NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Seagate Secure TCG SSC Self-Encrypting Drives

Date of Maintenance Completion:  2019.12.11

Product Type:    Encrypted Storage

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Full Drive Encryption - Encryption Engine Version 2.0

Original Evaluated TOE:  2018.04.11 - Seagate Secure TCG SSC Self-Encrypting Drives

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with the latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

A new firmware version EF02, which is based on the existing certified firmware revision EF01, was added to 4 validated hardware version models. The update to the firmware is one non-security relevant code change to improve 2MB/4MB random read and write performance which does not impact the underlying security architecture.

 

The hardware models use the firmware versions as shown in the following table.

Validated Hardware Versions

New Firmware Versions

ST10000NM010G

ST12000NM008G

ST14000NM012G

ST16000NM009G

EF02

 

Description of ALC Changes:

Changes to the following documents were made, going from version 5.0 to 6.0:

·         Seagate Secure® TCG SSC Self-Encrypting Drives Security Target, Version 6.0 Proprietary November 27, 2019

·         Seagate Secure® TCG SSC Self-Encrypting Drives Security Target, Version 6.0 Public November 27, 2019

·         Seagate Secure® TCG Enterprise and TCG Opal SSC Self-Encrypting Drive Common Criteria Configuration Guide, Version 6.0 Dated:  November 27, 2019.

·         Seagate Secure® TCG Opal SSC and Seagate Secure TCG Enterprise SSC Self-Encrypting Drive Entropy Documentation Version 6.0 Dated:  November 27, 2019

·         Seagate Secure® TCG Enterprise SSC Self-Encrypting Drive and TCG Opal SSC Self-Encrypting Drive Common Criteria Full Drive Encryption – Encryption Engine Key Management Description Report Version 6.0 Dated: November 27, 2019

 

Assurance Continuity Maintenance Report:

·         Seagate submitted an Impact Analysis Report (IAR) for the four Common Criteria certified models listed above

·         The IAR specifies that the update to the firmware is one non-security relevant code change to improve 2MB/4MB random read and write performance which does not impact the underlying security architecture.

·         There are no changes to the development environment.

·         Code change did not have any impact on the developer evidence of the validated TOE.

·         The changes to the ST and other documents were limited to document version with the addition of the new firmware version.

 

Description of Regression Testing:

For all storage products, Seagate performs a lengthy and rigorous suite of regression tests before releasing any firmware revisions. Regression testing performs a comprehensive set of security and non-security related test cases, including tests for device I/O throughput and performance, device read/write verification, servo performance, shock and vibration, environmental, secure port locking, firmware updates, secure boot signature verification and roll back protection. In addition, secure SED and FIPS or CC certified secure storage products are tested for all aspects of security including all TCG commands, ATA commands, FDE encryption modes, credentials, retry limits, band creation and deletion, and FIPS and CC mode testing. The entire regression test process takes about 21 days to complete. Regression testing was conducted for these firmware releases starting September 6, 2019 and ending October 12, 2019.

 

 

Vulnerability Assessment:

Seagate searched 3 vulnerability databases, National Vulnerability Database (NVD, https://nvd.nist.gov/), MITRE Common Vulnerabilities and Exposures (CVE, http://cve.mitre.org/cve/), and United States Computer Emergency Readiness Team (US-CERT, http://www.kb.cert.org/vuls/html/search) for a large number of terms, on November 20, 2019. No new vulnerabilities were found.

Vendor Information

Logo
Seagate Technology
Seagate Security Certification Contracts
+1 (952) 402-2356
security.cert.contracts@seagate.com

http://www.seagate.com/
Site Map              Contact Us              Home