Tool/software:
Hi Team,
We face some difficulties in understanding how backup key is implemented,
Q1. As per the documents we must always generate the backup key in advance and safely store it in OTP. If we suffer e.g. key theft, then most probably both keys will be compromised unless
we store the backup key at different physical and logical locations , please help me to understand theoretically .
Q2. How is it feasible for the TISCI API to (excess/write )the OTP region and instruct to utilize a backup key? Is this type of data saved elsewhere in HSM?
Regards,
-RJ