NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Seagate SecureĀ® TCG SSC Self-Encrypting Drives

Date of Maintenance Completion:  2024.02.15

Product Type:    Encrypted Storage

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Full Drive Encryption - Encryption Engine Version 2.0 + Errata 20190201

Original Evaluated TOE:  2022.04.07 - Seagate SecureĀ® TCG Opal and Enterprise SSC Self-Encrypting Drives

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

There were 6 security relevant fixes and 55 non-security relevant firmware changes associated with this Assurance Maintenance update. The 5 new firmware versions are based on existing certified firmware versions. The assurance impact of these changes is minor and even though there are security-relevant changes included in this update, they are minor and do not require a new certification. There were no changes to the Development Environment, or to the Security Functions.  The following table is an accounting of the firmware changes divided into the sub-categories: Security Relevant Fixes, Feature Enhancements, Performance Improvements, and Bug Fixes.  Detailed information regarding each of the firmware changes is provided in the IAR (Impact Analysis Report).

Category

Number of Changes

Applicability to New Firmware Versions

Security Relevant Fixes

6

Security relevant Fixes were included in all new firmware versions.

Feature Enhancements

3

There were no new Features and all 3 Feature enhancements were included in the new firmware versions

Performance Improvements

3

All three Performance Improvements were included in the new firmware versions.

Bug Fixes

49

45 Bug Fixes were included in all new firmware versions.

 

The code changes did not impact the cryptographic software and, therefore, did not require update to the CAVP certificates. The Security Target was changed to update ST Table 5: ‘Cryptographic Functions’ to show RSA: 3072 bits, from 2048, for Cryptographic signature services and to remove the superfluous CAVP A1086. CAVP A1093, which was already included, supports RSA: 3072 bits for Cryptographic signature service as required.

 

There were changes to the Security Target (ST) to update the TOE Models and Firmware Versions with the new firmware releases. The ST Cryptographic (Signature Verification) FCS_COP.1(a)) section changed to say RSA Digital Signature Algorithm with a key size (modulus) of 3072 from 2048 bit. Certificate #A1086 was removed. The Assurance Activity Report (AAR) was changed to specify the new firmware releases and firmware validation using a 3072-bit instead of 2048-bit public key and to remove CAVP A1086. The Common Criteria Evaluated Configuration Guide (AGD) was updated to new firmware release and to specify RSA Digital Signature Algorithm with a key size of 3072 from 2048 bits. There were no changes to the EAR and KMD except to add the new firmware releases and to update any documentation references to the new version(s).

Vendor Information


Seagate Technology, LLC
Ayan Osman
(720) 684-2008
(720) 684-2008
ayan.m.osman@seagate.com

www.seagate.com
Site Map              Contact Us              Home