{"product_id":10861,"v_id":10861,"product_name":"DTS1 Hardware Encryption Layer v1.0","certification_status":"Certified","certification_date":"2018-10-19T00:00:00Z","tech_type":"Encrypted Storage","vendor_id":{"name":"Curtiss-Wright Defense Solutions","website":"www.curtisswright.com"},"vendor_poc":"Paul Davis","vendor_phone":"937-610-5421","vendor_email":"pdavis@curtisswright.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p><span style=\"font-family: Times; font-size: small;\">The Curtiss-Wright Defense Solutions Data Transport System 1-Slot Hardware Layer (hereafter referred to as the TOE) is a hardware encryption layer that is used for Data-At-Rest (DAR) encryption as part of the underlying rugged Network Attached Storage (NAS) file server, denoted as the Curtiss-Wright DTS1 CSFC/ECC Cryptographic Data Transport System (DTS) (hereafter referred to as the DTS1). The underlying DTS1 is intended for use in Unmanned Aerial Vehicles (UAV), Unmanned Underwater Vehicles (UUV), and Intelligence Surveillance Reconnaissance (ISR) aircraft.<span style=\"margin: 0px;\">&nbsp; </span>Easily integrated into network centric systems, the DTS1 is an easy to use, turnkey, rugged network File Server that houses one Removable Memory Cartridge (RMC) that provides quick off load of data. The RMC can be easily removed from one DTS1 and installed into any other DTS1 providing full, seamless data transfer between one or more networks in separate locations (e.g. ground =&gt; vehicle =&gt; ground).<span style=\"margin: 0px;\">&nbsp; </span>In addition to the software-based FDE layer provided by the DTS1 (see the separate ST corresponding to that evaluation), the DTS1 provides a hardware-based Full Drive Encryption (FDE) layer to encrypt the drive within the RMC.</span></p>","evaluation_configuration":"","security_evaluation_summary":"<p><span style=\"font-family: Times; font-size: small;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.<span style=\"margin: 0px;\">&nbsp; </span>The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 4, September 2012. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 4, July 2012.<span style=\"margin: 0px;\">&nbsp;&nbsp;&nbsp; </span>The product, when delivered and configured as identified in the <span style=\"margin: 0px;\">Curtiss-Wright</span> <span style=\"margin: 0px;\">Curtiss-Wright DTS1 CSfC / ECC Cryptographic Data Transport System (Network File System) User Guide, DDOC0099-000-A2, March 23, 2018</span>, satisfies all of the security functional requirements stated in the <span style=\"margin: 0px;\">Curtiss-Wright</span> <span style=\"margin: 0px;\">Data Transport System 1-Slot Hardware Encryption Layer</span> (<span style=\"margin: 0px;\">FDEEEcPP20/FDEAAcPP20</span>) Security Target, Version 0.6, October 18<span style=\"margin: 0px;\">, 2018</span>.<span style=\"margin: 0px;\">&nbsp; </span>The project underwent CCEVS Validator review.<span style=\"margin: 0px;\">&nbsp; </span>The evaluation was completed in <span style=\"margin: 0px;\">October 2018</span>.<span style=\"margin: 0px;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</span></p>\r\n<p>&nbsp;</p>","environmental_strengths":"<p><span style=\"font-family: Times; font-size: small;\">The logical boundaries of the TOE are realized in the security functions that it implements. Each of these security functions is summarized below.</span></p>\r\n<p style=\"margin: 0px; text-align: justify;\"><strong><span style=\"font-family: Times; font-size: small;\">Cryptographic support:</span></strong></p>\r\n<p style=\"margin: 0px; text-align: justify;\"><span style=\"margin: 0px; font-family: 'Times New Roman',serif;\"><span style=\"font-size: small;\">The TOE includes cryptographic functionality for key management, user authentication, and block-based encryption including: symmetric key generation, encryption/decryption, cryptographic hashing, keyed-hash message authentication, and password-based key derivation. These functions are supported with suitable random bit generation, key derivation, salt generation, initialization vector generation, secure key storage, and key destruction. These primitive cryptographic functions are used to encrypt Data-At-Rest (including the generation and protection of keys and key encryption keys) used by the TOE.</span></span></p>\r\n<p style=\"margin: 0px; text-align: justify;\">&nbsp;</p>\r\n<p style=\"margin: 0px; text-align: justify;\"><strong><span style=\"font-family: Times; font-size: small;\">User data protection:</span></strong></p>\r\n<p style=\"margin: 0px; text-align: justify;\"><span style=\"margin: 0px; font-family: 'Times New Roman',serif;\"><span style=\"font-size: small;\">The TOE is designed to perform Full Drive Encryption on the entire drive (so that no plaintext exists) and does so without user intervention.</span></span></p>\r\n<p style=\"margin: 0px; text-align: justify;\">&nbsp;</p>\r\n<p style=\"margin: 0px; text-align: justify;\"><strong><span style=\"font-family: Times; font-size: small;\">Security management:</span></strong></p>\r\n<p style=\"margin: 0px; text-align: justify;\"><span style=\"margin: 0px; font-family: 'Times New Roman',serif;\"><span style=\"font-size: small;\">The TOE provides each of the required management services necessary to manage the full drive encryption using a command line interface.</span></span></p>\r\n<p style=\"margin: 0px; text-align: justify;\">&nbsp;</p>\r\n<p style=\"margin: 0px 0px 8px;\"><span style=\"margin: 0px; font-family: 'Times New Roman',serif;\"><span style=\"font-size: small;\">The TOE implements a number of features designed to protect itself to ensure the reliability and integrity of its security features. It protects key and key material, and includes functions to perform self-tests and firmware integrity checking so that it might detect when it is failing or may be corrupt.<span style=\"margin: 0px;\">&nbsp; </span>If any of the self-tests fail, the TOE will not go into an operational mode.</span></span></p>","features":[]}