NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - ASURRE-Stor™ Solid State Self-Encrypting Drive, Hardware revision 3.0, Firmware revision 1.5.0

Certificate Date:  2017.08.25

Validation Report Number:  CCEVS-VR-VID10783-2017

Product Type:    Encrypted Storage

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Full Drive Encryption – Authorization Acquisition Version 1.0
  collaborative Protection Profile for Full Drive Encryption - Encryption Engine Version 1.0

CC Testing Lab:  UL Verification Services Inc. (Formerly InfoGard)


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The TOE functions as a standard 2.5” SATA self-encrypting solid state hard drive. The TOE is a solid state device that stores all user data in encrypted form. This provides secure storage of data and facilitates rapid cryptographic erasure via sanitization of the encryption key.

The physical embodiment of the TOE conforms to the EIA SFF-8201 specification. The electrical and software interface is the Serial ATA revision 2.6 specification. As such it can interface to any environment that is compatible with standard 2.5” SATA hard drives. The TOE also uses two of the SATA power interface lines as a serial interface that can serve as an optional method of entering the Key Chain parameters when in KEK with Black Key mode. The TOE also has optional status LEDs and a Write Protect Port.  The TOE can utilize the industry standard ATA security functions to authenticate users and can load or generate its own encryption keys and as such is not dependent on TCG based hardware or a TPM module.


Evaluated Configuration

The TOE is operating in the CC Evaluated configuration when it is configured in Modes 1 or 6.


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. The Mercury Systems ASURRE-Stor™ Solid State Self-Encrypting Drive was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 4, the collaborative Protection Profile for Full Drive Encryption – Encryption Engine, Version 1.0, dated January 26, 2015, and the collaborative Protection Profile for Full Drive Encryption - Authorization Acquisition, Version 1.0, January 26, 2015. The product, when installed and configured per the instructions provided in the guidance, satisfies all of the security functional requirements stated in the Security Target. The evaluation was completed in August 2017. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (CCEVS-VR-10783-2017, dated 25 August 2017) prepared by CCEVS and the Assurance Activities Report (AAR) (17-3660-R-0008 V1.2, dated August 24, 2017).


Environmental Strengths

Cryptographic Support

The TOE utilizes the following cryptographic algorithms:

              AES-XTS-256 – Encryption/decryption of stored data.

              DRBG – Generation of cryptographic keys.

              AES Key Wrap – Encryption/decryption of cryptographic keys.

              SHA-512 – DRBG, HMAC, and ECDSA primitive.

              PBKDF – Derivation of a key from a user provided password.

              ECDSA – Verification of firmware updates.

All algorithms, except for PBKDF, were tested by the CAVP.

User Data Protection

The TOE uses the XTS-AES-256 algorithm to encrypt all user data on the drive. The TOE does not write any plaintext user data to persistent storage.

Security Management

The TOE allows authorized users to change the data encryption key (DEK), cryptographically erase the DEK, initiate firmware updates, import wrapped DEK, change passwords, and configure cryptographic functionality.

Protection of the TSF

The TOE protects itself by running a suite of self-tests at power-up, authenticating firmware and by not providing any mechanism to export any key values. The customer is encouraged to externally fill keys so that an unpowered module contains no CSP information that would lead to compromise of the encrypted data at rest. Beyond self-tests and crypto KATs, the module has numerous continuously running checks built into the C code and the VHDL code. Whenever an error is detected, (corruption, impossible states, out of range values, extra bytes in queues, etc.) that might compromise the security of the module, the module sets a flag and resets. This eliminates any CSP values in FPGA RAM and renews/reloads logic in the FPGA.


Vendor Information

Logo
Mercury Systems
Bob Lazaravich
6024371520
bob.lazaravich@mrcy.com

mrcy.com
Site Map              Contact Us              Home