background image

 

 

Mercury Systems 

ASURRE

-Stor

®

 

SSD 

 

 

 

 

 

 

 

   Administrative Guidance 

 

 
Copyright 2020   Mercury Systems.  May only be reproduced in its original form (without revision) 

Rev. 1.5.1   February 2020    © 2020 Mercury Systems.   All rights reserved 

 

Mercury Systems, Inc. • (602) 437-1520 •  

www.mrcy.com

 

16

 

20

 

Changing the BEV (KEK) and BLACK key after the TOE is configured 

The TOE verifies that the BLACK key that fills on each power cycle is identical to the BLACK key filled during the initial 
secure configuration procedure.  This is done both for authentication and to prevent TOE data corruption.  In order to 
change to a different BLACK key or BEV(KEK) an erase operation is required.  The erase operation outlined below erases 
the existing BLACK key DEK, BEV(KEK), User ATA Password and the NAND media.  The operation also causes the TOE to 
prepare to accept new BEV(KEK) and BLACK key values.   
A summary of the steps needed to change the key values appears below.   

1.

 

Obtain the current TOE configuration Log, and modify 

the “Default Secure Erase” parameter to “Fast Clear.”

 

2.

 

Unlock the TOE by entering the correct User ATA Password by sending the 

“Execute Security Command” 

command. 

3.

 

Send the 

“Erase the drive” 

command.  The drive green LED on the LED indicator port will flash until the erase operation completes.  This will 

take less than 8 seconds for the Fast Clear protocol.  At this point the drive has no key values, no ATA Password, and the NAND media is 
clear.  Drive data is forensically unrecoverable. 

4.

 

Read the TOE configuration file and modify it to include the new BEV(KEK) value and send the configuration to the TOE 

5.

 

Repeat for the BLACK key value. 

6.

 

Repeat for the ATA password. 

7.

 

Cycle TOE power, enter the ATA password, and issue the 

“Get Drive Information” 

command and verify that the TOE is in a CC compliant 

mode. 

21

 

Changing the User or Master ATA Password after the TOE is configured 

The TOE supports changing the User ATA password after initial configuration.  The host system must unlock the TOE by 
entering the correct User ATA password, then once unlocked, the host system can change the User ATA password.  The 

host system can use ATA commands defined in the SSD Programmer’s Guide

 or the host can use MDU to simplify this 

process.  The TOE uses the PBKDF-conditioned User ATA password to unwrap the encryption key, then conditions the 
new User ATA password with PBDKF to wrap the encryption key.  The TOE overwrites all old information in the 
keychain with information based on the new User ATA password. 

The TOE supports changing the Master ATA Password, but only when no master password exists.  The host must use 
ATA commands (or MDU) to disable the Master ATA password prior to specifying a new Master password. 

22

 

Ports on the

 

ASURRE-S

tor

®

 SSD  

The 

ASURRE-S

tor

®

 SSD

 

conforms to the industry standard 2.5” 9.5mm thick hard drive form factor

 (SFF-8201).  Photos 

in Figure 6 show views of TOE ports that may be useful during configuration.  Table 6 and 7 briefly describe each port.  
The TOE contains a Write Protect port, a LED Indicator port, a SATA Power Segment port and a SATA Signal Segment 
port.  To operate the TOE in Read-Only applications, install a write protect jumper (available from Mercury) into the 
Write Protect port connector. 

 
 

SATA Signal Segment Port
    - Plaintext data Input/Output
    - Ciphertext BLACK key fill Input
    - Ciphertext output (encrypted data) for validation.
    - Control input (SATA commands)
    - Status Output

SATA Power Segment Port
    - Control Input (P1, P2, P4, P13, P14)
    - Ciphertext BLACK key Fill Input (P14)
    - Status Output (P11, P15)
    - Power (5V and GND)

.

.

.

.

.

 

Figure 6:  Ports on the TOE 

 

 

Содержание ASURRE-Stor ADR256

Страница 1: ...20 Mercury Systems All rights reserved Mercury Systems ASURRE Stor SSD Administrative Guidance Mercury Systems ASURRE Stor ASD256 512 and ADR256 512 Solid State Self Encrypting Drives Non Proprietary...

Страница 2: ...oduct Identification 8 11 Evaluated Configuration 9 12 Part numbers 10 13 Scope of evaluation 11 14 Operating Environment 11 15 Operating environment assumptions and requirements 12 16 Unattended oper...

Страница 3: ...y 17 Table 7 LED Indicator Port 17 Table 8 Password strength in bits 21 List of Figures Figure 1 View of the holographic label located in the center of the main label 9 Figure 2 Images of the ASURRE S...

Страница 4: ...ration of the TOE Please note that use of the MDU utility is optional and not part of the evaluation Programmer s Guide or SSD Programmer s Guide ssdProgrammersGuide pdf This document provides detaile...

Страница 5: ...Maximum which determine how the TOE behaves when the Master Password issued to unlock the device Refer to the ATA7 specification V1 page 22 MDU MDU Utility Mercury Systems Drive Utility MDU is a Windo...

Страница 6: ...r unencrypted shadow MBR sectors or 3rd party Opal software The ASURRE Stor SSD was evaluated against the Common Criteria Collaborative Protection Profile for Full Drive Encryption Encryption Engine v...

Страница 7: ...erformed on the TOE The CO configures the TOE using MDU or a similar custom utility program to operate in Mode 6 The CO fills the BEV KEK and enters a password of up to 64 characters The TOE condition...

Страница 8: ...ower is removed from the TOE the TOE enters power state D3 cold a fully powered off condition Only power state D0 allows access to plain text data Since SSDs never receive warning of imminent power lo...

Страница 9: ...ommand described in SSD Secure Configuration Programmer s Guide section 2 2 to verify that the TOE reports Firmware revision number 1 5 1 Alternatively the MDU utility can be used Refer to MDU section...

Страница 10: ...0 Standard product 1 Electrically isolate enclosure 2 Erase pin 1 option Trigger an erase sanitize operation from SATA pin P1 Option Field z 0 Standard product 1 Legacy erase option Same as field y O...

Страница 11: ...and is conditioned by PBKDF SP 800 132 to create an intermediate derived key that is used to AES key wrap AES KW 256 SP 800 38F the DEK The wrapped DEK is saved in NVRAM During normal operation On ea...

Страница 12: ...fill cables and any needed voltage translation The Administrator and or system designers shall implement application techniques safeguards and or procedures to assure that power is removed from the TO...

Страница 13: ...g mode prior to deployment 18 Secure Configuration Prior to configuration the Administrator must determine the appropriate key management mode for operation Selecting the mode impacts how the host sys...

Страница 14: ...lication c Require the ATA user password enables the KEK with BLACK key and ATA Password mode Set the ATA Password Length to 64 bytes d Enable the Secure Erase Trigger option e Select a Default Secure...

Страница 15: ...nce are listed below a KEK and BLACK DEK mode must be set to KEK and BLACK DEK b The Key Source selection is determined by the CO as required by the fielded application c Require the ATA user password...

Страница 16: ...the ATA password and issue the Get Drive Information command and verify that the TOE is in a CC compliant mode 21 Changing the User or Master ATA Password after the TOE is configured The TOE supports...

Страница 17: ...t 23 Installing the TOE into a host system ESD The ASURRE Stor SSD utilizes both active and passive techniques to mitigate damage caused by severe electro static discharge Mercury Systems recommends f...

Страница 18: ...SSD SATA Connector Warning The power segments of most commercial SATA connectors have every three pins shorted Refer to images in Figure 7 P1 P2 and P3 3 3V shorted P4 P5 and P6 GND shorted P7 P8 and...

Страница 19: ...oves the encrypted result to the NAND media The User Role after successful authentication can access previously encrypted data stored in the NAND media Prior to authentication the User Role cannot wri...

Страница 20: ...components in the TOE use production grade materials The printed circuit board is conformal coated and all BGA devices are under filled with a hard opaque epoxy to prevent easy probing of individual...

Страница 21: ...ion prevents an attacker from attempting to change to a different firmware version in the field The Crypto Officer shall enforce the use of 8 character minimum password lengths for the User ATA Passwo...

Страница 22: ...bel for signs of removal at least once per year While not intended as a tamper seal the label can be difficult to remove and can show signs of damage such as tearing discoloration or other damage if i...

Страница 23: ...ugust 16 2017 8 23 17 Modified per Evaluation findings Rev 1 5 1 Bob Laz Sabrina Pi a 8 21 2019 Updates for re certification Document Dates footers and cPP versions updated 11 25 2019 Updated Mercury...

Отзывы: