background image

 

 

Mercury Systems 

ASURRE

-Stor

®

 

SSD 

 

 

 

 

 

 

 

   Administrative Guidance 

 

 
Copyright 2020   Mercury Systems.  May only be reproduced in its original form (without revision) 

Rev. 1.5.1   February 2020    © 2020 Mercury Systems.   All rights reserved 

 

Mercury Systems, Inc. • (602) 437-1520 •  

www.mrcy.com

 

12

 

15

 

Operating environment assumptions and requirements 

The guidance for the 

ASURRE-S

tor

®

 

SSD makes the following assumptions: 

 

The TOE encrypts all data with AES-256 XTS.  There are no configuration options or support for different key sizes. 

 

The TOE is not dependent on the operational environment to perform DEK purging or memory clear operations.  
All operations that perform clear and purge operations, once triggered, operate indecently of the host SATA 
interface.   

 

The 

ASURRE-S

tor

®

 

SSD does not support TCG or require a trusted platform module for secure operation. 

 

The 

ASURRE-S

tor

®

 

SSD is located in a secure environment during the initial secure configuration. 

 

The Administrator or Crypto Officer connects the 

ASURRE-S

tor

®

 

SSD to a host system that includes the electrical 

and software interface support necessary to implement an industry standard SATA interface as defined by the 
Serial ATA specification, revision 2.6.   

 

When configuring the TOE using a custom designed utility, the Administrator shall verify that the custom utility 
configures the TOE to the same configuration described by the 

SSD Secure Configuration Programmer’s 

Guide 

configuration procedure. 

 

Administrators preferably fill the password, BLACK key, and BEV(KEK) over the standard SATA interface using the 
MDU utility.  The BLACK key and BEV(KEK) can also fill from a 2-pin serial interface located on pins P14 and P15 of 
the SATA connector.  This interface is only used when filling with COMSEC controlled DS-101 key fill devices.  
When utilizing COMSEC key fill devices, P14 acts as a 3.3 V, RS-232 Rx signal and Pin P15 acts as a 3.3 V, RS-232 Tx 
signal.   The protocol settings for the key fill device should be set to 2400 baud, 8 data bits, 1 stop bit, and no 
parity.  Mercury Systems provides technical support to help interface with COMSEC key fill devices and can 
provide the technical details needed to create custom key fill cables and any needed voltage translation.   

 

The Administrator and/or system designers shall implement application techniques, safeguards, and/or 
procedures to assure that power is removed from the TOE, state D3 (cold), when the host system is left 
unattended.  On removal of power, the TOE purges the DEK key and enters a full-off state in less than 20 
milliseconds.   

 

The Administrator shall verify that TOE users are trained on how to power-off the host system and TOE. 

 

The 

ASURRE-S

tor

®

 

SSD accepts passwords lengths of up to 64, 8-bit bytes.  Administrators and Crypto Officers 

shall enforce password lengths and complexity to provide suitable security strength. 

 

After completing the secure configuration of the TOE, the Administrator or Crypto Officer will verify that the TOE 
is operating in a CC compliant configuration.  Use the SSD Secure Configuration Programmer's Guide to determine 
the SATA commands required to verify this information. 

 

The TOE product is compliant to the EE and AA protection profiles.  It is assumed that the external interface 
providing the password to the AA portion of the TOE, is in close enough proximity to the TOE during operation 
that a threat agent has very little opportunity to interpose itself in the channel between the two without the user 
noticing and taking appropriate actions. 

 

The Administrator understands that Mercury Systems supplies the TOE in an erased state.  The TOE contains no 
data when delivered by Mercury systems.  The Administrator shall not store information on the TOE until after 
completing the initial secure configuration procedure. 

 

The Administrator shall implement methods and procedures to assure that the host system is free of malware that 
could interfere with the correct operation and power-off procedures of the host system connected to the TOE.  

 

The Administrator is responsible for completing the initial secure configuration of the TOE and for generating 
password, BEV(KEK), and BLACK key values that meet the requirements of the EE and AA protection profiles for 
both strength and entropy. 

 

The Administrator shall train any users involved in the provisioning of the TOE in the methods and procedures to 
properly handle, store, and secure the password, BEV(KEK) and BLACK key values.  For example, the password and 
BLACK key values should be stored separately from the host system and the TOE.  

 

 

Содержание ASURRE-Stor ADR256

Страница 1: ...20 Mercury Systems All rights reserved Mercury Systems ASURRE Stor SSD Administrative Guidance Mercury Systems ASURRE Stor ASD256 512 and ADR256 512 Solid State Self Encrypting Drives Non Proprietary...

Страница 2: ...oduct Identification 8 11 Evaluated Configuration 9 12 Part numbers 10 13 Scope of evaluation 11 14 Operating Environment 11 15 Operating environment assumptions and requirements 12 16 Unattended oper...

Страница 3: ...y 17 Table 7 LED Indicator Port 17 Table 8 Password strength in bits 21 List of Figures Figure 1 View of the holographic label located in the center of the main label 9 Figure 2 Images of the ASURRE S...

Страница 4: ...ration of the TOE Please note that use of the MDU utility is optional and not part of the evaluation Programmer s Guide or SSD Programmer s Guide ssdProgrammersGuide pdf This document provides detaile...

Страница 5: ...Maximum which determine how the TOE behaves when the Master Password issued to unlock the device Refer to the ATA7 specification V1 page 22 MDU MDU Utility Mercury Systems Drive Utility MDU is a Windo...

Страница 6: ...r unencrypted shadow MBR sectors or 3rd party Opal software The ASURRE Stor SSD was evaluated against the Common Criteria Collaborative Protection Profile for Full Drive Encryption Encryption Engine v...

Страница 7: ...erformed on the TOE The CO configures the TOE using MDU or a similar custom utility program to operate in Mode 6 The CO fills the BEV KEK and enters a password of up to 64 characters The TOE condition...

Страница 8: ...ower is removed from the TOE the TOE enters power state D3 cold a fully powered off condition Only power state D0 allows access to plain text data Since SSDs never receive warning of imminent power lo...

Страница 9: ...ommand described in SSD Secure Configuration Programmer s Guide section 2 2 to verify that the TOE reports Firmware revision number 1 5 1 Alternatively the MDU utility can be used Refer to MDU section...

Страница 10: ...0 Standard product 1 Electrically isolate enclosure 2 Erase pin 1 option Trigger an erase sanitize operation from SATA pin P1 Option Field z 0 Standard product 1 Legacy erase option Same as field y O...

Страница 11: ...and is conditioned by PBKDF SP 800 132 to create an intermediate derived key that is used to AES key wrap AES KW 256 SP 800 38F the DEK The wrapped DEK is saved in NVRAM During normal operation On ea...

Страница 12: ...fill cables and any needed voltage translation The Administrator and or system designers shall implement application techniques safeguards and or procedures to assure that power is removed from the TO...

Страница 13: ...g mode prior to deployment 18 Secure Configuration Prior to configuration the Administrator must determine the appropriate key management mode for operation Selecting the mode impacts how the host sys...

Страница 14: ...lication c Require the ATA user password enables the KEK with BLACK key and ATA Password mode Set the ATA Password Length to 64 bytes d Enable the Secure Erase Trigger option e Select a Default Secure...

Страница 15: ...nce are listed below a KEK and BLACK DEK mode must be set to KEK and BLACK DEK b The Key Source selection is determined by the CO as required by the fielded application c Require the ATA user password...

Страница 16: ...the ATA password and issue the Get Drive Information command and verify that the TOE is in a CC compliant mode 21 Changing the User or Master ATA Password after the TOE is configured The TOE supports...

Страница 17: ...t 23 Installing the TOE into a host system ESD The ASURRE Stor SSD utilizes both active and passive techniques to mitigate damage caused by severe electro static discharge Mercury Systems recommends f...

Страница 18: ...SSD SATA Connector Warning The power segments of most commercial SATA connectors have every three pins shorted Refer to images in Figure 7 P1 P2 and P3 3 3V shorted P4 P5 and P6 GND shorted P7 P8 and...

Страница 19: ...oves the encrypted result to the NAND media The User Role after successful authentication can access previously encrypted data stored in the NAND media Prior to authentication the User Role cannot wri...

Страница 20: ...components in the TOE use production grade materials The printed circuit board is conformal coated and all BGA devices are under filled with a hard opaque epoxy to prevent easy probing of individual...

Страница 21: ...ion prevents an attacker from attempting to change to a different firmware version in the field The Crypto Officer shall enforce the use of 8 character minimum password lengths for the User ATA Passwo...

Страница 22: ...bel for signs of removal at least once per year While not intended as a tamper seal the label can be difficult to remove and can show signs of damage such as tearing discoloration or other damage if i...

Страница 23: ...ugust 16 2017 8 23 17 Modified per Evaluation findings Rev 1 5 1 Bob Laz Sabrina Pi a 8 21 2019 Updates for re certification Document Dates footers and cPP versions updated 11 25 2019 Updated Mercury...

Отзывы: