background image

 

 

Mercury Systems 

ASURRE

-Stor

®

 

SSD 

 

 

 

 

 

 

 

   Administrative Guidance 

 

 
Copyright 2020   Mercury Systems.  May only be reproduced in its original form (without revision) 

Rev. 1.5.1   February 2020    © 2020 Mercury Systems.   All rights reserved 

 

Mercury Systems, Inc. • (602) 437-1520 •  

www.mrcy.com

 

21

 

29

 

Security Guidance Summary 

The following security guidance may be useful when using the 

ASURRE-S

tor

®

 

SSD in mission critical applications: 

 

The TOE can be configured to operate in one of several modes of operation.  The modes of operation differ in 
how the TOE DEK is established and stored.  Only 2 modes are CC compliant and covered by the CC evaluation.

 

 

a)

 

Self-generated random Permanent key with ATA Password (Mode 1).   

b)

 

KEK with BLACK key and ATA Password (Mode 6).   

Administrators and Crypto Officers performing the initial secure configuration must configure the TOE into one 
of these two modes to ensure that the TOE is CC compliant. 

 

The Crypto Officer 

shall

 inspect each TOE carefully for any signs of tampering that may have occurred during 

shipment  from  Mercury  Systems.    Any  TOE  that  shows  signs  of  tampering  should  be  returned  to  Mercury 
Systems. 

 

The Crypto Officer 

shall

 perform the initial secure configuration of the TOE prior to deploying the unit to the 

field. 

 

The Crypto Officer 

shall

 make no assumptions as to default values for any configurable TOE parameter.   

 

The Crypto Officer 

shall

 configure the initial Configuration Password (Crypto Officer Password) with a minimum 

Configuration Password length of 12 characters and preferably 32 to 64, 8-bit bytes.   

 

The Crypto Officer 

shall

 select the option to disable Firmware Updates.  This option prevents an attacker from 

attempting to change to a different firmware version in the field. 

 

The Crypto Officer 

shall

 enforce the use of 8 character minimum password lengths for the User ATA Password, 

Master ATA Password.  Be aware that the security strength of passwords is directly proportional to the length 
of the password and the number of bits per character as shown in Table 8.   

Password 

Length

 

Password bit strength using all printable 

characters except the space. 

 

(6.555-bits entropy per symbol) 

Password bit strength with all possible 

8-bit values. 

 

(8-bits entropy per symbol) 

52 

64 

12 

78 

96 

16 

104 

128 

24 

157 

192 

32 

209 

256 

64 

419 

512 

Table 8: Password strength in bits 

 

The Crypto Officer 

shall

 enable and configure the Authentication Penalty Count to a value of 1, 5, 10 or 15 and 

inform users that the TOE allows a limited number of failed authentication attempts before executing a penalty 
to clear keys, and all user data in the TOE.  The failed attempts counter increments for invalid ATA Passwords, 
Configuration Passwords, key values, and invalid signatures during firmware updates.    

 

The Crypto Officer 

shall

 enable and configure the initial User ATA Password and Master ATA Password in both 

CC compliant modes. 

 

The Crypto Officer 

shall

 disable intermediate power-savings modes in both CC compliant modes.  This option 

prevents the TOE from entering into a power state other than D0 or D3. 

 

The  Crypto  Officer 

shall

  setup  a  security  inspection  policy  to  inspect  the  TOE  for  evidence  of  enclosure 

tampering  a  minimum  of  once  per  year.    Tamper  evidence  appears  as  enclosure  dents,  marring,  scratches 
caused  by  prying,  milling  or  drilling.    It  may  also  appear  as  missing  screws,  scratched  screw  heads,  damaged 
screw  heads  or  missing  orange  colored  material  (Figure  9,  10,  11)  covering  2  enclosure  corner  screw  heads.  

Содержание ASURRE-Stor ADR256

Страница 1: ...20 Mercury Systems All rights reserved Mercury Systems ASURRE Stor SSD Administrative Guidance Mercury Systems ASURRE Stor ASD256 512 and ADR256 512 Solid State Self Encrypting Drives Non Proprietary...

Страница 2: ...oduct Identification 8 11 Evaluated Configuration 9 12 Part numbers 10 13 Scope of evaluation 11 14 Operating Environment 11 15 Operating environment assumptions and requirements 12 16 Unattended oper...

Страница 3: ...y 17 Table 7 LED Indicator Port 17 Table 8 Password strength in bits 21 List of Figures Figure 1 View of the holographic label located in the center of the main label 9 Figure 2 Images of the ASURRE S...

Страница 4: ...ration of the TOE Please note that use of the MDU utility is optional and not part of the evaluation Programmer s Guide or SSD Programmer s Guide ssdProgrammersGuide pdf This document provides detaile...

Страница 5: ...Maximum which determine how the TOE behaves when the Master Password issued to unlock the device Refer to the ATA7 specification V1 page 22 MDU MDU Utility Mercury Systems Drive Utility MDU is a Windo...

Страница 6: ...r unencrypted shadow MBR sectors or 3rd party Opal software The ASURRE Stor SSD was evaluated against the Common Criteria Collaborative Protection Profile for Full Drive Encryption Encryption Engine v...

Страница 7: ...erformed on the TOE The CO configures the TOE using MDU or a similar custom utility program to operate in Mode 6 The CO fills the BEV KEK and enters a password of up to 64 characters The TOE condition...

Страница 8: ...ower is removed from the TOE the TOE enters power state D3 cold a fully powered off condition Only power state D0 allows access to plain text data Since SSDs never receive warning of imminent power lo...

Страница 9: ...ommand described in SSD Secure Configuration Programmer s Guide section 2 2 to verify that the TOE reports Firmware revision number 1 5 1 Alternatively the MDU utility can be used Refer to MDU section...

Страница 10: ...0 Standard product 1 Electrically isolate enclosure 2 Erase pin 1 option Trigger an erase sanitize operation from SATA pin P1 Option Field z 0 Standard product 1 Legacy erase option Same as field y O...

Страница 11: ...and is conditioned by PBKDF SP 800 132 to create an intermediate derived key that is used to AES key wrap AES KW 256 SP 800 38F the DEK The wrapped DEK is saved in NVRAM During normal operation On ea...

Страница 12: ...fill cables and any needed voltage translation The Administrator and or system designers shall implement application techniques safeguards and or procedures to assure that power is removed from the TO...

Страница 13: ...g mode prior to deployment 18 Secure Configuration Prior to configuration the Administrator must determine the appropriate key management mode for operation Selecting the mode impacts how the host sys...

Страница 14: ...lication c Require the ATA user password enables the KEK with BLACK key and ATA Password mode Set the ATA Password Length to 64 bytes d Enable the Secure Erase Trigger option e Select a Default Secure...

Страница 15: ...nce are listed below a KEK and BLACK DEK mode must be set to KEK and BLACK DEK b The Key Source selection is determined by the CO as required by the fielded application c Require the ATA user password...

Страница 16: ...the ATA password and issue the Get Drive Information command and verify that the TOE is in a CC compliant mode 21 Changing the User or Master ATA Password after the TOE is configured The TOE supports...

Страница 17: ...t 23 Installing the TOE into a host system ESD The ASURRE Stor SSD utilizes both active and passive techniques to mitigate damage caused by severe electro static discharge Mercury Systems recommends f...

Страница 18: ...SSD SATA Connector Warning The power segments of most commercial SATA connectors have every three pins shorted Refer to images in Figure 7 P1 P2 and P3 3 3V shorted P4 P5 and P6 GND shorted P7 P8 and...

Страница 19: ...oves the encrypted result to the NAND media The User Role after successful authentication can access previously encrypted data stored in the NAND media Prior to authentication the User Role cannot wri...

Страница 20: ...components in the TOE use production grade materials The printed circuit board is conformal coated and all BGA devices are under filled with a hard opaque epoxy to prevent easy probing of individual...

Страница 21: ...ion prevents an attacker from attempting to change to a different firmware version in the field The Crypto Officer shall enforce the use of 8 character minimum password lengths for the User ATA Passwo...

Страница 22: ...bel for signs of removal at least once per year While not intended as a tamper seal the label can be difficult to remove and can show signs of damage such as tearing discoloration or other damage if i...

Страница 23: ...ugust 16 2017 8 23 17 Modified per Evaluation findings Rev 1 5 1 Bob Laz Sabrina Pi a 8 21 2019 Updates for re certification Document Dates footers and cPP versions updated 11 25 2019 Updated Mercury...

Отзывы: