single Encryption Key (SEK), click the Single Encryption Key tab specify the required information.

    If you enable this option, all the VMs registered with the Cloud VM Set will be encrypted with the same encryption key, and the key's expiry date and expiration option will be set at the Cloud VM Set level instead of at the disk level. Using a SEK enables data deduplication because identical blocks at the same offset will be encrypted with the same key and will therefore still be identical after encryption. For details, see Data Deduplication with Cloud VM Sets.

  9. If you want to want KeyControl to store the keys for VMs in this Cloud VM Set in an Ionic Keyspace, click the Ionic Properties tab and specify the options you want to use. For details about using KeyControl with Ionic, contact HyTrust support.
  10. When you have finished specifying the Cloud VM Set options, click Create.
  11. When you see the Cloud VM Set Successfully Created message, click Close.