Advertisement

Quick Links

Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series
FIPS 140-2 Security Policy
Document Revision: 1.0
H.W. Version:
MZILS7T6HMLS-000H9 and MZILS15THMLS-000H9
F.W. Version:
3P00
This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung Copyright 2016.

Advertisement

Table of Contents
loading

Summary of Contents for Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series

  • Page 1 Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series FIPS 140-2 Security Policy Document Revision: 1.0 H.W. Version: MZILS7T6HMLS-000H9 and MZILS15THMLS-000H9 F.W. Version: 3P00 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung Copyright 2016.
  • Page 2: Table Of Contents

    Access Control Policy ........................14 Unauthenticated Services ......................17 Physical Security Policy ....................... 18 Mitigation of Other Attacks Policy ....................19 Page 2 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 3 Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series Security Policy Revision History Author(s) Version Updates SeungJae Lee Initial Version Page 3 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 4: Introduction

    FIPS 140-2 CMVP. Any other firmware loaded into this module is out of the scope of this validation and requires a separate FIPS 140-2 validation. Page 4 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 5 PM1633a Series Cryptographic Boundary (From top to bottom – Left to right: top side, bottom side, front side, back side, left side, and right side). Page 5 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 6 Manufactured SID(Security Identifier) Exhibit 4 – Acronym and Descriptions for Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series. Page 6 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 7: Security Level Specification

    Cryptographic Key Management EMI/EMC Self-tests Design Assurance Mitigation of Other Attacks Exhibit 5 – Security Level Table. Page 7 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 8: Approved Algorithms

    FIPS 140-2 IG G.11 NOTE 2: This module supports AES-XTS which is only approved for storage applications. Page 8 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 9: Non-Approved Algorithms

    Exhibit 8 – Specification of the Samsung SAS 12G TCG Enterprise SSC SED PM1633a Series Cryptographic Module Physical Ports and Logical Interfaces. Page 9 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 10  The cryptographic module shall not output CSPs in any form.  The cryptographic module shall use the Approved DRBG for generating all cryptographic keys. Page 10 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 11 Continuous random number generator test on Approved DRBG o Continuous random number generator test on NDRNG Page 11 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 12: Identification And Authentication Policy

    {(60*1000)/2000}/2 , which is much less than the FIPS 140-2 requirement 1/100,000. Page 12 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 13 Exhibit 11 - Strengths of Authentication Mechanisms (FIPS 140-2 Table C2). Page 13 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 14: Access Control Policy

    Range’s Password/MEK” service and “Zeroize” service Exhibit 12 – CSPs and details on Generation, Storage and Zeroization Methods. Page 14 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 15 Storage: Plaintext in Flash Zeroization: N/A Exhibit 13 – Public Keys and details on Generation, Storage and Zeroization Methods Page 15 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 16 Exhibit 14 – Services Authorized for Roles, Access Rights within Services (FIPS 140-2 Table C3, Table C4). Page 16 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 17: Unauthenticated Services

    User and FW Loader Exhibit 15 – Unauthenticated Service, Cryptographic Keys & CSPs and Type(s) of Access. Page 17 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 18: Physical Security Policy

    Remove from service if tampering found. Exhibit 16 - Inspection/Testing of Physical Security Mechanisms (FIPS 140-2 Table C5) Page 18 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
  • Page 19: Mitigation Of Other Attacks Policy

    Other Mitigation Specific Attacks Mechanism Limitations Exhibit 18 - Mitigation of Other Attacks (FIPS 140-2 Table C6) Page 19 of 19 This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.

Table of Contents