Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 Seagate® Momentus ® Thin Self-Encrypting Drives TCG Opal FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 – Aug 30, 2010 Seagate Technology, LLC Page 1 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 Table of Contents 1 Introduction ........................................................................................................................................................................... 3 1.1 Scope............................................................................................................................................................................. 3 1.2 Security Levels ............................................................................................................................................................. 3 1.3 References..................................................................................................................................................................... 3 1.4 Acronyms ...................................................................................................................................................................... 3 2 Cryptographic Module Description ..................................................................................................................................... 5 2.1 Overview....................................................................................................................................................................... 5 2.2 Logical to Physical Port Mapping ............................................................................................................................... 5 2.3 Hardware and Firmware Versions............................................................................................................................... 5 2.4 FIPS Approved Algorithms ......................................................................................................................................... 6 2.5 Self-Tests ...................................................................................................................................................................... 6 2.6 FIPS 140 Approved Modes of Operation ................................................................................................................... 6 2.6.1 ATA Enhanced Security Mode (SOM1) ............................................................................................................ 6 2.6.2 TCG Opal Security Mode (SOM2)..................................................................................................................... 7 2.7 User Data Cryptographic Erase Methods.................................................................................................................... 7 2.8 Revert SP Methods ....................................................................................................................................................... 7 2.9 Shadow MBR (in SOM2 Only)................................................................................................................................... 7 3 Identification and Authentication (I&A) Policy ................................................................................................................. 8 3.1 Operator Roles .............................................................................................................................................................. 8 3.1.1 Crypto Officer Roles............................................................................................................................................ 8 3.1.2 User Roles............................................................................................................................................................. 8 3.1.3 Unauthenticated Role........................................................................................................................................... 8 3.2 Authentication............................................................................................................................................................... 8 3.2.1 Authentication Types ........................................................................................................................................... 8 3.2.2 Authentication in ATA Enhanced Security Mode ............................................................................................. 8 3.2.3 Authentication in TCG Opal Security Mode...................................................................................................... 9 3.2.4 Authentication Mechanism, Data and Strength.................................................................................................. 9 3.2.5 Personalizing Authentication Data...................................................................................................................... 9 4 Access Control Policy ........................................................................................................................................................ 10 4.1 Services ....................................................................................................................................................................... 10 4.2 Cryptographic Keys and CSPs................................................................................................................................... 13 4.3 Non-Critical Security Parameters.............................................................................................................................. 15 5 Physical Security................................................................................................................................................................. 15 5.1 Mechanisms ................................................................................................................................................................ 15 5.2 Operator Requirements .............................................................................................................................................. 16 6 Operational Environment ................................................................................................................................................... 17 7 Security Rules ..................................................................................................................................................................... 17 7.1 Secure Initialization.................................................................................................................................................... 17 7.2 Ongoing Policy Restrictions ...................................................................................................................................... 17 8 Mitigation of Other Attacks Policy.................................................................................................................................... 17 Page 2 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 1 Introduction 1.1 Scope This security policy applies to the FIPS 140-2 Cryptographic Module (CM) embedded in Seagate® Momentus ® Thin TCG Opal Self-Encrypting Drive products. This document meets the requirements of the FIPS 140-2 standard (Appendix C) and Implementation Guidance (section 14.1). It does not provide interface details needed to develop a compliant application. This document is non-proprietary and may be reproduced in its original entirety. 1.2 Security Levels Requirement Area Level Cryptographic Module Specification 2 Cryptographic Module Ports and Interfaces 2 Roles, Services and Authentication 2 Finite State Model 2 Physical Security 2 Operational Environment N/A Cryptographic Key Management 2 Electromagnetic Interface / Electromagnetic Compatibility (EMI / EMC) 3 Self – tests 2 Design Assurance 2 Mitigation of Other Attacks N/A 1.3 References 1. FIPS PUB 140-2 2. Derived Test Requirements for FIPS PUB 140-2 3. Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program 4. TCG Storage Security Subsystem Class: Opal, Specification Version 1.00, Revision 3.00, February 4, 2010 5. TCG Storage Architecture Core Specification, Specification Version 2.00 Final, Revision 1.0, April 20, 2009 6. TCG Storage Interface Interactions Specification, Specification Version 1.0, January 14, 2009 7. ATA-8 ACS 8. Serial ATA Rev 2.6 (SATA) 1.4 Acronyms AES Advanced Encryption Standard (FIPS 197) CBC Cipher Block Chaining, an operational mode of AES CM Cryptographic Module CO Crypto-officer CSP Critical Security Parameter MEK Media Encryption Key FIPS 140 FIPS 140-2 HDA Head and Disk Assembly HDD Hard Disk Drive IV Initialization Vector for encryption operation LBA Logical Block Address KAT Known Answer Test MBR Master Boot Record MSID Manufactured SID, public drive-unique value that is used as default PIN, TCG term POR Power-on Reset (power cycle) POST Power on Self-Test Page 3 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 PSID Physical SID, public drive-unique value RNG Random Number Generator SED Self-Encrypting Drive, Seagate HDD products that provide HW data encryption. SID Security ID, PIN for Drive Owner CO role, TCG term SoC System-on-a-Chip SOM Security Operating Mode SP Security Provider or Security Partition (TCG), also Security Policy (FIPS 140) Page 4 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 2 Cryptographic Module Description 2.1 Overview The Seagate Momentus Thin Self-Encrypting Drive (SED) TCG Opal FIPS 140 Module is embedded in Seagate Momentus Thin SED model disk drives. The cryptographic module (CM) provides a wide range of cryptographic services using FIPS approved algorithms. Services include hardware-based data encryption, instantaneous user data disposal with cryptographic erase, independently controlled and protected user data LBA ranges, and authenticated FW download. The services are provided through an industry-standard TCG Opal SSC interface. The CM is a multiple-chip embedded physical embodiment. The physical interface to the CM is the SATA connector and jumper block pins. The logical interface is the industry-standard ATA (7), TCG SWG (5), and Opal SSC (4) protocols, carried on the SATA transport interface (8). The primary function of the module is to provide data encryption, access control and cryptographic erase of the data stored on the hard drive media. The human operator of the drive product interfaces with the CM through a “host” application on a host system. The CM functionality is implemented in the ASIC, Serial Flash, SDRAM and firmware. Each of these components additionally provides non-security functionality that is logically isolated from the security functions. The drive media provides the non-volatile storage of the keys, CSPs and FW. This storage is in the “system area” of the media which is not logically accessible / addressable by the host application. The ASIC is an SoC which has the following major logical functions: host interface using an industry standard SATA interface, a RW Channel interface to the HDA, interface to media motor controller, data encryption engine, and processing services which execute the firmware. An Approved Security Function, AES-128, is implemented in the data encryption engine. During drive operation, the SDRAM hosts the firmware and the encrypted user data being transferred between the media and the ASIC. The firmware is logically separated into four groups: ATA interface, Security, Servo, and Read/Write. The FIPS 140 services are isolated in the Security section of the firmware. Security functions fall into two categories. At-rest data is transferred to/from the drive’s media and encrypted/decrypted using ATA write/read commands respectively. Other security operations, including authentication and management of cryptographic secrets, are accessed using ATA Trusted Send/Receive commands. These commands are actually wrappers for another industry standard protocol: TCG Opal. The security services provided by the CM through the TCG protocol correspond to the methods of the following TCG SP Templates: Base, Admin, Locking, and Crypto. Some of the TCG-based services are specific to the Seagate implementation and are described in detail in product documentation. 2.2 Logical to Physical Port Mapping FIPS 140-2 Interface Module Ports Data Input SATA Connector Data Output SATA Connector Control Input SATA Connector Status Output SATA Connector Power Input Power Connector 2.3 Hardware and Firmware Versions The Momentus® SED Drives, FIPS 140 Module has been validated in six configurations: 1. Model ST320LT009: HW ver 9WC142, FW ver 1003HPMA 2. Model ST320LT009: HW ver 9WC142, FW ver 1002HPBA 3. Model ST320LT009: HW ver 9WC142, FW ver 1001DEMA 4. Model ST250LT009: HW ver 9WC14C, FW ver 1001DEMA 5. Model ST320LT009: HW ver 9WC142, FW ver 1001SDMA 6. Model ST250LT009: HW ver 9WC14C, FW ver 1001SDMA Page 5 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 The configurations vary by storage capacity and customer-unique FW differences which do not involve FIPS services. 2.4 FIPS Approved Algorithms Algorithm Certificate Number ASIC AES #1392 Firmware AES #1341 RSA #648 SHA #1223 FIPS 186-2 PRNG #737 2.5 Self-Tests Function Tested Self-Test Type Implementation Failure Behaviour ASIC AES Power-On Encrypt and Decrypt KAT performed Enters FIPS Self Test Fail State Firmware AES Power-On Encrypt and Decrypt KAT performed Enters FIPS Self Test Fail State RSA Power-On Verify KAT performed. Enters FIPS Self Test Fail State SHA-1 Power-On Digest KAT performed Enters FIPS Self Test Fail State SHA-256 Power-On Digest KAT performed Enters FIPS Self Test Fail State FIPS 186-2 PRNG Power-On PRNG KAT performed Enters FIPS Self Test Fail State Firmware Integrity Power-On 16-bit CRC and ECC Enters FW Integrity Error State Check Firmware Load Conditional: When RSA PKCS#1 signature verification of Firmware download is aborted. Check new firmware is new firmware image is done before it downloaded can be loaded. FIPS 186-2 PRNG Conditional: When Newly generated random number is Enters FIPS Self Test Fail a random number is compared to the previously generated State. generated random number. Test fails if they are equal. 2.6 FIPS 140 Approved Modes of Operation Before the operator performs the Secure Initialization steps detailed in Section 7.1, the drive will operate in a non FIPS compliant mode (Security Operating Mode 0, i.e. SOM0). From this mode, the operator may choose to initialize the CM to operate in either the ATA Enhanced Security Mode (SOM1) or TCG Opal Security Mode (SOM2). Both of these modes are FIPS compliant modes and after setting up (configuring) the module per the Security Rules of this policy, an operator can switch between the modes. Details on these SOM modes and how they can transition from one to the other can be found in the product documentation. The module’s FIPS modes of operation are enforced through configuration and policy. Violating these ongoing policy restrictions (detailed in Section 7.2) would mean that one is no longer using the drive in a FIPS compliant mode of operation. The operator can determine if the CM is operating in a FIPS approved mode by invoking the Show Status service( refer to Section 4.1) 2.6.1 ATA Enhanced Security Mode (SOM1) This mode provides services through industry-standard ATA commands, and TCG Opal commands addressed to the TCG Admin SP. Some of the services are based on the ATA Security Feature set but with vendor-unique extensions (e.g. encryption of user data on media). Other services are based on the TCG Opal commands. To operate in SOM1, the ATA User must do a Set PIN from SOM0 mode. This mode corresponds to having a deactivated TCG Opal Locking SP. SOM1 implements the Master and User roles as defined in ATA. The ATA security lock / unlock states correspond to operator authentication for the Read / Write data services (which use an internal AES 128-bit key for encryption and decryption of data written to and read from the drive media respectively). In addition, a “Drive Owner” CO role is provided, which can enable or disable access to the FW download service for FW upgrade. Additionally, a cryptographic erase service is provided to the Master and User roles through the ATA Security Erase Unit commands. The FW download service (ATA Download Page 6 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 Microcode command) provides a FIPS-compliant FW load test by verifying the code’s embedded 2048-bit RSA signature. 2.6.2 TCG Opal Security Mode (SOM2) This mode provides services through industry-standard ATA commands, TCG Opal commands addressed to the TCG Admin SP, and TCG Opal commands addressed to the TCG Locking SP. It provides all of the services of the ATA Enhanced Security Mode as well as additional features through TCG Opal commands. Some ATA Security commands are disabled in this mode and their functionality is provided through the TCG Opal commands. To operate in SOM2, the Drive Owner must invoke the Activate method on the Locking SP from SOM0 mode. One of the fundamental differences in this Mode is the capability to have multiple Users with independent access control to read/write/erase independent data areas (LBA ranges). Note that by default there is a single “Global Range” that encompasses the whole user data area. In addition to the Drive Owner and User(s) roles, this mode implements a CO role (Admins) to administer the additional features. These features include: Enable/disable additional Users Create and configure multiple LBA Ranges Assign access control of Users to LBA Ranges Lock/unlock LBA Ranges Erase LBA Ranges using Cryptographic Erase MBR Shadowing 2.7 User Data Cryptographic Erase Methods Since all user data is encrypted / decrypted by the CM for storage / retrieval on the drive media, the data can be erased using a cryptographic method. The data is effectively erased by changing the encryption key (MEK). Thus, the FIPS 140 key management capability “zeroization” of the key erases all the user data. This capability is available through both FIPS modes. Of course the user data can also be erased by overwriting, but this can be a long operation on high capacity drives. Other FIPS services can be used to erase all the other private keys and CSPs (see Section 2.8). 2.8 Revert SP Methods In either SOM1 or SOM2 modes, the TCG Revert SP method may be invoked to transition the CM into SOM0 (non-FIPS compliant) mode. This corresponds to the Exit FIPS Mode service and is akin to a “restore to factory defaults” operation. This operation also provides a means to zeroize keys and CSPs. Subsequently, the CM has to be re-initialized before it can return to a FIPS compliant mode of operation (i.e. SOM1 or SOM2). This Revert SP method may be invoked by the Drive Owner, Admins or an unauthenticated role using the public PSID value. 2.9 Shadow MBR (in SOM2 Only) In SOM2, the CM provides a means for the host to remap a User Data LBA range to a "Shadow" area; this is called "Shadow MBR". The data in this area is not encrypted, thus read/write operations to this band do not use the User Data Read/Write service. To enable this feature, the host application issues a TCG Set Method to the MBRControl Table in the Locking SP. Further details on this feature can be found in the TCG Opal documentation (4). Page 7 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 3 Identification and Authentication (I&A) Policy 3.1 Operator Roles Note: The following identifies the CO and User roles with a general description of the purposes. For further details of the services performed by each role in each FIPS mode, see section 4.1. 3.1.1 Crypto Officer Roles 3.1.1.1 Drive O wner This CO role corresponds to the SID (Secure ID) Authority on the Admin SP as defined in Opal SSC [4]. This role is used to transition the CM to TCG Opal Security Mode or to download a new FW image. Note: only a FIPS validated firmware version can be loaded to the module. Otherwise, the module is not operating in FIPS mode. 3.1.1.2 Admins (1-4) (TCG O pal Security Mode (SO M2) Only) This CO role for TCG Opal Security Mode corresponds to the same named Authority on the Locking SP as defined in Opal SSC [4]. This role is used to enable/disable Users, create and delete data regions (LBA Ranges), set LBA Range attributes, lock/unlock LBA Ranges and erase LBA Ranges (by zeroizing the MEK with the Cryptographic Erase service). 3.1.2 User Roles User (1) – SO M1, Users (1-16) – SOM2 3.1.2.1 This role can unlock (and also lock) the drive so that an operator can read and write data to the drive. This role can also call the Cryptographic Erase service. When operating in TCG Opal Security Mode, there can be up to 16 separate Users (User IDs) and the role corresponds to the same named TCG Authority on the Locking SP. The Admin role enables Users and assigns them read/write/erase access to LBA ranges. 3.1.2.2 Master (ATA Enhanced Security Mode (SO M1) Only) This role corresponds to the same named role as defined in ATA [7]. This role only provides a backup authentication to the ATA User and does not have access to administration services beyond those of the ATA User role. 3.1.3 Unauthenticated Role This role can perform the Show Status service. If the operator has physical access to the drive, this role can also reset the module with a power cycle (which results in POSTs) as well as configure the jumper block to control the interface speed between the host and drive (a non-security relevant service). This role can also use the public PSID value to invoke the Exit FIPS Mode service. 3.2 Authentication Authentication Types 3.2.1 Some operator roles have role-based authentication and others have identity-based authentication. For example, the Drive Owner role uses role-based authentication as there is only one ID and one PIN. In TCG Opal Security Mode, the CM has up to 4 Admin and 16 User operators. Each of these operators is assigned a unique ID to which a PIN is associated, thus this provides identity-based authentication. For some services the authentication is performed in a separate associated service; e.g. the Read Unlock service is the authentication for subsequent User Data Read service. If the User Data Read service is attempted without prior authentication then the command will fail. For authentication using the TCG interface, the operator and PIN can be provided in the StartSession method itself. Alternatively, an operator may use the Authenticate method to authenticate to a role after a Session has been started. Authentications will persist until the session is closed. Authentication in ATA Enhanced Security Mode 3.2.2 In ATA Enhanced Security Mode, Master and User operator authentication is provided through a PIN provided in the ATA Security command [7]. In the event of authentication failure, the ATA command will Page 8 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 abort, and subsequent read/write services will abort. A password attempt counter is implemented as specified in ATA, which when reached, blocks Master/User service authentication (with command abort), until the module is reset (Unblock PIN service). Depending on a parameter of the Set PIN service for the User password, the User services may or may not be fully extended to the Master role. If the Master Password Capability is set to “High”, then either role can access the same services. Otherwise the Master role only has access to the erase service. Drive Owner authentication for the Set PIN and Enable/Disable FW Download services is provided through the TCG StartSession or Authenticate to Admin SP. Authentication in TCG Opal Security Mode 3.2.3 Operator authentication is provided via the TCG StartSession or Authenticate methods. The host application can have only a single session open at a time. During a session the application can invoke services for which the authenticated operator has access control. Note that a security rule of the CM is that the host must not authenticate to more than one operator (TCG authority) in a session. For some services the host application will authenticate to the “Anybody” authority which does not have a private credential. Therefore these operations are effectively unauthenticated services. Authentication Mechanism, Data and Strength 3.2.4 Operator authentication with PINs is implemented by hashing the operator input value and comparing it to the stored hash of the assigned PIN. The PINs have a retry attribute (“TryLimit”) that controls the number of unsuccessful attempts before the authentication is blocked until a module reset. The PINs have a maximum length of 32 bytes. Per the policy security rules, the minimum PIN length is 4 bytes (Rule 4 in Section 7.1). This gives a probability of 1/232 of guessing the PIN in a single random attempt. This easily meets the FIPS 140 authentication strength requirements of less than 1/1,000,000. Each authentication attempt takes 30ms on average to complete. This means that approximately {(60*1000)/30} attempts can be made in one minute. Thus the probability of multiple random attempts to succeed in one minute is 2000/232. This is significantly lower than the FIPS requirement of 1/100,000. Personalizing Authentication Data 3.2.5 The initial value for SID is a manufactured value (mSID). This is a device-unique, 32-byte, public value. The Security Rules (Section 7) for the CM requires that the PIN values must be “personalized” to private values using the “Set PIN” service. Note that for SOM1, setting the User PIN also sets the Drive Owner PIN to the same value; the Drive Owner PIN can be set to a different value with the TCG Set Method. Page 9 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 4 Access Control Policy 4.1 Services The following tables represent the FIPS 140 services for each FIPS Approved Mode in terms of the Approved Security Functions and operator access control. Note the following: Use of the services described below is only compliant if the module is in the noted Approved mode. Underlying security functions used by higher level algorithms are not represented (e.g. hashing as part of asymmetric key) Operator authentication is not represented in this table. Some security functions listed are used solely to protect / encrypt keys and CSPs. Service input and output details are defined by the TCG and ATA standards. Unauthenticated services (e.g. Show Status) do not provide access to private keys or CSPs. * Some services have indirect access control provided through enable / disable or lock / unlock services used by an authenticated operator; e.g. User data read / write. If the Operator value contains “opt” then the access is dependent on the module setup (see 3.2.2). Page 10 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 Table 1.1 - FIPS 140 Authenticated Services – SOM1 Service Name Description Operator Access Security Command(s)/Event(s) Control Function Set PIN Change operator authentication Master*, User*, Hashing ATA SECURITY SET data. Drive Owner PASSWORD, TCG Set Method Note: Setting the User PIN also sets the Drive Owner PIN. Lock / Unlock Enable / Disable FW Download Drive Owner None TCG Set Method FW Download Service Firmware Load complete firmware image. None** Asymmetric ATA DOWNLOAD Download If the self-test of the code load Key MICROCODE passes then the device will run with the new code. Unlock User Enable user data read/write and User (opt. Symmetric ATA SECURITY UNLOCK Data Set PIN services. Master) Key (to unwrap MEK) User Data Read Encryption / decryption of user None* Symmetric ATA Read / Write Commands / Write data. Key Cryptographic Erase user data through Master, User RNG ATA SECURITY ERASE Erase cryptographic means: by PREPARE + ATA SECURITY zeroizing the encryption key and ERASE UNIT the User PIN. Note: FIPS mode is exited. Exit FIPS Mode Exit ATA Enhanced Security User* (opt. RNG, ATA SECURITY DISABLE Mode (SOM1). Master*), Hashing, PASSWORD Note: CM will enter SOM0. Drive Owner Symmetric ATA SECURITY ERASE Key PREPARE + SECURITY ERASE UNIT TCG AdminSPObj.Revert() Table 1.2 - FIPS 140 Unauthenticated Services – SOM1 Service Name Description Operator Access Security Command(s)/Event(s) Control Function Unblock PIN Reset Master and User password None None POR attempt counter. Show Status Reports if CM is in a FIPS None None ATA IDENTIFY DEVICE Word approved mode. 128 Bit 1 = 1 (Security Enabled) Reset Module Runs POSTs and zeroizes key & None None POR CSP RAM storage. Disable Disables ATA Security None None ATA SECURITY FREEZE Services commands until POR LOCK Exit FIPS Mode Exit ATA Enhanced Security None (using None TCG AdminSP.RevertSP() Mode (SOM1). PSID) Note: CM will enter SOM0. *Security has to be Unlocked **FW Download has to be Unlocked Page 11 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 Table 2.1 - FIPS 140 Authenticated Services – SOM2 Service Name Description Operator Access Security Command(s)/Event(s) Control Function Set PIN Change operator authentication Admin1-4, Hashing TCG Set Method data. Note: Admins can set PINs User1-16, for any User or Admin. Drive Owner Lock / Unlock Enable / Disable FW Download Drive Owner None TCG Set Method FW Download Service Port Firmware Load complete firmware image. If None** Asymmetric ATA DOWNLOAD Download the self-test of the code load Key MICROCODE passes then the device will run with the new code. Enable / Disable Enable / Disable an Admin or Admin1-4 None TCG Set Method Admin(2-4), User Authority. User(s) Set Range Set the location, size, locking and Admin1-4 None TCG Set Method Attributes User access rights of the LBA range. Lock / Unlock Block or allow read (decrypt) / Admin1-4, None TCG Set Method, ATA User Data Range write (encrypt) of user data in a User1-16 SECURITY UNLOCK for Read and/or range. Write User Data Read / Encryption / decryption of user None* Symmetric ATA Read / Write Commands Write data to/from a LBA range. Key Access control to this service is provided through Lock / Unlock User Data Range. Cryptographic Erase user data in an LBA range Admin1-4, RNG, TCG GenKey Method Erase by cryptographic means: User1-16 Symmetric changing the encryption key. Key Exit FIPS Mode Exit TCG Opal Security Mode Drive Owner, RNG, TCG AdminSP.RevertSP() (SOM2). Admin1-4 Hashing, TCG AdminSPObj.Revert() Note: CM will enter SOM0. Symmetric TCG Key LockingSPObj.Revert() Table 2.2 - FIPS 140 Unauthenticated Services – SOM2 Service Name Description Operator Access Security Command(s)/Event(s) Control Function Unblock PIN Resets password attempt counters. None None POR Show Status Reports if CM is in a FIPS None None TCG Level 0 Discovery. Drive approved mode. Security Life Cycle State = 0x80 (Use State) AND SecurityOperatingMode in Admin SP = 0x02 (SOM2) Reset Module Runs POSTs and zeroizes keys & None None POR CSPs in RAM Exit FIPS Mode Exit TCG Opal Security Mode None (using None LockingSP.RevertSP() (SOM2). PSID) Note: CM will enter SOM0. *Data Range has to be Unlocked **FW Download has to be Unlocked Page 12 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 4.2 Cryptographic Keys and CSPs The following table defines the keys / CSPs and the operators / services which use them. It also describes the lifecycle of these data items in terms of initial value, input / output, storage and zeroization. Note the following: Lifecycle – Initial Value represents the value before the required Security Rules for module setup have been completed. An initial value of “undefined” means that there is no way to authenticate to the associated operator until it has been set by the operator. The use of PIN CSPs for authentication is implied by the operator access control. The Set PIN service is represented in this table even though generally it is only used at module setup. All non-volatile storage of keys and CSPs is in the system area of the drive media to which there is no logical or physical access from outside of the module. Non-critical security parameters are not represented in this table. Read access of private values are internal only to the CM and are thus not represented in this table. There is no security-relevant audit feature. Page 13 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 Lifecycle Mode Type (Pub / (ATA / Operator Access Storage Form Name Description Priv, key / CSP Services Used In TCG / Role (W, X) Initial Value Storage (Plaintext / Entry / Output Zeroization (e.g. PIN)), size Both) Encrypted) Media Electronic Input SID (Secure Priv ate, PIN, 32 Revert Admin Both Auth. Data Drive Owner Set PIN W MSID (Sy stem SHA Digest from Host ID), aka Drive by tes SP Area) No output Owner PIN None (subject Set PIN W Revert Admin to unlocked) Media Electronic Input Priv ate, PIN, 32 MSID (Master), SP, Master, User ATA Auth. Data Master, User Unlock User Data X (Sy stem SHA Digest from Host by tes Undefined (User) Cryptographic Passwords Master, User Cryptographic Erase X Area) No output Erase (User) Master, User Exit FIPS Mode X Obf uscated Revert Admin Media (considered MEK mixed with Priv ate, AES Master, RNG generated during SP, Master, User ATA Unlock User Data X (Sy stem plaintext for None PINs Key , 128 bits User manufacturing Cryptographic MEK Area) FIPS Erase purposes) Media Electronic Input Admins Auth. Priv ate, PIN, 32 SID (Admin1), Admin1-4 TCG Admins Set PIN W (Sy stem SHA Digest from Host Revert Data by tes Undefined (Admin2-4) Passwords Area) No output Media Electronic Input Users Auth. Priv ate, PIN, 32 User1-16 TCG Admins, Users Set PIN W Undefined (Sy stem SHA Digest from Host Revert Data by tes Passwords Area) No output Media Revert, MEK mixed with Priv ate, AES Admins, RNG generated during LBA Range TCG Unlock User Data X (Sy stem Encrypted None Cryptographic MEKEK Key , 128 bits Users manufacturing MEKs Area) Erase Serv ices which use Priv ate, Hash Set to RNG state at Seed Key Both RNG Key None the RNG (e.g. X, W RAM None None Reset Key , 64 bytes each RNG usage (XKEY) cry ptographic erase) RNG seed Priv ate, Hash 1st RNG use after Entropy collected at Both None X RAM None None Reset Seed (entropy) seed, 520 bytes POST power up Firmware Load Drive Owner Media Public, RSA Public keys generated ORG0-0 - Both Test Signature (enable FW FW Download X (Sy stem Plaintext None None (Public) Key , 2048 bits during manufacturing ORG0-3 Verify Key download) Area) Media Media Priv ate, AES RNG generated during TCG Encryption Key Admins, Users Unlock User Data X (Sy stem Encrypted None Revert MEKEK Key , 128 bits manufacturing Encryption Key Area) Page 14 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 4.3 Non-Critical Security Parameters This section lists the security-related information which do not compromise the security of the module. AES IV (i.e. Initialization Vector) The CM HW AES IV (CBC mode) is derived for each read/write operation. PIN Retry Attributes – Tries, TryLimit and Persistence These parameters affect the handling of failed authentication attempts. PSID (Physical SID) This public drive-unique value is only used for the TCG Revert Admin SP method (i.e. Exit FIPS Mode service). This method will leave the CM in a non FIPS compliant “factory default” mode (SOM0) and will require a re-initialization for the CM to resume operation in a FIPS compliant mode. MSID (Manufactured SID) This drive-unique value is the manufactured default value for Drive Owner and Master roles. 5 Physical Security 5.1 Mechanisms The CM has the following physical security: Production-grade components with standard passivation Opaque, tamper-evident, security label on the exposed (back) side of the PCBA which prevents electronic design visibility and protects physical access to the electronics by board removal Tamper-evident security labels that prevent HDA cover removal for access or visibility to the media Exterior of the drive is opaque The tamper-evident labels cannot be penetrated or removed and reapplied without tamper-evidence The tamper-evident labels cannot be easily replicated with a low attack time Security labels on side of drive to provide tamper-evidence of HDA cover removal, Page 15 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 5.2 Operator Requirements The operator is required to inspect the CM periodically for one or more of the following tamper evidence: Checkerboard pattern on security label or substrate Security label over screws at indicated locations is missing or penetrated, Text (including size, font, orientation) on security label does not match original, Security label cutouts do not match original. Upon discovery of tamper evidence, the module should be removed from service. Page 16 Seagate Momentus Thin SED TCG Opal FIPS 140 Module Security Policy Rev. 0.9 6 Operational Environment The FIPS 140-2 Area 6 Operational Environment requirements are not applicable because the CM operates in a “non-modifiable operational environment”. That is, while the module is in operation the operational environment cannot be modified and no code can be added or deleted. FW can be upgraded (replaced) with a signed FW download operation. If the code download is successfully authenticated then the module will begin operating with the new code image. 7 Security Rules 7.1 Secure Initialization The CM does not change mode across module resets. However, certain operations can result in exiting the FIPS Approved mode. In some of these exit scenarios (e.g. POST failure), the drive cannot be restored to FIPS mode and does not provide any FIPS services. The following are the security rules for initialization and operation of the CM in a FIPS 140 compliant manner. Reference the appropriate sections of this document for details. 1. COs: At receipt of the product examine the shipping packaging and the product packaging to ensure it has not been accessed during shipping by the trusted courier. 2. COs and Users (either mode): At installation and periodically examine the physical security mechanisms for tamper evidence. 3. Transition the CM to one of the FIPS approved modes by doing one of the following: ATA Mode (SOM1): User Set PIN. TCG Opal (SOM2): Drive Owner executes Activate method on Locking SP 4. COs and Users: At installation, set all operator PINs applicable for the FIPS mode to private values of at least 4 bytes length: ATA Mode (SOM1): Master and User. Drive Owner (optional). TCG Opal (SOM2): Drive Owner, Admins and Users 5. Users: At installation and periodically confirm drive is in FIPS approved mode with the Show Status service. 6. Drive Owner: At installation, disable the “Makers” authority (using SID_Set_Makers ACE to the Admin SP). To query this setting, perform the Get method for the Makers authority on the Admin SP, specifying the “enabled” column. 7. At installation, the value of LockOnReset for FW Download must be set to “Power Cycle” and it must not be modified. 7.2 Ongoing Policy Restrictions 1. Prior to assuming a new role, close the current Session and start a new Session, or do a power-on reset, so that the previous authentication is cleared. 2. COs (Admins) for SOM2: If it is intended to have a band lock on module reset then set ReadLockEnabled and WriteLockEnabled to “True”; the default value is “False”. If a band is configured with a value of False then the band is to be considered excluded from the module boundary. 8 Mitigation of Other Attacks Policy The CM does not make claims to mitigate against other attacks beyond the scope of FIPS 140-2. Page 17