Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series Security Policy
This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
Page 19 of 19
Exhibit 17 – Signs of Tamper
Mitigation of Other Attacks Policy
The cryptographic module has not been designed to mitigate any specific attacks
beyond the scope of FIPS 140-2.
Other
Attacks
Mitigation
Mechanism
Specific
Limitations
N/A
N/A
N/A
Exhibit 18 - Mitigation of Other Attacks (FIPS 140-2 Table C6)