background image

 

 

Mercury Systems 

ASURRE

-Stor

®

 

SSD 

 

 

 

 

 

 

 

   Administrative Guidance 

 

 
Copyright 2020   Mercury Systems.  May only be reproduced in its original form (without revision) 

Rev. 1.5.1   February 2020    © 2020 Mercury Systems.   All rights reserved 

 

Mercury Systems, Inc. • (602) 437-1520 •  

www.mrcy.com

 

11

 

13

 

Scope of evaluation 

The 

ASURRE-S

tor

®

 

SSD was evaluated to the security functional requirements specified in the 

document “

Security 

Target for Mercury Systems ASURRE-Stor

®

 Solid State Self-

Encrypting Drives”

.   

The TOE does not depend on a TPM (Trusted Platform Module) or OPAL (a security specification) to provide security. 
Instead the TOE supports 6 FIPS 140-2 approved modes, of which, two modes satisfy the requirements of the 
Collaborative Protection Profile for Full Drive Encryption - Encryption Engine, v2.0 dated January 2, 2019 and the 
Collaborative Protection Profile for Full Drive Encryption 

 Authorization Acquisition, v2.0 dated January 2, 2019. 

To provide consistency to the FIPS Security Policy documentation, the CC documentation for the 

ASURRE-S

tor

®

 SSD 

uses the same numbering for the key management modes as the FIPS 140-2 Security Policy.  Using the FIPS mode 
numbering scheme, the TOE supports CC compliant modes of Mode 1 and Mode 6.   No other key management modes 
were evaluated during the course of the CC-Evaluation. 

Mode # 

Mode name 

Key Chain 

 

Self-generated random 
Permanent key with ATA 
Password 

 

 

 

 

 

 

 

During configuration: 

 

The TOE self-generates a random 256-bit AES key and different 256-bit XTS key for use as the media 
DEK.  A password is filled and is conditioned by PBKDF(SP 800-132) to create an intermediate 
derived key that is used to AES key wrap (AES-KW-256, 

SP 800‐38F

) the DEK.  The wrapped DEK is 

saved in NVRAM. 

 

 

 

During normal operation: 

 

On each power cycle, the password must fill.  The TOE conditions the password with PBKDF to 
create an intermediate derived key (BEV/KEK) that is then used to un-wrap (AES-KW-256, 

SP 800‐

38F) the DEK previously saved in NVRAM.   

 

ATA password with KEK  

 

and BLACK key 

 

 

 

Pre-configuration: 
The CO creates two keys, a 256-bit BEV(KEK) and a 512-bit DEK.  The DEK consists of a 256-bit AES 
key and a different 256-bit XTS key.  The CO creates a password of up to 64 characters.  The CO 
conditions the password using PBKDF (SP 800-132) to create a derived 256-bit key used to AES key 
wrap (AES-KW-256, 

SP 800‐38F)

 the DEK to create the BLACK key.   

 

During Configuration: 
The CO fills the BEV(KEK) and password into the TOE.  The TOE conditions the password with PBKDF 
(SP 800-132) creating a derived 256-bit key used to AES key wrap (AES-KW-256, 

SP 800‐38F)

 the 

BEV(KEK).  The TOE saves the wrapped BEV(KEK) in NVRAM.   

 

 

 

During normal operation: 

 

On each power cycle, the user enters the password and BLACK key.  The password is conditioned 
with PBKDF creating a derived 256-bit key used to un-wrap the BEV/KEK previously saved in 
NVRAM.  The un-wrapped BEV/KEK is used to un-wrap the BLACK key to re-create the DEK.   

Table 5: CC Compliant modes 

14

 

Operating Environment 

The 

ASURRE-S

tor

®

 

SSD is compliant and compatible with the industry standard SATA specification and conforms to the 

ATA7 specification and command set.  The 

ASURRE-S

tor

®

 

SSD will function correctly in all products that include a 

standard SATA interface and are compliant to the SATA and ATA7 specification.  
 

 

Содержание ASURRE-Stor ADR256

Страница 1: ...20 Mercury Systems All rights reserved Mercury Systems ASURRE Stor SSD Administrative Guidance Mercury Systems ASURRE Stor ASD256 512 and ADR256 512 Solid State Self Encrypting Drives Non Proprietary...

Страница 2: ...oduct Identification 8 11 Evaluated Configuration 9 12 Part numbers 10 13 Scope of evaluation 11 14 Operating Environment 11 15 Operating environment assumptions and requirements 12 16 Unattended oper...

Страница 3: ...y 17 Table 7 LED Indicator Port 17 Table 8 Password strength in bits 21 List of Figures Figure 1 View of the holographic label located in the center of the main label 9 Figure 2 Images of the ASURRE S...

Страница 4: ...ration of the TOE Please note that use of the MDU utility is optional and not part of the evaluation Programmer s Guide or SSD Programmer s Guide ssdProgrammersGuide pdf This document provides detaile...

Страница 5: ...Maximum which determine how the TOE behaves when the Master Password issued to unlock the device Refer to the ATA7 specification V1 page 22 MDU MDU Utility Mercury Systems Drive Utility MDU is a Windo...

Страница 6: ...r unencrypted shadow MBR sectors or 3rd party Opal software The ASURRE Stor SSD was evaluated against the Common Criteria Collaborative Protection Profile for Full Drive Encryption Encryption Engine v...

Страница 7: ...erformed on the TOE The CO configures the TOE using MDU or a similar custom utility program to operate in Mode 6 The CO fills the BEV KEK and enters a password of up to 64 characters The TOE condition...

Страница 8: ...ower is removed from the TOE the TOE enters power state D3 cold a fully powered off condition Only power state D0 allows access to plain text data Since SSDs never receive warning of imminent power lo...

Страница 9: ...ommand described in SSD Secure Configuration Programmer s Guide section 2 2 to verify that the TOE reports Firmware revision number 1 5 1 Alternatively the MDU utility can be used Refer to MDU section...

Страница 10: ...0 Standard product 1 Electrically isolate enclosure 2 Erase pin 1 option Trigger an erase sanitize operation from SATA pin P1 Option Field z 0 Standard product 1 Legacy erase option Same as field y O...

Страница 11: ...and is conditioned by PBKDF SP 800 132 to create an intermediate derived key that is used to AES key wrap AES KW 256 SP 800 38F the DEK The wrapped DEK is saved in NVRAM During normal operation On ea...

Страница 12: ...fill cables and any needed voltage translation The Administrator and or system designers shall implement application techniques safeguards and or procedures to assure that power is removed from the TO...

Страница 13: ...g mode prior to deployment 18 Secure Configuration Prior to configuration the Administrator must determine the appropriate key management mode for operation Selecting the mode impacts how the host sys...

Страница 14: ...lication c Require the ATA user password enables the KEK with BLACK key and ATA Password mode Set the ATA Password Length to 64 bytes d Enable the Secure Erase Trigger option e Select a Default Secure...

Страница 15: ...nce are listed below a KEK and BLACK DEK mode must be set to KEK and BLACK DEK b The Key Source selection is determined by the CO as required by the fielded application c Require the ATA user password...

Страница 16: ...the ATA password and issue the Get Drive Information command and verify that the TOE is in a CC compliant mode 21 Changing the User or Master ATA Password after the TOE is configured The TOE supports...

Страница 17: ...t 23 Installing the TOE into a host system ESD The ASURRE Stor SSD utilizes both active and passive techniques to mitigate damage caused by severe electro static discharge Mercury Systems recommends f...

Страница 18: ...SSD SATA Connector Warning The power segments of most commercial SATA connectors have every three pins shorted Refer to images in Figure 7 P1 P2 and P3 3 3V shorted P4 P5 and P6 GND shorted P7 P8 and...

Страница 19: ...oves the encrypted result to the NAND media The User Role after successful authentication can access previously encrypted data stored in the NAND media Prior to authentication the User Role cannot wri...

Страница 20: ...components in the TOE use production grade materials The printed circuit board is conformal coated and all BGA devices are under filled with a hard opaque epoxy to prevent easy probing of individual...

Страница 21: ...ion prevents an attacker from attempting to change to a different firmware version in the field The Crypto Officer shall enforce the use of 8 character minimum password lengths for the User ATA Passwo...

Страница 22: ...bel for signs of removal at least once per year While not intended as a tamper seal the label can be difficult to remove and can show signs of damage such as tearing discoloration or other damage if i...

Страница 23: ...ugust 16 2017 8 23 17 Modified per Evaluation findings Rev 1 5 1 Bob Laz Sabrina Pi a 8 21 2019 Updates for re certification Document Dates footers and cPP versions updated 11 25 2019 Updated Mercury...

Отзывы: