TRUSTED COMPUTING GROUP TRUSTED STORAGE SPECIFICATION. Jason Cox, Seagate Technology

Size: px
Start display at page:

Download "TRUSTED COMPUTING GROUP TRUSTED STORAGE SPECIFICATION. Jason Cox, Seagate Technology"

Transcription

1 TRUSTED COMPUTING GROUP TRUSTED STORAGE SPECIFICATION Jason Cox, Seagate Technology

2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the Author nor the Presenter is an attorney and nothing in this presentation is intended to be nor should be construed as legal advice or opinion. If you need legal advice or legal opinion please contact an attorney. The information presented herein represents the Author's personal opinion and current understanding of the issues involved. The Author, the Presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2

3 Abstract Trusted Computing Group (TCG) Trusted Storage Specification The Trusted Computing Group (TCG) Storage Work Group recently published formal specifications for security and trust services on storage devices, including hard drives, flash, and tape drives. The majority of hard drive and other storage device manufacturers participated. Putting security directly on the storage device avoids the vulnerabilities of platform OS-based software security. The details of the Specification will be highlighted, as well as various use cases, including Full Disk Encryption with enterprise key/credential management. 3

4 TCG Storage Work Group Structure Storage WG Robert Thibadeau Seagate Key Management Services Walt Hubis LSI Storage Interface Interactions James Hatfield Seagate Optical Storage Bill McFerrin DataPlay Storage Conformance Cyril Guyot HGST/ Dave Kreft/NSA 4

5 Security in Storage 3 Simple reasons Storage for secrets with strong access control Inaccessible using traditional storage access Arbitrarily large memory space Gated by access control Unobservable cryptographic processing of secrets Processing unit welded to storage unit Closed, controlled computing environment Custom logic for faster, more secure operations Inexpensive implementation of modern cryptographic functions Complex security operations are feasible 5

6 General Risk Model Storage Peripheral Controller Electronics Primary Host Interface Power Loadable Firmware Firmware Functions Data Sink / Source Special Hardware Functions Diagnostic Ports Probe Points Trust = systems operate as intended Objective: Exercise control over operations that might violate trust Needed: Trusted Storage commands 6

7 Joint Work T10 (SCSI) & T13 (ATA) TRUSTED SEND/ SECURITY PROTOCOL IN (Protocol ID = xxxx..) TRUSTED RECEIVE/ SECURITY PROTOCOL OUT T10/T13 define the container commands TCG SWG defining the TCG payload Protocol IDs assigned to TCG, T10/T13, other standards organizations, or reserved 7

8 TCG SWG Document Structure General Documents TCG Storage Core Architecture Specification Storage Interface Interactions Specific Documents Security Subsystem Class (SSC) Security Subsystem Class (SSC) Auxiliary Documents Compliance Security Evaluation Compliance Security Evaluation 8

9 TCG Storage Specification Overview TCG Storage Core Architecture Specification Version 1.0 Revision 0.9 (DRAFT) 19 June

10 TCG Storage Specification Purpose Define an architecture that: Enables application of access control over select device features Permit configuration of these capabilities in conformance to the platform security policy 10

11 Implementation Overview Enterprise Support Host Application TCG/T10/T1 3 Trusted Container Commands ATA or SCSI TRUSTED STORAGE Firmware/hardware enhancements for security and cryptography Firmware Hidden Storage Security Providers SP Controller Storage Partitioned Hidden Storage Security firmware/hardware Trusted Commands Assign Hidden Storage to Applications TRUSTED Assign Hidden Storage to Applications 11

12 TCG Storage Architecture Overview SD or TPer SW and HW features and function (e.g., Crypto Calls) TCG Storage Architecture ADMIN SP 1 SP 2 SP 3 SP 4 TCG Storage API ATA/ SCSI I/F Host Devices TPM Applications End Users Internet Mobile Devices Service Providers The host platform, applications, devices, local end users, or remote users/service providers can gain exclusive control of selected features of the storage device. This allows them to simultaneously and independently extend their trust boundary into the storage device or trusted peripheral (TPer). 12

13 Security Providers (SPs) Storage Work Group specifications are intended to provide a comprehensive command architecture for putting selected features of storage devices under policydriven access control. Features are packaged into individual functionality containers called SECURITY PROVIDERS (SPs). SP Method Name ACL Each SP is a sand box exclusively controlled by its owner. SP functionality is a combination of pre-defined functionality sets called SP TEMPLATES Base Log Admin Clock Crypto Locking Table Get Set User1 User2 SPs are a collection of TABLES and METHODS that control the persistent trust state of the Storage Device (SD). M Method invocation occurs under access control. Authorities User1 User2 M The SP has a list of authorities and their respective credentials for access control. 13

14 SPs Summary SPs have Their own storage, functional scope, and security domain SPs are created by: Manufacturer (during Storage Device creation) AND/OR Issuance Tables store persistent state information Remains active through power cycles, resets, spin up/down, device formats Methods remote procedure calls that operate on tables or the SP Table management Table read/write Authentication Access Control management are actions such as: table additions, table deletion, table read access, and table backup Authorities authentication agents. Specify cryptographic proofs required to execute the methods in the SP Access Control Lists define authorization requirements for method invocation 14

15 Templates Templates are sets of tables and methods, grouped by feature, from which SPs are built. Base All SPs include a subset of tables and methods defined by the Base template Provides authentication and access control-related tables and methods Admin Only one SP on a device includes this template Stores configuration/capability information Used in Issuance Locking Only one SP on a device includes this template Provides management capabilities for locking, encryption, and MBR shadowing Crypto Methods and tables enabling host-invoked on-device signing, verification, hash, HMAC, and encrypt/decrypt Log Adds forensic logging of SP access Clock Enables time stamping for logging, adds time limitations to authorities 15

16 Tables Tables provide data storage in SPs. Each template defines a set of tables. Capabilities provided by the Base template allow the host to create additional tables. Two types of tables: Object organized storage Byte raw data Each column stores data all of the same type. UID column contains SP-wide unique, addressable value for that row. Rows associate column values. Byte tables have 0 or more rows indexed by position in the table. Object Table UID Col2 Col3 Col4 8 byte unique identifier Data Data Data Byte Table Index Column 0 0x41 1 0x42 2 0x43 Byte tables have a single column. Each cell stores one byte 16

17 Methods Methods are remote procedure calls invoked by the host to manipulate SP state. Methods operate on tables or the SP itself, and are used for session startup, authentication, table manipulation, and access control customization. UID of the table or object upon which the method is being invoked. UID of the invoked method. List of method parameters sent by host. List of results generated by TPer InvokingUID.MethodUID [ Method Parameters ] => [ Method Result ] Key Methods Get Retrieve values stored in tables. Set Change values stored in tables. Authenticate Prove host knowledge of a secret Other methods provide capability to: Create/delete tables/table rows Generate encryption keys on the device Perform cryptographic operations on the device 17

18 Access Control - Authentication Access control defines the authorization required to invoke specific methods. Access control permissions apply at the SP, table, or table row level. Access control settings are configurable and assignable. Authorities are authentication agents Authority UID Name Credential Operation 8 byte identifier Admin C_RSA_1024 UID Sign --- User C_PIN UID Password --- User C_RSA_1024 UID Sign Link to authentication credential Authorities required authentication operation C_PIN UID Name PIN 8 byte identifier Auth PWD C_RSA_1024 UID Name Key Material 8 byte identifier Auth Key Auth Key Credential (C_*) tables store authentication secrets The Host Application invokes the Authenticate method, identifying the Authority to be authenticated and the required proof (password, signed challenge, etc.) 18

19 Access Control - Application Method: XXX.YYY [ ] AccessControl InvokingID MethodID ACL XXX YYY XXX ZZZ XXX ACL column holds a list of ACE UIDs BooleanExpr column holds Authority UIDs and Boolean Operators UID XXX Table Column1 Column2 Column3 ACE (Access Control Element) BooleanExpr Columns User1 Column1,Column Columns identifies the columns to which the ACE applies 19

20 Access Control - Hierarchy Table/Object/SP + Method (InvokingUID.MethodUID) List of ACEs ACL ACE1 ACE2 ACE3 Authority1 AND Authority2 Authority1 OR Authority3 (Authority1 AND Authority2) OR Authority3 20

21 Templates The Base Template is comprised of a core set of commonly used tables and methods. A subset of the Base Template provides the basis for every SP, and enables authentication, access control, and table management. Tables Methods SPInfo C_PIN DeleteSP GetFreeSpace SPTemplates C_RSA_1024 CreateTable GetFreeRows Table C_RSA_2048 Delete DeleteMethod Column C_AES_128 CreateRow Authenticate Type C_AES_256 DeleteRow GetACL MethodID C_HMAC_160 Get AddACE AccessControl C_HMAC_256 Set RemoveACE ACE C_HMAC_384 Next GenKey Authority C_HMAC_512 Certificates C_EC_*** 21

22 Templates The Admin Template provides capabilities to allow the host to retrieve device information, affect state of SPs, and issue new SPs. Tables Methods TPerInfo Template CryptoSuite SP IssueSP The Locking Template provides mechanisms to manage LBA range locking, encryption, re-encryption, and MBR shadow, as well as tables that allow management of LBA range encryption keys. Tables Methods LockingInfo MBRControl GetPackage SetPackage Locking MBR K_AES_128 K_AES_256 22

23 Templates The Crypto Template defines tables and methods that enable hostinvoked cryptographic operations with host-supplied data to occur in the device, including hashing, encryption, decryption, signing, and verification. Tables Methods H_SHA_1 H_SHA_384 Random HashInit H_SHA_256 H_SHA_512 Stir Hash EncryptInit HashFinalize Encrypt HMACInit EncryptFinalize HMAC DecryptInit HMACFinalize Decrypt Sign DecryptFinalize Verify XOR 23

24 Templates The Log Template provides a mechanism to enable forensic logging of host access to the SP. Tables Methods Log LogList AddLog ClearLog CreateLog FlushLog The Clock Template enables time stamping of log entries, as well as enhancement of authentication limitations by providing time-limited authorities. Tables ClockTime SetClockHigh Methods GetClock SetLagHigh SetClockLow ResetClock IncrementCounter SetLagLow 24

25 Communications Architecture 25

26 Communications - ComIDs Multiple scenarios for Application-SP communication exist: Single Application communicating with a single SP Single Application communicating with multiple SPs Multiple Applications communicating with multiple SPs. TPer App 1 ADMIN SP 1 SP 2 SP 3 App 2 App 4 App 5 SP 4 App 3 26

27 Communications - Sessions An application communicates with an SP via a session. Each separate application is assigned a ComID that it uses to identify itself to the device. Each session is associated with a ComID. Multiple sessions can be associated with a single ComID. TPer ADMIN SP 1 SP 2 SP 3 SP 4 Storage Device Application ComID assigned to application by device Host Application Session between Application and SP 27

28 Communications - Structures ComPacket unit of communication transmitted as the payload of an Interface Command. May hold multiple packets in its payload. Packet associated with a particular session between an App & SP May hold multiple SubPackets. SubPacket contains data (Tokens) or buffer management information Token encoded data Session1 Data Session2 Data Tokens Tokens SubPacket SubPacket SubPacket SubPacket SubPacket SubPacket Packet Packet ComPacket SessionX Data Tokens SubPacket SubPacket SubPacket Packet Trusted Command 28

29 SP Issuance/Personalization Overview Issuance Creation of a new SP (exchange/validation of credentials), including activation of drive features Templates Define SP s initial tables and methods. Personalization Customization of a newly created SP via modification of table data, administrator and other authorities, default access control settings, etc. Issuance Server SP 29

30 SP Issuance/Personalization Overview Users/applications/services obtain a certificate from an authorized organization to obtain an SP with the desired capabilities on a given storage device. The storage device owner must authorize the issuance. Once issued, the SP can be customized by the user/app/service. Storage Device Admin SP Storage Device owner must also authorize issuance. Org 1 Auth. Org 1 Org 1 is a preinstalled authority. SP A (Base+Locking) Auth. AppA_Auth M M App A SP A is issued with default tables/values and AppA_Auth is the only authority. App A can now customize the SP. Which Templates E.g., Base + Locking Which storage device How much storage Etc. 30

31 Some TCG Storage Use Cases Self Encrypting Drive Management LBA Range Management Locking/Unlocking of LBA Ranges Secure Erase End-of-Life, Repurposing Drive Verification Generic Secure Storage Forensic Logging 31

32 Self-Encrypting Drive Basics The storage device LOCKS when it powers OFF. The storage device remains LOCKED when it is powered back ON. Authentication UNLOCKS the storage device. The storage devices Reads and Writes data normally while drive is unlocked The plaintext data sent to the device is encrypted before being written The encrypted data read from the device is decrypted before being returned Authentication Key Management Service Write Read Here is the P%k5t$ text #&% 100% performance encryption engine in the drive Data protected from loss, disclosure 32

33 Locking SP Creation The Locking SP enables host management of Self Encrypting Drive functionality using the TCG Storage Architecture. The Locking SP incorporates a subset of at least the Base and Locking Templates. Other Templates may be incorporated at issuance to enable additional capabilities. SPInfo SPTemplates Table Column Type MethodID AccessControl ACE C_PIN C_RSA_1024 Authenticate GetACL AddACE RemoveACE GenKey Get Base Template Tables & Methods Authority Certificates Set Next Issuance Locking SP LockingInfo Locking MBRControl MBR K_AES_128 Locking Template Tables & Methods 33

34 Retrieving Configurations An authorized User can, access control permitting, read device information and configurations from the Admin SP, and locking configurations from the Locking SP. Application communication with different SPs is performed using separate sessions. Storage Device Admin SP Auth. Org 1 M User password User authenticates to the SP and retrieves configuration information using App A. Locking SP Get App A App A invokes Get to retrieve configurations. M 34

35 LBA Range Encryption & Locking The storage device can have only one SP with Locking capability. Access control to user data can be configured. The storage device will support a certain number of independent ranges of user data. Storage Device Independent encryption and access control for each range. Range 1 Range 2 Range 3 User 1 User 2 Locking SP Locking Table App A App A is responsible for configuring encryption and access control for all users Auth. M M There can only be one Locking SP per Storage Device. 35

36 Locking Ranges The Locking SP enables independent ranges of the user data space to be separately configured for read/write access control by an authorized and authenticated user (typically an Administrator). Storage Device Separately configured portions of user data space Range 1 Range 2 Range 3 User password User authenticates to the SP and configures the ranges using App A. Locking SP Locking Table Set App A App A invokes Set to configure the starting address and length of each range. M M Range settings are stored in the Locking table. 36

37 Configuring Passwords Each user can be assigned a separate password that is used for authentication to the Locking SP. Storage Device Range 1 Range 2 Range 3 User password User authenticates to the SP and configures the password using App A. Locking SP C_PIN Table Set App A App A invokes Set to change the password. M M Passwords are stored in the C_PIN table. 37

38 Unlocking Ranges The authorized user authenticates with his password and then unlocks the ranges to which she has access. Storage Device Unlocked range Range 1 Range 2 Range 3 User password User authenticates to the SP and changes unlocks the ranges to which she has access using App A. Locking SP Locking Table Set App A App A invokes Set to change the locking values of the appropriate ranges. Auth. M M Range settings are stored in the Locking table. 38

39 Secure Erase The Locking SP provides the users with the ability to erase data, securely and quickly, by replacing the encryption key for a range with a new key randomly generated securely in the drive. This ability can be assigned based on security policy and device capability. Storage Device New encrypting key for the range Range 1 Range 2 Range 3 User password User authenticates to the SP and erases the range using App A. Locking SP K_* Table GenKey App A App A invokes GenKey to generate a new key for the range. Auth. M M 39

40 Incorporating Additional Features The basic Locking SP can be enhanced by incorporating additional Templates or a larger subset of the Base Template at issuance. SPInfo SPTemplates Table Column Type MethodID AccessControl ACE C_PIN C_RSA_1024 Authenticate GetACL AddACE RemoveACE GenKey Get Base Template Tables & Methods Authority Certificates Set Next Issuance Locking SP LockingInfo Locking MBRControl MBR K_AES_128 Locking Template Tables & Methods Random Sign Crypto Template Methods 40

41 Locking SP Random Method With the Crypto Template s Random method activated at Issuance, the Locking SP can provide additional functionality for the host. The Random method allows the host to retrieve random bytes generated by the device s RNG. Storage Device Locking SP Random User App A password User authenticates to the SP and retrieves random bytes using App A. App A invokes Random to request randomly generated bytes from the device. Auth. M 41

42 Locking SP Sign Method With the Crypto Template s Sign method activated at Issuance, the Locking SP can provide additional functionality for the host. The host can verify a device by having the device sign a host-generated challenge. Storage Device Locking SP Auth. C_RSA_* Table M Sign User App A password User authenticates to the SP requests that the device sign a challenge. App A invokes Sign and sends a nonce, which the device will sign using its private key. The signed nonce validates the device to the host. 42

43 Interface Interactions Storage Interface Interactions Subgroup Define a support document for Core Spec and SSCs Maps Core Spec defined resets to associated interface resets Maps TCG-based interface command errors in IF-SEND/IF-RECV to associated interface errors Provides common place for reference 43

44 Security Subsystem Classes Storage Security Subsystem Class = SSC Storage Architecture Core Specification HDD SSC - Notebook HDD SSC - Enterprise Optical SSC (OSSC) 44

45 Optical SSC Goal transparent compatible ease of use unobtrusive FDE 45

46 Other Uses (Home banking, remote medical, Trusted Platform with Trusted Storage -Multi-factor authentication: password, biometrics, dongles -Secure/hardware storage of credentials, confidential financial/medical data -Trusted life cycle management of personal information -Integrity-checking of application software -Cryptographic functions for storage and communications security -Trusted/secure computation of high-value functions (protection from viruses/etc) 46

47 Enterprise Management of Self Encrypting Drives SP FDE Enterprise Server: Key generation and distribution Key/Password archive, backup and recovery Laptop (Application): Master/User passwords, multi-factor authentication, TPM support Secure log-in, Secure Fast Erase Self Encrypting Trusted Drive: Disk or sector encryption, sensitive credential store, drive locking 47

48 The Future Encryption Automatic performance scaling, manageability, security Standards-based Multiple vendors; interoperability Unified key management Handles all forms of storage 48

49 Thank You! 49

50 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: tracksecurity@snia.org Many thanks to the following individuals for their contributions to this tutorial. - SNIA Education Committee Robert Thibadeau Michael Willett All Storage Manufacturers (contributors) 50

TRUSTED COMPUTING GROUP TRUSTED STORAGE SPECIFICATION. Michael Willett, Seagate Technology

TRUSTED COMPUTING GROUP TRUSTED STORAGE SPECIFICATION. Michael Willett, Seagate Technology TRUSTED COMPUTING GROUP TRUSTED STORAGE SPECIFICATION Michael Willett, Seagate Technology SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Trusted Computing Group Trusted Storage Specification. Michael Willett, Seagate Technology

Trusted Computing Group Trusted Storage Specification. Michael Willett, Seagate Technology Trusted Computing Group Trusted Storage Specification Michael Willett, Seagate Technology SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Trusted Storage. Putting Security and Data Together. Michael Willett Seagate Technology

Trusted Storage. Putting Security and Data Together. Michael Willett Seagate Technology Trusted Storage Putting Security and Data Together Michael Willett Seagate Technology Why Encrypt Data-At-Rest? Compliance 42+ states have data privacy laws with encryption safe harbors New data breach

More information

Click to edit Master. Trusted Storage. title style. Master subtitle style Seagate Technology

Click to edit Master. Trusted Storage. title style. Master subtitle style Seagate Technology Click to edit Master Trusted Storage title style Click Dave to edit Anderson Master subtitle style Seagate Technology - TRUST - system behaves as designed Cryptographic SIGNING PlaintextMessage + Signed(Hash(PlaintextMessage))

More information

Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1

Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1 Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept 2005 TCG Track: SEC 502 1 The Need for Trusted Computing 2 The Real World Innovation is needed: Client software

More information

TCG Storage Security Subsystem Class: Pyrite. Specification Version 1.00 Revision August 5, Contact:

TCG Storage Security Subsystem Class: Pyrite. Specification Version 1.00 Revision August 5, Contact: TCG Storage Security Subsystem Class: Pyrite Revision 1.00 August 5, 2015 Contact: admin@trustedcomputinggroup.org TCG PUBLISHED Copyright TCG 2015 Copyright 2015 Trusted Computing Group, Incorporated.

More information

TCG. TCG Storage Opal SSC: Test Cases Specification. Specification Version 2.01 Revision 2.18 January 30, 2018 Published

TCG. TCG Storage Opal SSC: Test Cases Specification. Specification Version 2.01 Revision 2.18 January 30, 2018 Published TCG Storage Opal SSC: Test Cases Specification Specification Version 2.01 Revision 2.18 January 30, 2018 Published Contact: admin@trustedcomputinggroup.org TCG Published Copyright TCG 2018 Copyright 2018

More information

TCG Storage Security Subsystem Class: Opal. Specification Version 2.01 Revision August 5, Contact:

TCG Storage Security Subsystem Class: Opal. Specification Version 2.01 Revision August 5, Contact: TCG Storage Security Subsystem Class: Opal Revision 1.00 August 5, 2015 Contact: admin@trustedcomputinggroup.org TCG PUBLISHED Copyright TCG 2015 Copyright 2015 Trusted Computing Group, Incorporated. Disclaimers,

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

TCG Storage Application Note: Encrypting Drives Compliant with Opal SSC

TCG Storage Application Note: Encrypting Drives Compliant with Opal SSC TCG Storage Application Note: Encrypting Drives Compliant with Opal SSC Specification Version 1.00 Final Revision 1.00 19 February, 2010 Contact: admin@trustedcomputinggroup.org TCG Copyright TCG 2010

More information

TCG Storage Opal SSC Feature Set: PSID. Specification Version 1.00 Revision August 5, Contact:

TCG Storage Opal SSC Feature Set: PSID. Specification Version 1.00 Revision August 5, Contact: TCG Storage Opal SSC Feature Set: PSID Revision 1.00 August 5, 2015 Contact: admin@trustedcomputinggroup.org TCG PUBLISHED Copyright TCG 2015 Copyright 2015 Trusted Computing Group, Incorporated. Disclaimers,

More information

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas

SCSI Security Nuts and Bolts. Ralph Weber, ENDL Texas SCSI Security Nuts and Bolts Ralph Weber, ENDL Texas SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations

More information

Designing Secure Storage for the Cloud Jesus Molina Fujitsu Laboratories of America

Designing Secure Storage for the Cloud Jesus Molina Fujitsu Laboratories of America Designing Secure Storage for the Cloud Jesus Molina Fujitsu Laboratories of America Introduction Trusted Computing and Cloud Overview of Trusted Computing CSA guidelines and TCG standards Trusted Storage

More information

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...

More information

HDD Based Full Disc Encryption

HDD Based Full Disc Encryption HDD Based Full Disc Encryption Dave Anderson Seagate Technology, M/S SHK233, 1280 Disc Drive Shakopee MN 55379-1863, Ph: +1-952-402-2991 e-mail: david.b.anderson@seagate.com Presented at the THIC Meeting

More information

Advances in Storage Security Standards

Advances in Storage Security Standards Advances in Storage Security Standards Jason Cox Security Architect, Intel Corporation Co-Chair, TCG Storage WG Objectives Provide background on Trusted Computing Group (TCG) Storage Work Group Goals How

More information

Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance. Ray Lucchesi Silverton Consulting, Inc.

Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance. Ray Lucchesi Silverton Consulting, Inc. Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance Ray Lucchesi Silverton Consulting, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy Security Level 2 Rev. 0.7 July 02, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction... 3 1.1

More information

TCG. TCG Storage Interface Interactions Specification. Specification Version 1.0. January 27, Contacts:

TCG. TCG Storage Interface Interactions Specification. Specification Version 1.0. January 27, Contacts: TCG Storage Interface Interactions Specification January 27, 2009 Contacts: storagewg@trustedcomputinggroup.org Copyright TCG 2009 TCG Copyright 2009 Trusted Computing Group, Incorporated. Disclaimer,

More information

Seagate Secure TCG Enterprise and TCG Opal SSC Self-Encrypting Drive Common Criteria Configuration Guide

Seagate Secure TCG Enterprise and TCG Opal SSC Self-Encrypting Drive Common Criteria Configuration Guide Seagate Secure TCG Enterprise and TCG Opal SSC Self-Encrypting Drive Common Criteria Configuration Guide Version 1.0 February 14, 2018 Contents Introduction 3 Operational Environment 3 Setup and Configuration

More information

Seagate Momentus Thin Self-Encrypting Drives TCG Opal FIPS 140 Module Security Policy

Seagate Momentus Thin Self-Encrypting Drives TCG Opal FIPS 140 Module Security Policy Seagate Momentus Thin Self-Encrypting Drives TCG Opal FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 Aug 30, 2010 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction... 3 1.1 1.2

More information

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 0.

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 0. Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy Security Level 2 Rev. 0.6 January 09, 2015 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction... 4

More information

TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.02 Revision December, 2011 TCG

TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.02 Revision December, 2011 TCG TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.02 Revision 1.00 30 December, 2011 TCG TCG PUBLISHED Copyright TCG 2011 Copyright 2011 Trusted Computing Group, Incorporated.

More information

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft Notes & Lessons Learned from a Field Engineer Robert M. Smith, Microsoft SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may

More information

Personal Cloud Self Protecting Self Encrypting Storage Devices

Personal Cloud Self Protecting Self Encrypting Storage Devices Personal Cloud Self Protecting Self Encrypting Storage Devices Robert Thibadeau, Ph.D. Chairman & CEO Drive Trust Alliance Bright Plaza, Inc. & School of Computer Science Carnegie Mellon University Takeaways

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may

More information

SRM: Can You Get What You Want? John Webster, Evaluator Group.

SRM: Can You Get What You Want? John Webster, Evaluator Group. SRM: Can You Get What You Want? John Webster, Evaluator Group. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this

More information

Trusted Optical Disc March 2008

Trusted Optical Disc March 2008 Trusted Optical Disc March 2008 1 Agenda TCG - Trusted Optical Disc mission Overview - 2 minute drill Target Features/Platforms/Markets Optical SSC Details 2 Trusted Optical Disc Mission Encrypt data on

More information

TCG. TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.07 Revision 1.00 January 30, 2018

TCG. TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.07 Revision 1.00 January 30, 2018 TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.07 Revision 1.00 January 30, 2018 Contact: admin@trustedcomputinggroup.org TCG PUBLISHED Copyright TCG 2018 Copyright 2018

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2

More information

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 1.0 May 11, 2015

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 1.0 May 11, 2015 Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy Security Level 2 Rev. 1.0 May 11, 2015 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction... 4 1.1

More information

TCG. TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.08 Revision 1.00 October 26, 2018

TCG. TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.08 Revision 1.00 October 26, 2018 TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.08 Revision 1.00 October 26, 2018 Contact: admin@trustedcomputinggroup.org TCG PUBLISHED Copyright TCG 2018 Copyright 2018

More information

FDE itc: Encryption Engine (EE) cpp Functional and Assurance Requirements

FDE itc: Encryption Engine (EE) cpp Functional and Assurance Requirements FDEiTC-EE-English-00 v0. 0-0- 0 0 FDE itc: Encryption Engine (EE) cpp Functional and Assurance Requirements BEV (Border Encryption Value) - the key(s) (or secret(s)) that is passed from the AA to the EE

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member

More information

Data Deduplication Methods for Achieving Data Efficiency

Data Deduplication Methods for Achieving Data Efficiency Data Deduplication Methods for Achieving Data Efficiency Matthew Brisse, Quantum Gideon Senderov, NEC... SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

TCG Storage Workgroup Security Subsystem Class: Optical. Contacts:

TCG Storage Workgroup Security Subsystem Class: Optical. Contacts: TCG Storage Workgroup Security Subsystem Class: Optical 2008 September 25 Contacts: optical_storage@trustedcomputinggroup.org TCG . Disclaimer THIS SPECIFICATION IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER,

More information

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG Interoperable Cloud Storage with the CDMI Standard Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation PRESENTATION TITLE GOES HERE January 28, 206 SNIA Presenters Alex McDonald Chair - SNIA Cloud Storage NetApp Martin Rosner

More information

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE Luanne Dauber, Pure Storage Author: Matt Kixmoeller, Pure Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata John Webster Principal IT Advisor, Illuminata SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations

More information

Cloud Archive and Long Term Preservation Challenges and Best Practices

Cloud Archive and Long Term Preservation Challenges and Best Practices Cloud Archive and Long Term Preservation Challenges and Best Practices Chad Thibodeau, Cleversafe Inc. Sebastian Zangaro, HP Author: Chad Thibodeau, Cleversafe Inc. SNIA Legal Notice The material contained

More information

Blockchain Beyond Bitcoin. Mark O Connell

Blockchain Beyond Bitcoin. Mark O Connell Mark O Connell mark@mkoconnell.com SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material

More information

Multi-Cloud Storage: Addressing the Need for Portability and Interoperability

Multi-Cloud Storage: Addressing the Need for Portability and Interoperability Multi-Cloud Storage: Addressing the Need for Portability and Interoperability Live Webcast December 12, 2017 12:00 pm PT Today s Presenters John Webster Senior Partner Evaluator Group Mark Carlson SNIA

More information

A Vendor Agnostic Overview. Walt Hubis Hubis Technical Associates

A Vendor Agnostic Overview. Walt Hubis Hubis Technical Associates Practical PRESENTATION Secure TITLE GOES Storage: HERE A Vendor Agnostic Overview Walt Hubis Hubis Technical Associates SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA

More information

Trusted Computing As a Solution!

Trusted Computing As a Solution! Trusted Computing As a Solution! Brian Berger EVP Marketing & Sales & TCG Director Wave Systems Corp. www.wave.com Trusted Computing Group www.trustedcomputinggroup.org Agenda State of Hardware Security

More information

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG Interoperable Cloud Storage with the CDMI Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member

More information

Planning For Persistent Memory In The Data Center. Sarah Jelinek/Intel Corporation

Planning For Persistent Memory In The Data Center. Sarah Jelinek/Intel Corporation Planning For Persistent Memory In The Data Center Sarah Jelinek/Intel Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies

More information

Storage as an IoT Device Roundtable Walt Hubis, CISSP Tom Coughlin

Storage as an IoT Device Roundtable Walt Hubis, CISSP Tom Coughlin Storage as an IoT Device Roundtable Walt Hubis, CISSP Tom Coughlin Participants Monty A. Forehand Product Security Officer and Technologist Seagate Technology Robert Thibadeau Chairman and CEO Drive Trust

More information

Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics

Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics Today s Presenters Bob Plumridge HDS Chief Technology Officer - EMEA Alex McDonald NetApp CTO Office 2 SNIA Legal Notice

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

4 July r1 SAS-2 Enable and disable zoning

4 July r1 SAS-2 Enable and disable zoning To: T10 Technical Committee From: Rob Elliott, HP (elliott@hp.com) Date: 4 July 2006 Subject: 06-281r1 SAS-2 Enable and disable zoning Revision history Revision 0 (15 June 2006) First revision Revision

More information

Virtualization Practices:

Virtualization Practices: Virtualization Practices: Providing a Complete Virtual Solution in a Box Jyh-shing Chen, NetApp Author: Jyh-shing Chen, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by

More information

LTFS Bulk Transfer Standard PRESENTATION TITLE GOES HERE

LTFS Bulk Transfer Standard PRESENTATION TITLE GOES HERE LTFS Bulk Standard PRESENTATION TITLE GOES HERE February 10, 2015 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual

More information

pnfs, parallel storage for grid and enterprise computing Joshua Konkle, NetApp, Inc.

pnfs, parallel storage for grid and enterprise computing Joshua Konkle, NetApp, Inc. pnfs, parallel storage for grid and enterprise computing Joshua Konkle, NetApp, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

WHAT HAPPENS WHEN THE FLASH INDUSTRY GOES TO TLC? Luanne M. Dauber, Pure Storage

WHAT HAPPENS WHEN THE FLASH INDUSTRY GOES TO TLC? Luanne M. Dauber, Pure Storage WHAT HAPPENS WHEN THE FLASH INDUSTRY GOES TO TLC? Luanne M. Dauber, Pure Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies

More information

Deploying Public, Private, and Hybrid. Storage Cloud Environments

Deploying Public, Private, and Hybrid. Storage Cloud Environments Deploying Public, Private, and Hybrid PRESENTATION TITLE GOES HERE Storage Cloud Environments Marty Stogsdill, Oracle Greg Kleiman, NetApp SNIA Legal Notice! The material contained in this tutorial is

More information

Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization -

Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization - Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization - Rob Peglar Xiotech Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by

More information

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation Mark Kaufman, Iron Mountain SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module FIPS 140-2 Security Policy for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module Hardware Version: 88i8925, 88i8922, 88i8945, and 88i8946 Firmware Version: Solaris2-FIPS-FW-V1.0 Document Version:

More information

Apples to Apples, Pears to Pears in SSS performance Benchmarking. Esther Spanjer, SMART Modular

Apples to Apples, Pears to Pears in SSS performance Benchmarking. Esther Spanjer, SMART Modular Apples to Apples, Pears to Pears in SSS performance Benchmarking Esther Spanjer, SMART Modular SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and

More information

TCG. TCG Storage Core Spec Addendum: Secure Messaging. Specification Version 1.00 Revision August 5, 2015

TCG. TCG Storage Core Spec Addendum: Secure Messaging. Specification Version 1.00 Revision August 5, 2015 TCG Storage Core Spec Addendum: Secure Messaging Revision 1.00 August 5, 2015 Contact: admin@trustedcomputinggroup.org TCG PUBLISHED Copyright TCG 2015 Copyright 2015 Trusted Computing Group, Incorporated.

More information

ADVANCED DATA REDUCTION CONCEPTS

ADVANCED DATA REDUCTION CONCEPTS ADVANCED DATA REDUCTION CONCEPTS Thomas Rivera, Hitachi Data Systems Gene Nagle, BridgeSTOR Author: Thomas Rivera, Hitachi Data Systems Author: Gene Nagle, BridgeSTOR SNIA Legal Notice The material contained

More information

ADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar

ADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar ADVANCED DEDUPLICATION CONCEPTS Thomas Rivera, BlueArc Gene Nagle, Exar SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may

More information

How to create a synthetic workload test. Eden Kim, CEO Calypso Systems, Inc.

How to create a synthetic workload test. Eden Kim, CEO Calypso Systems, Inc. PRESENTATION Enterprise TITLE Applications GOES HERE How to create a synthetic workload test Eden Kim, CEO Calypso Systems, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted

More information

Virtualization Practices: Providing a Complete Virtual Solution in a Box

Virtualization Practices: Providing a Complete Virtual Solution in a Box PRESENTATION TITLE GOES HERE Virtualization Practices: Providing a Complete Virtual Solution in a Box Jyh-shing Chen / NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by

More information

in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company

in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company PRESENTATION Data Protection TITLE GOES HERE in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Trusted Computing Today: Benefits and Solutions

Trusted Computing Today: Benefits and Solutions Trusted Computing Today: Benefits and Solutions Brian D. Berger EVP Marketing & Sales Wave Systems Corp. bberger@wavesys.com Copyright 2009 Trusted Computing Group Agenda TCG Vision TCG Benefits Solution

More information

Storage Virtualization II. - focusing on block virtualization -

Storage Virtualization II. - focusing on block virtualization - Storage Virtualization II Effective Use of Virtualization ti - focusing on block virtualization - Rob Peglar Xiotech Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted

More information

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide 2 Wave Systems Corp. Client User Guide Table of Contents Overview... 3 What is the Trusted Drive Manager?... 3 Key Features of Trusted Drive Manager... 3 Getting Started... 4 Required Components... 4 Configure

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

Performance and Innovation of Storage. Advances through SCSI Express

Performance and Innovation of Storage. Advances through SCSI Express Performance and Innovation of Storage PRESENTATION TITLE GOES HERE Advances through SCSI Express Marty Czekalski President, SCSI Trade Association - Emerging Interface and Architecture Program Manager,

More information

CoSign Hardware version 7.0 Firmware version 5.2

CoSign Hardware version 7.0 Firmware version 5.2 CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and

More information

Storage Performance Management Overview. Brett Allison, IntelliMagic, Inc.

Storage Performance Management Overview. Brett Allison, IntelliMagic, Inc. Overview Brett Allison, IntelliMagic, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this

More information

Application Recovery. Andreas Schwegmann / HP

Application Recovery. Andreas Schwegmann / HP Intelligent PRESENTATION Architecture TITLE GOES HERE for Application Recovery Andreas Schwegmann / HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise

More information

SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS

SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS Dejan Kocic, NetApp Flash Memory Storage 2018 Welcome to SNIA Education Afternoon at Flash Memory Summit 2018

More information

Use Cases for iscsi and FCoE: Where Each Makes Sense

Use Cases for iscsi and FCoE: Where Each Makes Sense Use Cases for iscsi and FCoE: Where Each Makes Sense PRESENTATION TITLE GOES HERE February 18, 2014 Today s Presenters David Fair, SNIA ESF Business Development Chair - Intel Sameh Boujelbene - Director,

More information

Effective Storage Tiering for Databases

Effective Storage Tiering for Databases Effective Storage Tiering for Databases Murthy V Mamidi Raghu Malige Symantec Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Toshiba Secure TCG Opal SSC and Wipe technology. Self-Encrypting Drive Series

Toshiba Secure TCG Opal SSC and Wipe technology. Self-Encrypting Drive Series FIPS 140 2 Security Policy for: Toshiba Secure TCG Opal SSC and ipe technology Self-Encrypting Drive Series MQ01ABU050B, MQ01ABU032B, and MQ01ABU025B Rev 3.1 1 OVERVIE... 3 ACRONYMS... 3 SECTION 1 MODULE

More information

The Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed

The Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed The Role of WAN Optimization in Cloud Infrastructures Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

Ron Emerick, Oracle Corporation

Ron Emerick, Oracle Corporation PCI Express PRESENTATION Virtualization TITLE GOES HERE Overview Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.

More information

The File Systems Evolution. Christian Bandulet, Sun Microsystems

The File Systems Evolution. Christian Bandulet, Sun Microsystems The s Evolution Christian Bandulet, Sun Microsystems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations

More information

Choosing the level that works for you!

Choosing the level that works for you! The Encryption Pyramid: Choosing the level that works for you! Eysha S. Powers eysha@us.ibm.com IBM, Enterprise Cryptography Extensive use of encryption is one of the most impactful ways to help reduce

More information

Mark Rogov, Dell EMC Chris Conniff, Dell EMC. Feb 14, 2018

Mark Rogov, Dell EMC Chris Conniff, Dell EMC. Feb 14, 2018 Mark Rogov, Dell EMC Chris Conniff, Dell EMC Feb 14, 2018 SNIA Legal Notice The material contained in this presentation is copyrighted by the SNIA unless otherwise noted. Member companies and individual

More information

Optical Security Subsystem Class Reference 0.4 draft

Optical Security Subsystem Class Reference 0.4 draft 07-422R0 Optical Security Subsystem Class Reference 0.4 draft 2007-09-20 Permissions The Optical Security Subsystem Class Reference (OSSCR) is published by DPHI, Inc.(Longmont, CO USA). All rights are

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD ISO/IEC 24739-1 INTERNATIONAL STANDARD Edition 1.0 2009-09 Information technology AT attachment with packet interface-7 Part 1: Register delivered command set, logical register set (ATA/ATAPI-7 V1) INTERNATIONAL

More information

Tiered File System without Tiers. Laura Shepard, Isilon

Tiered File System without Tiers. Laura Shepard, Isilon Laura Shepard, Isilon SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations

More information

MMC Command Descriptions for the Optical Security Subsystem Class

MMC Command Descriptions for the Optical Security Subsystem Class T10/08-065r0 MMC Command Descriptions for the Optical Security Subsystem Class Draft Revision 0.6 13 January 2008 PERMISSIONS The MMC Command Descriptions for the Optical Security Subsystem Class is published

More information

Trusted Mobile Keyboard Controller Architecture

Trusted Mobile Keyboard Controller Architecture Trusted Mobile Keyboard Controller Architecture Sundeep Bajikar Security Architect Mobile Platforms Group Intel Corporation September 17, 2003 1 Safer Computing Track Fall IDF Tuesday Wednesday Thursday

More information

WHITEPAPER E-SERIES ENCRYPTION

WHITEPAPER E-SERIES ENCRYPTION WHITEPAPER E-SERIES ENCRYPTION INTRODUCTION This paper describes the use-cases and implementation of self-encrypting drive (SED) support in the E-Series V software, implemented in version R011.1204 and

More information

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy EgoSecure GmbH EgoSecure Full Disk Encryption (FDE) Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.5 06/12/2014 Copyright EgoSecure GmbH, 2014. May be reproduced only

More information

Firmware Updates for Internet of Things Devices

Firmware Updates for Internet of Things Devices Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp Trends in Data Protection and Restoration Technologies Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and

More information

TCG Storage Work Group. Storage Certification Program. Program Version 1.0 Document Revision 1.22 March 16, Contact: Doug Gemmill, TCG CPM T C G

TCG Storage Work Group. Storage Certification Program. Program Version 1.0 Document Revision 1.22 March 16, Contact: Doug Gemmill, TCG CPM T C G TCG Storage Work Group Storage Certification Program Program Version 1.0 Document Revision 1.22 March 16, 2018 Contact: Doug Gemmill, TCG CPM T C G TCG Published Copyright TCG 2018 Copyright 2018 Trusted

More information

Lecture Embedded System Security Trusted Platform Module

Lecture Embedded System Security Trusted Platform Module 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2015 Roadmap: TPM Introduction to TPM TPM architecture

More information

SSD AES ENCRYPTION. Application Note. Document #AN0009 Viking SSD AES Encryption Rev. B. Purpose of this Document

SSD AES ENCRYPTION. Application Note. Document #AN0009 Viking SSD AES Encryption Rev. B. Purpose of this Document SSD AES ENCRYPTION Application Note Document #AN0009 Rev. B Purpose of this Document This application note was prepared to help OEM system designers evaluate the performance of Viking solid state drive

More information

Scaling Data Center Application Infrastructure. Gary Orenstein, Gear6

Scaling Data Center Application Infrastructure. Gary Orenstein, Gear6 Scaling Data Center Application Infrastructure Gary Orenstein, Gear6 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this

More information

Security Requirements for Crypto Devices

Security Requirements for Crypto Devices Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements

More information

TCG. TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.07 Revision August-17 Committee Draft

TCG. TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.07 Revision August-17 Committee Draft TCG Storage Interface Interactions Specification (SIIS) Specification Version 1.07 Revision 1.17 24-August-17 Committee Contact: admin@trustedcomputinggroup.org TCG PUBLIC REVIEW Copyright TCG 2017 Copyright

More information