{"product_id":11272,"v_id":11272,"product_name":"Galleon Embedded Computing XSR and G1 Hardware Encryption Layer","certification_status":"Certified","certification_date":"2022-07-28T00:00:00Z","tech_type":"Encrypted Storage","vendor_id":{"name":"Galleon Embedded Computing","website":"https://www.galleonec.com"},"vendor_poc":"Cory Grosklags","vendor_phone":"+1 (281) 769-8211","vendor_email":"sales@galleonec.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p>The XSR and G1 (hereafter referred to as the Products) can act in multiple different capacities (Network Attached Storage [NAS], data recorder, general server, etc.) and allow for encryption of the Removable Data Module (RDM) attached to the system.&nbsp; The XSR model supports encryption of one RDM (at a time), up to 4 internal SSDs, and its internal, non-removable mSATA SSD.&nbsp; The G1 model also supports encryption of one RDM (at a time) and up to 2 internal SSDs.&nbsp; Both securely encrypt all user data stored within either model.</p>\r\n<p>The Products provide a hardware-based Full Disk Encryption (FDE) of the drives within (an RDM, internal SSDs, and the non-removable mSATA in the XSR).&nbsp; In addition to the hardware-based FDE layer, the TOE also provides a software-based Full Drive Encryption (FDE) layer to encrypt the drive within each RDM.&nbsp; The software-based FDE layer is addressed in a separate evaluation.</p>\r\n<p>The TOE, whether operating within a NAS or a more general server, supports hardware encryption of user data.</p>","evaluation_configuration":"","security_evaluation_summary":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation demonstrated that <span style=\"mso-bidi-font-style: italic;\">the TOE </span>meets the security requirements contained in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The product, when delivered and configured as identified in the <span style=\"mso-no-proof: yes;\">Galleon</span> <span style=\"mso-no-proof: yes;\">Encryption Module Usage Guidelines Certifiable Encryption</span>, Version 1.0.6, July 14<span style=\"mso-no-proof: yes;\">, 2022</span> document, satisfies all of the security functional requirements stated in the <span style=\"mso-no-proof: yes;\">Galleon Embedded Computing XSR and G1 Hardware Encryption Layer Security Target</span>, Version 1.5, July 14<span style=\"mso-no-proof: yes;\">, 2022</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The project underwent CCEVS Validator review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in <span style=\"mso-no-proof: yes;\">July 2022</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID<span style=\"mso-no-proof: yes;\">11272-2022</span>) prepared by CCEVS.</p>","environmental_strengths":"<p>The logical boundaries of the Embedded Computing XSR and G1 Hardware Encryption Layer are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p><strong>Cryptographic support:</strong></p>\r\n<p>The TOE includes cryptographic functionality for key management, user authentication, and block-based encryption including: symmetric key generation, encryption/decryption, cryptographic hashing, keyed-hash message authentication, and password-based key derivation. These functions are supported with suitable random bit generation, key derivation, salt generation, initialization vector generation, secure key storage, and key destruction. These primitive cryptographic functions are used to encrypt Data-At-Rest (including the generation and protection of keys and key encryption keys) used by the TOE.</p>\r\n<p><strong>User data protection:</strong></p>\r\n<p>The TOE performs Full Drive Encryption on the entirety of each drive (so that no plaintext exists) and does so without user intervention.</p>\r\n<p><strong>Security management:</strong></p>\r\n<p>The TOE provides each of the required management services necessary to manage the full drive encryption using a command line interface.</p>\r\n<p><strong>Protection of the TSF:</strong></p>\r\n<p class=\"Body\">The TOE implements a number of features to protect itself to ensure the reliability and integrity of its security features. It protects key and key material and includes functions to perform self-tests and software/firmware integrity checking so that it might detect when it is failing or may be corrupt.If any of the self-tests fails, the TOE will not go into an operational mode<span style=\"font-family: 'Times New Roman',serif;\">.</span></p>","features":[]}