Product Documentation

Recovering keys in SAKA is a matter of recovering the encrypted files and database backup from your backup library. As long as the TPM is not reinitialized, it can decrypt keys restored from backup tapes and continue providing cryptographic services to applications as before.

The only keys requiring specific recovery steps are the HRK and EDKs of HSM-based appliances. This process depends on the manufacturer of the HSM. Refer to the HSM vendor's documentation supplied with SAKA for details on key backup and recovery on the HSM.