Assurance Continuity - Seagate Secure TCG SSC Self-Encrypting Drives
Date of Maintenance Completion: 2019.10.21CC Certificate Validation Report Assurance Activity
Product Type: Encrypted Storage
Conformance Claim: Protection Profile Compliant
PP Identifier: collaborative Protection Profile for Full Drive Encryption - Encryption Engine Version 2.0
Original Evaluated TOE: 2018.04.11 - Seagate Secure TCG SSC Self-Encrypting Drives
Please note: The above files are for the Original Evaluated TOE. Consequently, they do not refer to this maintained version, although they apply to the maintained version.
Assurance Continuity Maintenance Report
Please note: This serves as an addendum to the VR for the Original Evaluated TOE.
* This is the Security Target (ST) associated with the latest Maintenance Release. To view previous STs for this TOE, click here.
Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product. Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate. Such assurance can only be gained through re-evaluation.
Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary. A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target. Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents.
The TOE has been updated in the following ways.
· There are a relatively small number of changes to the validated TOE and only one of the changes has an indirect effect on the secure operation of the TOE. The assurance impact of these changes is minor. The issue “Incorrect sense data return after invoke sanitize follow by power-cycle” occurred due to an omitted variable check after the sanitization had completed successfully that treated the completion state the same as ‘sanitization in progress’. (Change #28)
· The security relevant change submitted in this IAR fix a TCG specification violation due to reporting incorrect sense data, which did not impact the underlying security architecture.
· Additionally, there is one hardware change associated with a new product being added to this certification. This hardware change is minor, encompassing a PCB physical layout change only, and therefore does not present a risk to the security architecture that would necessitate further testing.
· The security relevant fixes and the minor hardware change therefore do not require any updates to developer evidence.
Twenty-nine Common Criteria certified Seagate product models have one of the new firmware versions that are based on existing Common Criteria certified versions
· Firmware version 0003 is based on the certified firmware revision 0002
· firmware versions EF01 is based on certified firmware revision NF04
· firmware versions NF01 are based on certified firmware revision NF04
· firmware versions SF01 is based on certified firmware revision CF04
· firmware versions TF01 is based on certified firmware revision CF04.
Of the 29 product models with one of the new firmware versions, 14 are new and the other 15 are existing hardware. See table below.
The hardware models use the firmware versions as shown in the following table.
IAR 4-2 also specifies 20 existing hardware models that do not use one of the new processors based on certified firmware identified in this IAR. Some use firmware that was the basis of the new firmware.
Seagate Security Certification Contracts
+1 (952) 402-2356