ciphertrust cloud key manager installation · the ciphertrust cloud key manager installation...

2
During the execution of the installation Thales will: Configure up to two Vormetric Data Security Manager(s) (2) (DSMs) to be used as a secure key source for CipherTrust Cloud Key Manager (CCKM). Assist customer in installation and configuration of the product on a customer-providd server utilizing either a customer-provided MongoDB environment or the internal MongoDB provided with CipherTrust Cloud Key Manager. Assist customer in configuration of up to one (1) security blade (cloud key management service) within CipherTrust Cloud Key Manager. This engagement will provide the following deliverables: Installation of one (1) CCKM instance in the Customer’s target environment. Validation of Installation. During the course of this engagement, Thales will work with customer to deploy CCKM in the target environment. The following items must be completed by Customer prior to Services scheduling: Setup DSMs and have basic SSH connectivity to them. Firewall rules will be in place before professional services are scheduled. Update DNS with all DSMs FQDN and IP addresses. Configure Networking in order to have connectivity between the DSMs, CipherTrust Cloud Key Manager virtual machine, and target cloud environments. Services and Deliverables will be performed via remote delivery (e.g. WebEx), based on phases as defined above. The CipherTrust Cloud Key Manager Installation engagement quickly deploys the on-premises offering of CipherTrust Cloud Key Manager within a customer environment. A Thales consultant will provide a basic overview of the product and deploy the solution with the Customer participating. CipherTrust Cloud Key Manager Installation Service Description

Upload: vanthuy

Post on 24-Aug-2019

239 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CipherTrust Cloud Key Manager Installation · The CipherTrust Cloud Key Manager Installation engagement quickly deploys the on-premises offering of CipherTrust Cloud Key Manager within

During the execution of the installation Thales will:

• Configure up to two Vormetric Data Security Manager(s) (2) (DSMs) to be used as a secure key source for CipherTrust Cloud Key Manager (CCKM).

• Assist customer in installation and configuration of the product on a customer-providd server utilizing either a customer-provided MongoDB environment or the internal MongoDB provided with CipherTrust Cloud Key Manager.

• Assist customer in configuration of up to one (1) security blade (cloud key management service) within CipherTrust Cloud Key Manager.

This engagement will provide the following deliverables:

• Installation of one (1) CCKM instance in the Customer’s target environment.

• Validation of Installation.

During the course of this engagement, Thales will work with customer to deploy CCKM in the target environment.

The following items must be completed by Customer prior to Services scheduling:

• Setup DSMs and have basic SSH connectivity to them.

• Firewall rules will be in place before professional services are scheduled.

• Update DNS with all DSMs FQDN and IP addresses.

• Configure Networking in order to have connectivity between the DSMs, CipherTrust Cloud Key Manager virtual machine, and target cloud environments.

• Services and Deliverables will be performed via remote delivery (e.g. WebEx), based on phases as defined above.

The CipherTrust Cloud Key Manager Installation engagement quickly deploys the on-premises offering of CipherTrust Cloud Key Manager within a customer environment. A Thales consultant will provide a basic overview of the product and deploy the solution with the Customer participating.

CipherTrust Cloud Key Manager InstallationService Description

Page 2: CipherTrust Cloud Key Manager Installation · The CipherTrust Cloud Key Manager Installation engagement quickly deploys the on-premises offering of CipherTrust Cloud Key Manager within

• Customer Project Team has access to obtain accurate list of all cloud credentials required for configuration and operation of selected CipherTrust Cloud Key Manager security blades.

• Customer will make systems available to Thales during the scheduled professional services hours of 8:30 am to 6:00 pm in the Customer’s time zone.

• Access to all key personnel to configure CCKM servers including:

• DSM administrator

• Server system administrators

• Cloud Environment credentials and expertise (e.g. AWS, SFDC)

About Thales eSecurityThe people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced with an increasing amount of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.

Decisive technology for decisive moments.

© T

hale

s - A

pril

2019

• LB

004

1

> thalesesecurity.com <

Americas – Thales eSecurity Inc. 2860 Junction Ave, San Jose, CA 95134 USA • Tel:+1 888 744 4976 or +1 954 888 6200 • Fax:+1 954 888 6211 • E-mail: [email protected] Pacific – Thales Transport & Security (HK) Lt, Unit 4101-3, 41/F, Sunlight Tower, 248 Queen’s Road East, Wanchai, Hong Kong • Tel:+852 2815 8633 • Fax:+852 2815 8141 • E-mail: [email protected], Middle East, Africa – Meadow View House, Long Crendon, Aylesbury, Buckinghamshire HP18 9EQ • Tel:+44 (0)1844 201800 • Fax:+44 (0)1844 208550 • E-mail: [email protected]

Thales will perform this service either remotely, or on-site. Any travel, lodging, or sustenance expenses for on-site service delivery are NOT included in the scope or price of this service offering. The Customer agrees to reimburse Thales for reasonable travel costs incurred during the execution of this Service Offering. This service must be scheduled as consecutive work days.

This Service Description incorporates by reference and is governed by all of the terms and conditions contained in the Professional Services Terms and Conditions, which can be obtained from go.thalesesecurity.com/rs/480-LWA-970/images/psterms.pdf, unless the Customer has an existing Master Services Agreement (“MSA”), in which case the terms of that agreement shall govern.

This Service Description is the property of Thales; the contents herein are the intellectual property and copyright of Thales. Disclosure of this document and its contents herein does not grant or construe any transfer or other rights in relation to Thales intellectual property.

SKU: PS-VOR-CCKM Copyright ©2019 Thales eSecurity, Inc. All Rights Reserved.