Previous Topic: Command Protection

Next Topic: DISPLAY ACTIVE Command—Display Encryption Activity

COMPROMISE Command-Flag Compromised Symmetric Keys or Code Books

Use the COMPROMISE command to indicate that a symmetric key or code book has been compromised and that you should stop using the key or code book to encrypt data. This command marks the active instance of the specified key or codebook in the database as compromised and deactivates it. The next pre-generated key is promoted to active status. For code books, the book is immediately rebuilt. For symmetric keys, a new key is generated to keep the number of key generations at the level specified by the NumberOfGenerations attribute. The compromised key or code book is retained for decrypting any data that was already encrypted with this key or code book.

This command has the following format:

BESn COMPROMISE=keyname|codebook|,ALL
n

Indicates the BES task number.

keyname

Specifies the keyname of the active instance of the compromised key. When you use this value without the ,ALL option, only the currently active version of the key is flagged as compromised.

Note: Application keys managed by the Option for Application Management for external applications have the fixed key names APIDESKEY and APIAESKEY.

codebook

Specifies the code book name of the active code book that is considered to be compromised. The ,ALL option is ignored if this option is specified.

,ALL

(Optional) Specifies all the versions of the key indicated by the keyname value. This option flags as compromised all the keys referred to by the specified keyname. Any pre-generated keys that were reserved for future use are deleted. A new set of keys is generated to replace them, including a new current key.

Note: You should back up the mirror database immediately and send a copy to your disaster recovery site to ensure that you have all of your keys in the event of a disaster.

Limits: If you are using your security system to control access to CA Tape Encryption commands, all forms of this command can be controlled by a command protection profile.

Default: keyname

Example: COMPROMISE=keyname command

This example flags as compromised the currently active symmetric key named HRKEY in the BES2 task. A new version of the key will be generated for future encryption requests that specify this keyname. The compromised key is retained for decrypting data that was encrypted using this key.

BES2 COMPROMISE=HRKEY

Example: COMPROMISE=keyname,ALL command

This example flags as compromised all versions of the symmetric key named HRKEY in the BES2 task. All instances of the named key are marked as compromised. If the number of keys specified in the NumberOfGenerations attribute is n, then n + 1 new instances of the key are automatically generated.

BES2 COMPROMISE=HRKEY,ALL

Example: COMPROMISE=codebook command

This example flags as compromised the code book named Business_Partner_3.

BES2 COMPROMISE=Business_Partner_3