ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy

Similar documents
FIPS Security Policy

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY

IOS Common Cryptographic Module (IC2M)

FIPS Level 1 Validation March 31, 2011 Version 1.12

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy

This Security Policy describes how this module complies with the eleven sections of the Standard:

Symantec Corporation

FIPS Non-Proprietary Security Policy

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

FIPS Security Policy

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

SecureDoc Disk Encryption Cryptographic Engine

Lexmark PrintCryption TM (Firmware Version 1.3.1)

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

FIPS SECURITY POLICY FOR

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module

CoSign Hardware version 7.0 Firmware version 5.2

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module

Telkonet G3 Series ibridge/extender Security Policy

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation

Secure Cryptographic Module (SCM)

FIPS Level 2 Security Policy for FlagStone Core (Versions V a, V a, V )

Acme Packet 3820 and Acme Packet 4500

FireEye CM Series: CM-4400, CM-7400, CM-9400

Silent Circle Mobile Application Cryptographic Module

Toshiba Secure TCG Opal SSC and Wipe technology. Self-Encrypting Drive Series

Security Policy Document Version 3.3. Tropos Networks

Oracle Linux 6 OpenSSH Server Cryptographic Module

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

SecureD v Security Policy

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy

Oracle Linux 7 OpenSSH Server Cryptographic Module

Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

Cisco VPN 3002 Hardware Client Security Policy

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

Common Crypto Circuit Card Assembly Rockwell Collins. Commercial Crypto Contract (CCC)

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

FIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.

STS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4

Security Policy for FIPS KVL 3000 Plus

Canon MFP Security Chip. ISO/IEC Security Policy

Version 2.0. FIPS Non-Proprietary Security Policy. Certicom Corp. September 27, 2005

IBM System Storage TS1140 Tape Drive Machine Type 3592, Model E07. Security Policy

Acme Packet VME. FIPS Level 1 Validation. Software Version: E-CZ Date: July 20, 2018

SafeNet ProtectApp APPLICATION-LEVEL ENCRYPTION

FireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450

Polycom, Inc. VSX 3000, VSX 5000, and VSX 7000s (Firmware version: ) FIPS Non-Proprietary Security Policy

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

FEITIAN Technologies Company, LTD epass Token Hardware Version: FIPS Non-Proprietary Security Policy

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 0.

WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702

Security Requirements of FIPS PUB 140 & Reconfigurable Hardware. G. Bertoni Politecnico di Milano

1 INTRODUCTION CRYPTOGRAPHIC MODULE SPECIFICATION... 9

The Road to a Secure, Compliant Cloud

IBM LTO Generation 6 Encrypting Tape Drive. FIPS Non-Proprietary Security Policy

FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402

Motorola PTP 800 Series CMU Cryptographic Module Security Policy

Blue Ridge Networks BorderGuard 4000/3140. FIPS Security Policy

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

IBM System Storage TS1120 Tape Drive - Machine Type 3592, Model E05. Security Policy

Model 650 SafeNet Encryptor

Who s Protecting Your Keys? August 2018

FIPS Non-Proprietary Security Policy

Check Point VPN-1 Gateway Next Generation FP1. FIPS Non-Proprietary Security Policy

Cisco Systems 5760 Wireless LAN Controller

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS)

Symantec Corporation Symantec Cryptographic Module Software Version: 1.1. FIPS Non-Proprietary Security Policy

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy

Hydra PC FIPS Sector-based Encryption Module Security Policy

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

Alcatel-Lucent. Alcatel-Lucent VPN Firewall Brick 50

FIPS Cryptographic Module Security Policy Entrust Authority Security Toolkit for the Java Platform

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, and AP1522 Wireless LAN Access Points

Apple Inc. Apple OS X CoreCrypto Kernel Module, v5.0 FIPS Non-Proprietary Security Policy

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version

Sony Security Module. Security Policy

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 1.0 May 11, 2015

Comtech EF Data Corporation SLM-5650A TRANSEC Module Hardware Version: 1.2; Firmware Version: FIPS Non-Proprietary Security Policy

Barco ICMP FIPS Non-Proprietary Security Policy

WatchKey ProX USB Token Cryptographic Module Hardware Version: K023314A Firmware Version:

FIPS Security Policy

Transcription:

ProtectV StartGuard FIPS 140-2 Level 1 Non-Proprietary Security Policy DOCUMENT NUMBER: 002-010841-001 AUTHOR: DEPARTMENT: LOCATION OF ISSUE: SafeNet Certification Team R & D Program Managaement Redwood City and Belcamp DATE ORIGINATED: June 14, 2013 REVISION LEVEL: D REVISION DATE: April 14, 2014 SUPERSESSION DATA: C SECURITY LEVEL: Level 1 Copyright 2014 SafeNet, Inc. All rights reserved This document may be freely reproduced and distributed whole and intact including this copyright notice. SafeNet, Inc. reserves the right to make changes in the product or its specifications mentioned in this publication without notice. Accordingly, the reader is cautioned to verify that information in this publication is current before placing orders. The information furnished by SafeNet, Inc. in this document is believed to be accurate and reliable. However, no responsibility is assumed by SafeNet, Inc. for its use, or for any infringements of patents or other rights of third parties resulting from its use. No part of this publication may be copied or reproduced in any form or by any means, or transferred to any third party without prior written consent of SafeNet, Inc.

TABLE OF CONTENTS Section Title Page 1. INTRODUCTION... 1 1.1 Purpose... 1 1.2 References... 1 1.3 Terminology... 1 2. PROTECT V... 2 2.1 Functional Overview... 2 2.2 Cryptographic Module... 2 3. CRYPTOGRAPHIC MODULE SPECIFICATION... 3 3.1 FIPS 140-2 Security Levels... 4 4. CRYPTOGRAPHIC MODULE PORTS AND INTERFACES... 4 4.1 Interfaces... 4 5. ROLES, SERVICES AND AUTHENTICATION... 5 5.1 Identification and Authentication... 5 5.2 Roles... 5 5.3 Services for Authorized Roles and Access Control... 5 6. PHYSICAL ENVIRONMENT... 5 7. OPERATIONAL ENVIRONMENT... 5 8. CRYPTOGRAPHIC KEY MANAGEMENT... 5 8.1 Key Generation... 5 8.2 Key Input / Output... 6 8.3 Key Zeroization... 6 8.4 Algorithms... 6 8.5 Security Functions, Cryptographic Keys and CSPs... 7 9. SELF-TESTS... 8 9.1 Power-On Self-Tests (POST)... 8 10. MITIGATION OF OTHER ATTACKS... 8 11. FIPS APPROVED MODE OF OPERATION... 8 11.1 Description... 8 11.2 Invoking Approved Mode of Operation... 8 11.3 Mode of Operation Indicator... 8 12. GLOSSARY OF ACRONYMS, TERMS AND ABBREVIATIONS... 9 LIST OF FIGURES Figure 1 Boot Environments and Cryptographic Engines... 2 Page i of i

1. INTRODUCTION 1.1 Purpose This is a non-proprietary Cryptographic Module Security Policy for the SafeNet ProtectV StartGuard version 1.0 as implemented in the SafeNet ProtectV application version 1.0. This security policy describes how the module meets the security requirements of FIPS 140-2 and how to operate the Application in a secure FIPS 140-2 mode. This policy was prepared as a part of the Level 1 FIPS 140-2 validation of the Application. FIPS 140-2 is a joint program between the National Institute of Standards and Technology (NIST) and Communication Security Establishment Canada (CSEC) for cryptographic modules. FIPS 140-2 (Federal Information Processing Standards Publication 140-2 Security Requirements for Cryptographic Modules) details the security requirements for cryptographic modules. More information about the FIPS 140-2 standard and validation program is available on the NIST website at http://csrc.nist.gov/cryptval. 1.2 References This document deals only with operations and capabilities of the module in the technical terms of a FIPS 140-2 cryptographic module security policy. More information is available on the Application and other SafeNet products from the following sources: The SafeNet Internet site contains information on the full line of security products at http://www.safenet-inc.com/products. For answers to technical or sales-related questions please refer to the contacts listed on the SafeNet Internet site at http://www.safenet-inc.com/company/contact.asp. SafeNet Contact Information: SafeNet, Inc. (Corporate Headquarters) SafeNet Sales: 4690 Millennium Drive Belcamp, MD 21017 Telephone: 410-931-7500 TTY Users: 800-735-2258 Fax: 410-931-7524 U.S. (800) 533-3958 International 1 (410) 931-7500 SafeNet Technical Support: U.S. (800) 545-6608 International 1 (410) 931-7520 SafeNet Customer Service: 1.3 Terminology U.S. (866) 251-4269 EMEA +44 (0) 1276 60 80 00 APAC 852 3157 7111 In this document, reference will be made to the module when discussing SafeNet ProtectV StartGuard. Page 1 of 8

2. PROTECT V 2.1 Functional Overview ProtectV is a high assurance software solution for securing both virtual infrastructure and data, giving organizations the freedom to migrate to virtual and cloud environments while maintaining full ownership, compliance, and control of data. ProtectV security features include: Complete Virtual Machine and Storage Encryption - Enables encryption of entire virtual machines and storage volumes associated with them; - No data is written to system partition or storage volume disk without first being encrypted; - Even data stored in the OS partition is protected; - Encryption keys are stored on premise, in a high assurance hardware based key manager. Pre-Launch Authentication - Access to data stored or processed by a protected VM requires explicit user authentication and authorization by ProtectV. Separation of Duties - Role-based encryption polices, together with segregated key management ensure separation of duties between cloud service provider system administrators and the organization s IT administrators, or between different units in the organization s own virtual environment. Security Management Across Cloud Environments - A unified management platform serves as a central audit point providing an at-a-glance dashboard view of all encrypted and unencrypted virtual machines and storage volumes belonging to the organization. Enterprise Key Lifecycle Management with Government Grade Assurance The only solution that provides an on-premise key management system with the high assurance key store 1. Cloud based key management can also be performed with ProtectV Manager. Additional information on the ProtectV solution can be found here: http://www.safenet-inc.com/cloud-security/protectv-data-protection-for-the-cloud/ 2.2 Cryptographic Module The SafeNet ProtectV StartGuard is comprised of the following components in a FIPS 140-2 Level 1 configuration: VxBIOS CRYPdll 1 As part of the ProtectV architecture, keys can be stored in SafeNet Hardware Security Modules (HSM s) but the HSM was not tested as part of this validation. Page 2 of 8

ProtectV StartGuard Hardware Pre-Boot Layer VxBIOS CRYPdll Protect V Client Application (User Mode) Cryptographic Boundary Data Input Data Output Control Input Status Output Figure 1. Cryptographic Module Boundary The function of CRYPdll system driver is to support INT13-based sector encrypted sector I/O performed by the boot loader after pre-boot chains to the native master boot record. The boot loader thus performs the function of loading all boot-start device drivers. ProtectV StartGuard is always running in FIPS mode as it only provides FIPS Approved services. 3. CRYPTOGRAPHIC MODULE SPECIFICATION From the point of view of FIPS 140-2, the SafeNet ProtectV StartGuard version 1.0 is a multi-chip standalone cryptographic module whose cryptographic boundary is composed of a logical and a physical boundary. The logical boundary comprises the cryptographic implementation files and the physical boundary includes the hardware platform the module resides on. This document refers specifically to the SafeNet ProtectV StartGuard version 1.0. Page 3 of 8

3.1 FIPS 140-2 Security Levels The module meets overall Level 1 requirements for FIPS 140-2 as summarized in Table No components are excluded from the requirements of FIPS 140-2. Section Section Title Level 1 Cryptographic Module Specification 1 2 Cryptographic Module Ports and Interfaces 1 3 Roles, Services, and Authentication 1 4 Finite State Machine 1 5 Physical Security N/A 6 Operational Environment 1 7 Cryptographic Key Management 1 8 EMI / EMC 3 9 Self Tests 1 10 Design Assurance 1 11 Mitigation of Other Attacks N/A Table 1 FIPS 140-2 Security Levels 4. CRYPTOGRAPHIC MODULE PORTS AND INTERFACES The cryptographic module provides several interfaces for data input, data output, status output, and command input. 4.1 Interfaces All requests for services are sent to the ProtectV StartGuard via an API. The module s interfaces are separated into the logical and physical interfaces, defined by FIPS 140-2, and described below: FIPS 140-2 Interface Logical Interface Physical Interface Data Input Interface Data Output Interface Control Input Interface Status Output Interface Power Interface Data input parameters of API function calls Data output parameters of API function calls Control input parameters of API function calls that command the module Status output parameters of API function calls that show the status of the module Table 2. FIPS 140-2 Interfaces keyboard port, mouse port, USB port, serial port VGA port, USB port, serial port keyboard port, mouse port, USB port. VGA port Power connector Page 4 of 8

5. ROLES, SERVICES AND AUTHENTICATION 5.1 Identification and Authentication 5.2 Roles The ProtectV StartGuard does not support authentication mechanisms. The Cryptographic-Officer and User roles are both implicitly assumed by the operator as both roles can execute all services. 5.3 Services for Authorized Roles and Access Control Table 3 shows the services that use or affect cryptographic keys or CSPs. For each service, the key or CSP is indicated along with the type of access. R - The item is read or referenced by the service. W - The item is written or updated by the service. X - The item is executed by the service. (The item is used as part of a cryptographic function.) Crypto-Officer: CO User: U Services Role Key/CSP Access Control Self-Test CO, U None X Decrypt CO, U Volume Key (VK) R, X Encrypt CO, U Volume Key (VK) R, X Show Status CO, U None R Zeroize CO, U Volume Key (VK) X 6. PHYSICAL ENVIRONMENT Table 3. ProtectV StartGuard Services and Authorized Roles ProtectV StartGuard was tested on a Dell PowerEdge R610 server with an Intel Xeon E5620 CPU that meets FCC Class B requirements at FIPS 140-2 Level 3. The SafeNet ProtectV StartGuard is implemented as software only components and thus the FIPS 140-2 physical security requirements are not applicable. 7. OPERATIONAL ENVIRONMENT For the purpose of FIPS 140-2 Level 1 validation, the SafeNet ProtectV StartGuard is classified as a multi-chip standalone module as defined by FIPS PUB 140-2. The module has been tested on a Windows 2012 Server 64-bit running VMware s ESXi 5.0. 8. CRYPTOGRAPHIC KEY MANAGEMENT 8.1 Key Generation The module does not generate keys. Page 5 of 8

8.2 Key Input / Output ProtectV StartGuard has no logic to manage keys but keys can be input in encrypted form but keys are never output. 8.3 Key Zeroization Keys are zeroized by uninstalling the ProtectV application and performing a low level format of the hard disk drive. 8.4 Algorithms Tables 4 and 5 list the module approved algorithms. In the FIPS mode of operation only these Approved algorithms are available. The module implements the following FIPS Approved or Allowed algorithms for VxBIOS: Approved or Allowed Security Functions Certificate Secure Hash Standard (SHS) SHA-256 (Byte Only) 2151 Message Authentication Code HMAC-SHA-256 (KeySize = Block Size) 1571 Table 4. - VxBIOS FIPS Approved or Allowed Algorithms The module implements the following FIPS Approved or Allowed algorithms for CRYPdll: Approved or Allowed Security Functions Certificate Symmetric Encryption/Decryption AES: (CBC Mode; Encrypt/Decrypt; Key Size = 256) 2550 Table 5. - Crypdll FIPS Approved or Allowed Algorithms Page 6 of 8

8.5 Security Functions, Cryptographic Keys and CSPs Table 6 lists the security functions by indicating each CSP, the type of key it is, and how it is used. CSP CSP Type Generation Input/Output Storage Destruction Mechanism Volume Key (VK) AES key 256-bit Not Generated Input - Encrypted Not stored, resides in volatile memory Format HDD Use Decryption of System Volume Table 6. Approved Security Functions, Cryptographic Keys and CSPs Page 7 of 8

9. SELF-TESTS The ProtectV StartGuard performs a number of power-up self-tests to ensure proper operation. 9.1 Power-On Self-Tests (POST) When the SafeNet ProtectV StartGuard is initially powered-on, it executes power-on self-tests automatically as the module is the first thing that loads. If any of these tests fail, the module will enter an error state and prohibit an operator from exercising the module s cryptographic functionality. No data is output by the module while these tests are running. The operator can try clearing the error by rebooting the system. If the module cannot pass the power-on self-test it will remain in the error state. Table 7 lists the power-on self-tests: Test Function FIPS 140-2 Required Symmetric Cipher AES KAT Performs known answer test for AES encrypt/decrypt for CRYPdll Software Integrity Tests HMAC-SHA-256 for VxBIOS and CRYPdll Yes 10. MITIGATION OF OTHER ATTACKS Table 7. Power-On Self-Tests The FIPS 140-2 Mitigation of Other Attacks requirements are not applicable because the module is not designed to mitigate any specific attacks. 11. FIPS APPROVED MODE OF OPERATION 11.1 Description The ProtectV StartGuard only contains FIPS Approved algorithms such that when the module is installed, it is automatically in FIPS mode. 11.2 Invoking Approved Mode of Operation The ProtectV StartGuard is installed in FIPS Approved mode as its only function is to perform symmetric decryption. 11.3 Mode of Operation Indicator The module is in FIPS mode when the module boots successfully. If the module fails a power-on self-test, the module and operating system will not boot. Yes Page 8 of 8

12. GLOSSARY OF ACRONYMS, TERMS AND ABBREVIATIONS Term AES CO EFS LMC POST VK Definition Advanced Encryption Standard Cryptographic Officer Embedded File System Local Management Console Power On Self Test Volume Key A1 A1