Assurance Continuity - Seagate Secure TCG SSC Self-Encrypting Drives
Date of Maintenance Completion: 2019.12.11CC Certificate Validation Report Assurance Activity
Product Type: Encrypted Storage
Conformance Claim: Protection Profile Compliant
PP Identifier: collaborative Protection Profile for Full Drive Encryption - Encryption Engine Version 2.0
Original Evaluated TOE: 2018.04.11 - Seagate Secure TCG SSC Self-Encrypting Drives
Please note: The above files are for the Original Evaluated TOE. Consequently, they do not refer to this maintained version, although they apply to the maintained version.
Security Target * Assurance Continuity Maintenance Report
Please note: This serves as an addendum to the VR for the Original Evaluated TOE.
* This is the Security Target (ST) associated with the latest Maintenance Release. To view previous STs for this TOE, click here.
Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product. Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate. Such assurance can only be gained through re-evaluation.
Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary. A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target. Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents.
A new firmware version EF02, which is based on the existing certified firmware revision EF01, was added to 4 validated hardware version models. The update to the firmware is one non-security relevant code change to improve 2MB/4MB random read and write performance which does not impact the underlying security architecture.
The hardware models use the firmware versions as shown in the following table.
Description of ALC Changes:
Changes to the following documents were made, going from version 5.0 to 6.0:
· Seagate Secure® TCG Opal SSC and Seagate Secure TCG Enterprise SSC Self-Encrypting Drive Entropy Documentation Version 6.0 Dated: November 27, 2019
· Seagate Secure® TCG Enterprise SSC Self-Encrypting Drive and TCG Opal SSC Self-Encrypting Drive Common Criteria Full Drive Encryption – Encryption Engine Key Management Description Report Version 6.0 Dated: November 27, 2019
Assurance Continuity Maintenance Report:
· Seagate submitted an Impact Analysis Report (IAR) for the four Common Criteria certified models listed above
· The IAR specifies that the update to the firmware is one non-security relevant code change to improve 2MB/4MB random read and write performance which does not impact the underlying security architecture.
· There are no changes to the development environment.
· Code change did not have any impact on the developer evidence of the validated TOE.
· The changes to the ST and other documents were limited to document version with the addition of the new firmware version.
Description of Regression Testing:
For all storage products, Seagate performs a lengthy and rigorous suite of regression tests before releasing any firmware revisions. Regression testing performs a comprehensive set of security and non-security related test cases, including tests for device I/O throughput and performance, device read/write verification, servo performance, shock and vibration, environmental, secure port locking, firmware updates, secure boot signature verification and roll back protection. In addition, secure SED and FIPS or CC certified secure storage products are tested for all aspects of security including all TCG commands, ATA commands, FDE encryption modes, credentials, retry limits, band creation and deletion, and FIPS and CC mode testing. The entire regression test process takes about 21 days to complete. Regression testing was conducted for these firmware releases starting September 6, 2019 and ending October 12, 2019.
Seagate searched 3 vulnerability databases, National Vulnerability Database (NVD, https://nvd.nist.gov/), MITRE Common Vulnerabilities and Exposures (CVE, http://cve.mitre.org/cve/), and United States Computer Emergency Readiness Team (US-CERT, http://www.kb.cert.org/vuls/html/search) for a large number of terms, on November 20, 2019. No new vulnerabilities were found.
Seagate Security Certification Contracts
+1 (952) 402-2356