HP LTO-5 Tape Drive. FIPS Non-Proprietary Security Policy

Similar documents
This Security Policy describes how this module complies with the eleven sections of the Standard:

FIPS Non-Proprietary Security Policy

CoSign Hardware version 7.0 Firmware version 5.2

IOS Common Cryptographic Module (IC2M)

FIPS SECURITY POLICY FOR

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

IBM System Storage TS1140 Tape Drive Machine Type 3592, Model E07. Security Policy

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

Lexmark PrintCryption TM (Firmware Version 1.3.1)

IBM LTO Generation 6 Encrypting Tape Drive. FIPS Non-Proprietary Security Policy

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module

Cisco VPN 3002 Hardware Client Security Policy

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

Symantec Corporation

IBM System Storage TS1120 Tape Drive - Machine Type 3592, Model E05. Security Policy

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

SecureDoc Disk Encryption Cryptographic Engine

FIPS Security Policy

Sony Security Module. Security Policy

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy

FIPS Security Policy

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677

Cisco Systems 5760 Wireless LAN Controller

FireEye CM Series: CM-4400, CM-7400, CM-9400

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 0.

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013

FIPS Level 1 Validation March 31, 2011 Version 1.12

Motorola PTP 800 Series CMU Cryptographic Module Security Policy

Cambium Networks Ltd PTP 700 Point to Point Wireless Ethernet Bridge Non-Proprietary FIPS Cryptographic Module Security Policy

Cryptographic Module Security Policy For Outbacker MXP (Non-Proprietary)

Telkonet G3 Series ibridge/extender Security Policy

Acme Packet VME. FIPS Level 1 Validation. Software Version: E-CZ Date: July 20, 2018

Toshiba Secure TCG Opal SSC and Wipe technology. Self-Encrypting Drive Series

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS)

Non-Proprietary Security Policy Version 1.1

FireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450

Secure Cryptographic Module (SCM)

FIPS Non-Proprietary Security Policy. Acme Packet FIPS Level 2 Validation. Hardware Version: Firmware Version: E-CZ8.0.

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

FIPS Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: Winterson Road Linthicum, MD 21090

Security Policy Document Version 3.3. Tropos Networks

Acme Packet 3820 and Acme Packet 4500

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy

Motorola PTP 600 Series Point to Point Wireless Ethernet Bridges

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

Barco ICMP FIPS Non-Proprietary Security Policy

FEITIAN Technologies Company, LTD epass Token Hardware Version: FIPS Non-Proprietary Security Policy

FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402

Cambium PTP 600 Series Point to Point Wireless Ethernet Bridges FIPS Security Policy

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 1.0 May 11, 2015

Security in NVMe Enterprise SSDs

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Alcatel-Lucent. Alcatel-Lucent VPN Firewall Brick 50

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)

Assurance Activity Report (AAR) for a Target of Evaluation

FIPS Security Policy

WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702

Hydra PC FIPS Sector-based Encryption Module Security Policy

RFS7000 SERIES Wireless Controller. FIPS Cryptographic Module Security Policy

SecureD v Security Policy

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

Cambium Networks PTP 800 Compact Modem Unit (CMU) FIPS Security Policy

Silent Circle Mobile Application Cryptographic Module

Version 2.0. FIPS Non-Proprietary Security Policy. Certicom Corp. September 27, 2005

FIPS Security Level 2 Policy LX-4000T Series Console Servers

FIPS Validation Certificate

Common Crypto Circuit Card Assembly Rockwell Collins. Commercial Crypto Contract (CCC)

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

Security Policy for FIPS KVL 3000 Plus

Comtech EF Data Corporation SLM-5650A TRANSEC Module Hardware Version: 1.2; Firmware Version: FIPS Non-Proprietary Security Policy

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Route1 FIPS Cryptographic Module

STS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4

Polycom, Inc. VSX 3000, VSX 5000, and VSX 7000s (Firmware version: ) FIPS Non-Proprietary Security Policy

),36 6(&85,7< 32/,&< 1HW6FUHHQ ;7 9HUVLRQ U 3 1 5HY %

Security Policy. 10 th March 2005

FIPS Level 2 Security Policy for FlagStone Core (Versions V a, V a, V )

Security Requirements for Crypto Devices

Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation

Transcription:

H LTO-5 Tape Drive FIS 140-2 Non-roprietary Security olicy Overall Level 1 Validation Revision 001, 29 October 2010 Copyright 2011 Hewlett-ackard Company This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

2

Table of Contents 1 INTRODUCTION... 5 1.1 UROSE... 5 1.2 REFERENCES... 5 1.3 DOCUMENT ORGANIZATION... 5 2 The H LTO-5 Tape Drive... 6 2.1 SYSTEM OVERVIEW... 6 3 FIS 140-2 Security Level... 8 4 Cryptographic module ports and interfaces... 9 5 Roles, Services, and Authentication... 10 5.1 ROLES AND SERVICES... 10 5.2 ACCESS TO SERVICES... 11 6 Secure Operation and Rules... 12 6.1 SECURITY RULES... 12 7 Access Control olicy... 12 7.1 CRYTOGRAHIC EYS AND CSS... 12 7.1.1 ey generation... 15 7.1.2 ey entry and output... 15 7.1.3 ey storage... 15 7.1.4 Zeroization of key material... 16 7.1.5 Access to key material... 16 7.2 UBLIC EY CERTIFICATES... 17 8 FIS-Approved algorithms... 18 9 Non-FIS Approved but Allowed Algorithms... 18 10 Non-Approved modes of operation... 18 11 FIS mode... 18 12 Self-Tests... 19 12.1 OWER-U SELF-TESTS... 19 13 Design Assurance... 20 14 hysical Security... 20 15 Mitigation of Other Attacks... 20 3

Table of Figures and Tables Figure 1 Internal Tape Drives... 7 Figure 2 Hardware Block Diagram... 8 Table 1 H LTO-5 Security Levels... 8 Table 2 H LTO-5 orts and Interfaces... 10 Table 3 Summary of Roles and Services... 10 Table 4 Services Authorized for Roles... 12 Table 5 eys used by the H LTO-5... 15 Table 6 User Role... 16 Table 7 Crypto-Officer Role... 16 Table 8 Certificates Used Within the H LTO-5... 17 4

1 INTRODUCTION 1.1 urpose This document is the non-proprietary FIS 140-2 security policy for the H LTO-5 product. This Security olicy details the secure operation of the H LTO-5 as required in Federal Information rocessing Standards ublication 140-2 (FIS 140-2) as published by the National Institute of Standards and Technology (NIST) of the United States Department of Commerce. 1.2 References For more information on H please visit http://www.hp.com/. For more information on NIST and the Cryptographic Module Validation rogram (CMV), please visit www.nist.gov/cmvp. 1.3 Document Organization This Security olicy document is one part of the FIS 140-2 Submission ackage. In addition to this document, the Submission ackage contains: Vendor Evidence Document Finite State Machine Source Code Listing Other supporting documentation as additional references This document outlines the functionality provided by the module and gives high-level details on the means by which the module satisfies FIS 140-2 requirements. With the exception of this Non-roprietary Security olicy, the FIS 140-2 Submission Documentation may be H-proprietary or otherwise controlled and releasable only under appropriate nondisclosure agreements. For access to these documents, please contact H. 5

2 The H LTO-5 Tape Drive H LTO-5 Tape Drive (also referred to as H LTO-5 or LTO-5 within this document) sets new standards for capacity, performance, and manageability. The H LTO-5 represents H's fifth-generation of LTO tape drive technology capable of storing up to 3TB per cartridge while providing enterprise tape drive monitoring and management capabilities with H TapeAssure and AES 256-bit hardware data encryption, easy-to-enable security to protect the most sensitive data and prevent unauthorized access of tape cartridges. Capable of data transfer rates up to 280MB/sec, H's exclusive Data Rate Matching feature further optimizes performance by matching speed of host to keep drives streaming and increase the reliability of the drive and media. H LTO-5 drives are designed for server customers in direct attached storage (DAS) environments where hard disk and system bottlenecks can impede data transfer rates. The H LTO-5 provides investment protection with full read and write backward support with LTO-4 media, and the ability to read LTO-3 cartridge. By nearly doubling the capacity of previous generation Ultrium drives, H customers now require fewer data cartridges to meet their storage needs, significantly reducing their IT costs and increasing their ROI. 2.1 System overview The H LTO-5 is a high-performance encrypting tape drive providing backup services to any connected host that is running appropriate software. The H LTO-5 is classified as a multi-chip standalone module for FIS 140-2 purposes. It is a self-contained module containing both hardware and firmware components, providing cryptographic services to a host. For the purposes of FIS 140-2, the H LTO-5 is validated at FIS 140-2 Level 1. The H LTO-5 is available as either an external tape drive or an internal tape drive, although only the internal tape drive is subject to this validation. It is available as a full height and half height option: Half-height Internal Tape Drive (H LTO-5) 6

Full-height Internal Tape Drive (H LTO-5) Figure 1 Internal Tape Drives Internal Tape Drive: The cryptographic boundary of the module is the enclosure of the internal tape drive. The tape media itself falls outside the cryptographic boundary of the module. All hardware and firmware within the cryptographic boundary are subject to the security requirements of FIS 140-2. The H LTO-5 has four hardware variants for this validation: Variant Hardware version Firmware Description version H LTO-5 Full-height with 8Gb/s Fibre Channel AQ273C #912 I3BW For use in H ESL E- Series tape libraries H LTO-5 Full-height with 8Gb/s Fibre Channel AQ273D #704 I3AS For use in H EML E- Series tape libraries H LTO-5 Full-height with 8Gb/s Fibre Channel AQ273F #900 I3AZ For use in Quantum automation tape libraries H LTO-5 Half-height with 6Gb/s SAS AQ283B #103 Z39W For use in H MSL G3 tape libraries With all four variants, all cryptographic functions, roles, and services are identical between each variant. Only non-security relevant differences exist between the variants. Host data is provided to the module in plaintext, and the security of that data while it is outside the module is beyond the scope of the security provided by the module. 7

Figure 2 Hardware Block Diagram 3 FIS 140-2 Security Level The H LTO-5 meets the security requirements established in FIS 140-2 for an overall module security of Level 1 with the individual requirements and corresponding security level detailed in Table 1. FIS 140-2 Security Requirement Area Cryptographic Module Specification 1 Cryptographic Module orts and Interfaces 1 Roles, Services, and Authentication 1 Finite State Model 1 hysical Security 1 Operational Environment N/A Cryptographic ey Management 1 Electromagnetic Interference / Electromagnetic 1 Compatibility Self-Tests 1 Design Assurance 1 Mitigation of Other Attacks N/A Table 1 H LTO-5 Security Levels Level 8

4 Cryptographic module ports and interfaces There are two different host interfaces for data transfer, both of which implement an ANSI standard interface: i) Fibre Channel ii) SAS. Fibre Channel drives are equipped with up to two SF duplex-lc short-wave 8 Gb/s fibre connectors. The drives are capable of switched fabric attach, public loop or private loop and operate at 8 Gb/s, 4 Gb/s or 2 Gb/s after auto-speed negotiation. SAS drives are equipped with a standard internal SAS connector. In addition to the host interface port, there are three serial ports and an Ethernet port for device manageability: The diagnostics serial port on the back of the drive, The AMI (Automation Management Interface) serial port on the back of the drive, The larger ACI/ADI (Automation Communications/Drive Interface) connector on the back of the drive. The iadt (Ethernet) port is available for key management communications. The module has a slot and spring loaded cover through which a tape is inserted. The host interface supports the SCSI command protocol. If a module is to be used in a tape library, the library controls the module using the Automation Controller Interface. There is an eject button at the top-right of the module front panel. This is used to manually eject a tape. There is a reset switch that is accessed through a pin-hole immediately below the right hand end of the eject button. There are five LED indicators immediately below the eject button. They are from top to bottom: Ready, Drive Error, Tape Error Clean and Encryption. ower for the H LTO-5 Fibre Channel Tape Drive is supplied to the module through a standard 4-pin power connector used to supply the 5V and 12V power the tape drive requires. ower for the H LTO-5 SAS Tape Drive is provided through an industry standard SAS connector. Interface Description Types of data processed by interface Data input Host interface laintext data to encrypt and store on tape. Specific SCSI command to set (plaintext) cryptographic key. Tape read heads Encrypted data is read from the 9

tape into the module to be decrypted and passed to the host interface. Data output Host interface laintext data that has been read from tape and decrypted. Tape write heads Host data is encrypted and written to tape. Control input Host Interface, Autoloader SCSI commands. Specific SCSI Status output management interface. Ethernet port Host Interface, Front panel LEDs, Ethernet port Table 2 H LTO-5 orts and Interfaces 5 Roles, Services, and Authentication command to set cryptographic key. TLS-secured protocol via Ethernet port to establish a ey Encrypting ey. Output data generated by SCSI commands, module status 5.1 Roles and Services The H LTO-5 meets all FIS 140-2 level 1 requirements for Roles and Services, implementing both a Crypto-Officer role and a User role. As the H LTO-5 is a level 1 module, role-based authentication is not supported. An operator implicitly assumes the role of either Crypto-Officer or User by selecting a service associated with that role. The following table, Table 3, summarizes the services available to each role. Role urpose Services Crypto Officer Module configuration Set and get security parameters Upgrade module firmware Zeroize User Usage of module Write data to tape functionality Read data from tape Reserve Release Load/Unload Verify tape data Erase tape data Tape control and configuration commands Report commands Status commands Logging commands Table 3 Summary of Roles and Services 10

The User role is assumed when an operator accesses a User service. Similarly, the Crypto- Officer role is assumed when an operator accesses a Crypto-Officer service. 5.2 Access to Services Although there is no role-based authentication in the module, in case of the firmware upgrade service, the firmware upgrade image is digitally signed using RSA. Before the upgrade can occur, the signature is verified by the module firmware. If the actual signature does not match the value calculated by the module, then the upgrade is not allowed. * Note: If a non-fis validated firmware version is loaded onto the module, then the module is no longer a FIS validated module. Access to the majority of the services of the module is via SCSI commands. Each service corresponds to one or more SCSI commands. The following table, Table 4, lists the authorized services linked to each of the Roles offered by the module. Role Authorized Services SCSI commands User Write data to tape WRITE WRITE ATTRIBUTE WRITE FILEMARS Read data from tape READ READ ATTRIBUTE Reserve RESERVE ERSISTENT RESERVE IN ERSISTENT RESERVE OUT Release RELEASE ERSISTENT RESERVE IN ERSISTENT RESERVE OUT Load/Unload LOAD/UNLOAD Verify tape data VERIFY Erase tape data ERASE Tape control and configuration commands Report commands FORMAT MEDIUM LOCATE MODE SELECT MODE SENSE REVENT/ALLOW MEDIUM REMOVAL REQUEST SENSE REWIND SET CAACITY SET DEVICE IDENTIFIER SET TIMESTAM SETU I CONFIGURATION SACE WRITE BUFFER MAINTENANCE IN/OUT READ BLOC LIMITS 11

Role Authorized Services SCSI commands READ BUFFER READ LOGGED-IN HOST TABLE READ MEDIA SERIAL NUMBER READ OSITION REORT DENSITY SUORT REORT DEVICE IDENTIFIER REORT I CONFIGURATION REORT LUNS REORT SUORTED OCODES REORT SUORTED TAS MANAGEMENT FUNCTIONS REORT TARGET ORT GROUS REORT TIMESTAM Status commands INQUIRY RECEIVE DIAGNOSTICS RESULTS SEND DIAGNOSTIC TEST UNIT READY Logging commands LOG SELECT LOG SENSE Crypto Officer Upgrade module firmware Enhanced FIRMWARE UGRADE DOWNLOAD FIRMWARE SEGMENT Enhanced FIRMWARE UGRADE REBOOT Enhanced FIRMWARE UGRADE REORT IMAGE INFO Set and get security SECURITY ROTOCOL IN parameters SECURITY ROTOCOL OUT Zeroize This is not a SCSI command. All CSs are actively overwritten with zeroes. 6 Secure Operation and Rules Table 4 Services Authorized for Roles 6.1 Security Rules In order to operate the H LTO-5 product in a FIS Approved mode, encrypt mode must be enabled when data is written to a tape or read from a tape. In addition, an encryption key must be provided in an approved manner. 7 Access Control olicy Much of the module access control policy has already been covered in earlier sections of this document. This section deals explicitly with Cryptographic eys and CSs. 7.1 Cryptographic eys and CSs The module uses a number of keys for data encryption, integrity checking and authentication. Table 5 lists all keys. 12

ey urpose Generation ey input ey output Root CA public Externally N/A key (RT) generated Management Host public key (MH) Drive private key (DRV) Drive public key (DR) ey Encryption ey (E) TLS re-master Secret (TLS) Forms the basis of the trust tree. 2048 bit RSA public key. Used to authenticate Transport Layer Security (TLS) connection between host and module. A trusted Host public key. This is a 2048-bit RSA key. Used to authenticate management host to drive to permit installing and deleting certificates and changing secure mode. A 2048 bit RSA private key used to authenticate Transport Layer Security (TLS) connection between host and module. A 2048 bit RSA public key used to authenticate Transport Layer Security (TLS) connection between host and module. An AES-256 key used to encrypt the data encryption key. Used by TLS to establish the session keys. Externally generated Externally generated Externally generated This key is provided by the backup application running on the host computer system. During TLS session establishment Installed during the drive commissioning process Drive commissioning process Input as part of the manufacturing process Input as part of the manufacturing process. assed encrypted within a TLS session across the Ethernet interface or supplied in plaintext across host interface (FC or SAS) in a direct point-topoint configuration. Generated internally so N/A ey storage ey Zeroization EEROM. This is a Has a public key and Message so key Authentica zeroization is tion Code not required. (using the Root key) to verify it s integrity N/A RAM This is a public key and so key zeroization is not required. N/A EEROM This is zeroed using a Maintenance Out command. N/A EEROM This is a public key and so key zeroization is not required. N/A RAM The ey Encryption ey is zeroed at power up, so power cycling the drive will zero the key. N/A Stored in RAM only for duration of the TLS session The TLS premaster key is zeroized after the TLS session is closed. 13

ey urpose Generation ey input ey output TLS HMAC ey Generated N/A (TLSH) internally so N/A TLS Encryption ey (TLS) Data Encryption ey (DE) Firmware OT public key, also known as H public key (H) TLS HMAC ey to provide data integrity over TLS session. An AES-128 or AES-256 key used provide data protection over TLS session. An AES-128 or AES-256 key used to encrypt data written to tape and decrypt data read from tape. An 2048-bit RSA public key used to check signature of boot loader firmware at startup. During TLS session establishment During TLS session establishment FIS compliant RNG Externally generated Generated internally so N/A Internally generated, so N/A. Written to OT during manufacture N/A N/A ey storage Stored in RAM only for duration of the TLS session Stored in RAM only for the duration of the TLS session Stored in the RAM while used to encrypt or decrypt data and stored on the tape in encrypted form, encrypted by the ey Encryption ey using AES key wrapping. ey Zeroization The TLS HMAC key is zeroized after the TLS session is closed. The TLS Encryption key is zeroized after the TLS session is closed. This is stored on the tape as an encrypted key and so key zeroization is not required. If zeroization is required while key is in the System ARM, the Data Encryption eys are zeroed at power up, so power cycling the drive will zero the key. N/A OT This is a public key and so key zeroization is not required. 14

ey urpose Generation ey input ey output Firmware An 2048-bit RSA Externally Firmware build N/A public key public key used to generated process (I) authenticate firmware upgrades by checking the signature on any new firmware image before installing it. ey storage Flash memory ey Zeroization This is a public key and so key zeroization is not required. Seed and Seed ey (S/S) Used to initialize the Approved RNG. Generated internally via the non- Approved RNG. N/A N/A EEROM The Seed and Seed ey are zeroed at power up, so power cycling the drive will zero the keys. Table 5 eys used by the H LTO-5 7.1.1 ey generation The H LTO-5 generates the Root key during manufacture using the on-chip True Random Number Generator ; and the Data Encryption ey using a FIS-compliant RNG. The ey Encryption ey is generated by the host backup application using methods beyond the scope of the tape drive. 7.1.2 ey entry and output The Firmware ublic ey is built into the firmware image when it is compiled. The ey Encryption eys are entered either in plaintext across the host interface in a point-to-point configuration, or in an encrypted form across the Ethernet port within a secure TLS session. ey entry and output for all key material is detailed in Table 5. 7.1.3 ey storage Data encryption keys are stored in the System ASIC. They are written into tightly coupled memory using write only registers and kept there until explicitly no longer required. The firmware has been written in such a way that there is no read access to these registers and memory from outside the module, either directly or through diagnostic commands. ey storage for all keys is detailed in Table 5. 15

7.1.4 Zeroization of key material Data encryption keys and ey Encryption eys that are stored in memory are zeroed at power up. The Root key cannot be zeroed. 7.1.5 Access to key material The following matrices (Tables 6 and Table 7) show the access that an operator has to specific keys or other critical security parameters when performing each of the services relevant to his/her role. eys R T Service Write data to tape E E Read data from tape E E Reserve Release Load/Unload Verify tape data E E Erase tape data Tape control and configuration commands Report commands Status commands Logging commands M H D R D R V E T L S T L S H T L S D E H I S / S Table 6 User Role eys R T M H Service Upgrade module firmware D D D D D D E Set and get security parameters W W W W W W W W W Zeroize D D D D D D D D D D R D R V E Table 7 Crypto-Officer Role T L S T L S H T L S D E H I S / S Type of access required to key blank None W Write access R Read Access D Delete Access E Execute Access 16

eys RT MH DR DRV E TLS TLSH TLS DE H I S/S Root CA ublic ey Management Host Certificate ublic ey Drive ublic ey Drive rivate ey ey Encryption ey TLS re-master Secret TLS HMAC ey TLS Encryption ey Data Encryption key Firmware OT public key, also known as H ublic ey Firmware ublic ey Seed and Seed ey 7.2 ublic ey Certificates ey urpose Generation ey input ey output Forms the basis Externally N/A of the trust tree. generated Root CA Certificate Drive Certificate Management Host certificate ey Manager Certificate Authenticates the Drive to a Management Host or key manager Authenticates the management host to the Drive. Authenticates the ey Manager to the Drive Externally generated Externally generated Externally generated Installed during drive commissioning process Drive manufacturing process Supplied by the management host Supplied by the ey Manager Table 8 Certificates Used Within the H LTO-5 ey storage EEROM. Has a Message Authenticatio n Code (using the Root key) over it to verify it s integrity ey Zeroization This only contains public key material and so key zeroization is not required. N/A EEROM This only contains public key material and so key zeroization is not required. N/A RAM This only contains public key material and so key zeroization is not required. N/A RAM This only contains public key material and so key zeroization is not required. 17

8 FIS-Approved algorithms The module uses the following FIS Approved algorithms: AES (256-bits ECB, CTR modes) to encrypt host data and EEROM contents (Cert. #1441) AES GCM (Cert. #1441) ANSI X9.31 RNG (w/aes 256) (Cert. #790) AES (256-bit ECB mode) (Cert. #1442) RSA (2048-bit verify) to authenticate a firmware upgrade prior to upgrading the firmware (Cert. #708) SHA-256 (Cert. #1308) AES (128-bit and 256-bit, CBC mode) (Cert. #1443) AES GCM (Cert. #1444) RSA (2048-bit sign/verify) (Cert. #709) SHA-1, -224, -256, -384, -512 (Cert. #1309) HMAC (w/sha-1, -224, -256, -384, -512) (Cert. #848) ANSI X9.31 RNG (w/aes 128, 192, 256) (Cert. #791) The TLS connection is then used to encrypt and transfer a ey Encryption ey. The approved mode uses the TLS_RSA_WITH_AES_256_CBC_SHA and TLS_RSA_WITH_AES_128_CBC_SHA ciphersuites. The ciphersuite to use in a key exchange is negotiated as part of that protocol. If there are attempts to use an unsupported or unapproved TLS ciphersuite, then the module rejects it. This behavior occurs when the relevant certificates are installed, as required for FIS mode (see section 11, item 6). 9 Non-FIS Approved but Allowed Algorithms The module implements the following non-approved, but allowed algorithms: AES ey Wrap as per the NIST recommended ey Wrap Specification (AES Cert. #1441, key wrapping; key establishment methodology provides 256 bits of encryption strength) The module implements a non-approved RNG for seeding the ANSI X9.31 RNG MD5 is used in TLS establishment in accordance with FIS140-2 Implementation Guidance, which is allowed for use in FIS mode. 10 Non-Approved modes of operation The H LTO-5 contains a TLS implementation. One TLS mode, using the TLS_DH_anon_AES_256_CBC_SHA ciphersuite, is anonymous. Use of this mode of TLS will result in operating the cryptographic module outside of FIS mode. 11 FIS mode In order to be FIS 140-2 compliant, the module must be operated according to a set of security procedures. When used in this way, the module is operating in its FIS mode of operation. FIS mode is defined as follows: 18

1. The product is assumed to be operating in a physically secure environment 2. The product's host application is assumed to be operating in a physically secure environment 3. The Root CA is installed in a physically secure environment 4. The product is operated exclusively as an encrypting tape drive. In order to operate in "FIS mode", all host applications will only store encrypted data. 5. If plaintext ey Encryption eys are used, the connection between the host application and the H LTO-5 must be physically secure. 6. If a TLS connection is used to transfer ey Encryption eys, the relevant certificates must be installed to enable authentication to be performed. 12 Self-Tests The H LTO-5 implements both power-up and conditional self tests as required by FIS 140-2. The following two sections outline the tests that are performed. 12.1 ower-up self-tests Each of these tests is executed when the module is turned on and the module first executes. If any of these tests fail, the module will not load. The module must be reset to reexecute these tests. The module performs the following self-tests: A. Cryptographic Algorithm Tests a. AES Encrypt/Decrypt AT b. AES GCM AT c. ANSI X9.31 RNG AT d. AES Decrypt AT e. RSA Verify AT f. SHA-256 AT g. AES Encrypt/Decrypt AT h. AES GCM AT i. RSA Sign/Verify AT j. SHA-1, -224, -256, -384, -512 AT k. HMAC (w/ SHA-1, -224, -256, -384, -512) AT l. ANSI X9.31 AT B. Firmware Integrity Test: RSA Signature Verification C. Critical Function: Drive Certificate Integrity Test The module performs the following Conditional self-tests: A. Continuous RNG test for both Approved and non-approved RNGs B. Firmware Load Test: RSA Signature Verification If any of the above self-tests fail, the module will enter an error state indicated by a flashing Driver Error LED. The only actions possible in this state are to reset the module (which will repeat the self-tests), or load new firmware. 19

13 Design Assurance H employ industry standard best practices in the design, development, production and maintenance of the H LTO-5 product, including the FIS 140-2 module. This includes the use of an industry standard configuration management system that is operated in accordance with the requirements of FIS 140-2, such that each configuration item that forms part of the module is stored with a label corresponding to the version of the module and that the module and all of its associated documentation can be regenerated from the configuration management system with reference to the relevant version number. Design documentation for the module is maintained to provide clear and consistent information within the document hierarchy to enable transparent traceability between corresponding areas throughout the document hierarchy, for instance to correspondence between elements of this Cryptographic Mode Security olicy (CMS) and the design documentation. Guidance appropriate to an operator s Role is provided with the module and provides all of the necessary assistance to enable the secure operation of the module by an operator, including the Approved security functions of the module. 14 hysical Security The H LTO-5 is composed of production grade components, which do not require any maintenance or inspection by the user to ensure security. 15 Mitigation of Other Attacks No claim is made that the module will mitigate attacks outside of those required by the FIS 140-2 Level 1 validation. 20