Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series Security Policy
This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
Page 16 of 19
The following table lists roles, services, cryptographic keys, CSPs and Public Keys
and the types of access that are available to each of the authorized roles via the
corresponding services:
Role
Service
Cryptographic Keys,
CSPs and Public Keys
Type(s) of Access
(R=Read, W=Write,
G=Generate, Z=Zeroize)
Cryptographic
Officer
Initialization
DRBG Internal State
DRBG Seed
DRBG Entropy Input String
CO Password
MEK
Z, G, R
Z, G, R
Z, G, R
Z, W
Z, G
Enable/Disable FW
Download Service
N/A
N/A
Drive Extended Status
N/A
N/A
Erase an LBA Range’s
Password/MEK
DRBG Internal State
DRBG Seed
DRBG Entropy Input String
MEK
User Password
Z, G, R
Z, G, R
Z, G, R
Z, G
Z, W
Zeroize
DRBG Internal State
DRBG Seed
DRBG Entropy Input String
CO Password
User Password
MEK
Z
Z
Z
Z
Z
Z
User
Unlock an LBA Range
MEK
R
User Password
R
Set User Password
User Password
W
Lock an LBA Range
MEK
Z
Configure an LBA
Range
N/A
N/A
Write Data
MEK
R
Read Data
MEK
R
FW Loader
Update the firmware
FW Verification Key
R
Exhibit 14 – Services Authorized for Roles, Access Rights within Services (FIPS
140-2 Table C3, Table C4).