R&S NRP USB and LAN Power Sensors Instrument Security Procedures

Similar documents
R&S NRP-Z5 USB Sensor Hub Instrument Security Procedures

R&S ZN-Z154 Calibration Unit Instrument Security Procedures

R&S NRP2 Power Meter Instrument Security Procedures

R&S SGS100A SGMA RF Source Instrument Security Procedures

R&S SMB100A RF and Microwave Signal Generator Instrument Security Procedures

R&S SMBV100A Vector Signal Generator Instrument Security Procedures

R&S SMW200A Vector Signal Generator Instrument Security Procedures

Model Number(s): DSO5xxxA/DSO/MSO6xxxA. **Declassification of the 5000A/6000A Series Oscilloscope**

Resolving Security Issues when working with R&S SMU200A, R&S SMATE200A, R&S SMJ100A, R&S AMU200A, or R&S AFQ100A or R&S AFQ100B in Secure Areas

R&S FSL Spectrum Analyzer Resolving Security Issues When Working in Secure Areas

Resolving Security Issues When Working with the R&S FS315 in Secure Areas

4287A Security Features Rev. 1.0

R&S ZN-Z5x Calibration Units User Manual

R&S ZN-Z15x Calibration Units User Manual

Resolving Security Issues When Working with the R&S ESIB in Secure Areas

*P *

R&S RECAL + Release Notes Software Version 4.01

PSA-Series Spectrum Analyzers

Security Features and Volatility Documentation

Security Features and Volatility Documentation

RSA5100A Series Real-Time Signal Analyzers Declassification and Security Instructions

R&S NRP-Z51/-Z52/-Z55/-Z56/- Z57/-Z58 Thermal Power Sensors Release Notes

8560E/EC-Series Spectrum Analyzers. Security Features and Volatility

Keysight N5191A/93A UXG X-Series Agile Signal Generator

Agilent 86100D DCA-X Wide-Bandwidth Oscilloscope Mainframe. Declassification and Security

R&S Power Meter NRP Release Notes Firmware Version

R&S NRP-Z27/-Z37 Power Sensor Module Release Notes Firmware Version 04.18a

R&S Spectrum Rider FPH Release Notes Firmware Version V1.50

ESA-Series Spectrum Analyzers EMC Analyzers NFA Series Noise Figure Analyzers. Security Features

TDS820 Digitizing Oscilloscope Declassification and Security Instructions

86100 Series Infiniium DCA Oscilloscope

R&S RTC1002 Digital Oscilloscope Release Notes Firmware Version

Keysight M9393A PXIe Vector Signal Analyzer

R&S SMA100B Release Notes Firmware Version

R&S TSMAx Release Notes Firmware Version

R&S Spectrum Rider FPH Release Notes Firmware Version V1.40

R&S RTA4000 Digital Oscilloscope Release Notes Firmware Version

R&S SMW200A Creating Tutorials and Interactive Examples Application Sheet

R&S ESU EMI Test Receiver. Release Notes. Firmware Version V5.74 SP1. Only an ESU with Windows 7 Operating System is supported

BitLocker White Paper Windows 10

It also offers a RAM backed file system that will disappear on loss of power. NOT APPLICABLE. Memory Information and Procedures

5SeriesMSO (MSO54, MSO56, MSO58) With Option 5-SEC Enhanced Security Instrument Declassification and Security Instructions

R&S RTO, R&S RTP R&S ScopeSuite Automation Manual

WFM6120, WFM7020, and WFM7120 Waveform Monitors Declassification and Security Instructions

Tektronix 4000 Series Oscilloscopes Declassification and Security Instructions

R&S ESR EMI Test Receiver Release Notes Firmware Version V3.36 SP2

PQA500 Picture Quality Analyzer Declassification and Security Instructions

Keysight M9381A PXIe VSG, M9380A PXIe CW Source, and M9391A PXIe VSA

R&S GNSS Test Automation Release Notes Software Version 1.3.2

R&S SMB100B Release Notes Firmware Version

Artisan Technology Group is your source for quality new and certified-used/pre-owned equipment

R&S Pulse Sequencer DFS Software Release Notes Software Version 1.6

Xerox WorkCentre Statement of Volatility Version 1.0

R&S TSMA Release Notes Firmware Version

TG8000 Multiformat Test Signal Generator Declassification and Security Instructions

TG8000 Multiformat Test Signal Generator Declassification and Security Instructions

EMC Measurement Software EMC32

R&S Pulse Sequencer DFS Software Release Notes Software Version 1.7

Statement of Volatility Xerox WorkCentre 4250/4260

Statement of Volatility Xerox igen TM 150 Digital Press

Firmware Version Build 170 SP1

Release Notes. R&S FSC Spectrum Analyzer

R&S DigIConf Software Release Notes Firmware Version Build 170 SP1

R&S AVG Pattern Import Release Notes Firmware Version 02.25

LabVIEW driver history for the R&S HMC8012 Driver Documentation

R&S GP-U gateprotect Firewall How-to

TopSec Mobile Secure voice encryption for smartphones and laptops

Firmware Release ( 32-Bit-WINDOWS version )

R&S RTO-K81, R&S RTP-K81 PCIe Compliance Test Test Procedures

R&S SGT100A RF Source Base Unit Release Notes FW Version

Xerox Iridesse Press Statement of Volatility. Month 00, 0000 <Part Number>

Battery Backup. Sanitization Procedure Waveform Data SDRAM 32 MB (-01/-21) No Yes Yes Cycle Power

R&S ESW Test Receiver Release Notes Firmware Version V1.40 SP1

TopSec Product Family Voice encryption at the highest security level

Simple Sequencing Tool for SCPI Commands Application Note

R&S ELEKTRA EMC Test Software Swift and reliable measurement of electromagnetic disturbances

R&S NRPV Virtual Power Meter Release Notes Application Version 3.2

Statement of Volatility WorkCentre 7220/7225

R&S ELEKTRA Release Notes Software Version V2.10

R&S NRP Series Power Sensors Getting Started

IT security for energy infrastructures

R&S CMW Bluetooth Release Notes Software Version V3.2.70

TSML-W Radio Network Analyzer

Sanitization Procedure Waveform storage DRAM 2 GB No Yes Yes Cycle Power Device operation FPGA / Processor Xilinx XC7Z100 (-01/-03) XC7Z035 (-02)

Release Notes Revision: 01

Statement of Volatility WorkCentre 7830/7835/7845/7855

LB5900 Series Sensor Unattended Operation Guide

Statement of Volatility Xerox WorkCentre 3210/3220

T E C H N O L O G I E S. User Guide. 1:1 HDD Duplicator PRO (HDUSI325)

Xerox Versant 3100 Press Statement of Volatility. Month 00, 0000 <Part Number>

SEMICONDUCTOR PRODUCT INFORMATION

Synergy Controller Application Note 126 March 2015, Revision - Tidal Engineering Corporation 2015

Xerox Versant 180 Press Statement of Volatility. Month 00, 0000 <Part Number>

Statement of Volatility XEROX 700 Digital Color Press

R&S VISA Release Notes Software Version 5.8.6

DRIVER STATION v1.0 UTILITY LOADER Created: 22DEC2008 FIRST DRIVER STATION UTILITY LOADER RE-IMAGE INSTRUCTIONS

Xerox Versant 3100 Press Xerox FreeFlow Print Server. Statement of Volatility Version 1.0

Statement of Volatility Xerox EX-P 1000i Print Server, Powered by Fiery for the Xerox Color 800i/1000i Press

Statement of Volatility WorkCentre 5845/5855/5865/5875/5890

Floppy Disk Control of the I/Q Modulation Generator AMIQ

Transcription:

USB and LAN Power Sensors Instrument Security Procedures (;ÛÁ42) 1177.5104.02 02 Instrument Security Procedures

Contents Contents 1 Overview... 2 2 Instrument Models Covered...2 3 Security Terms and Definitions... 3 4 Types of Memory and Information Storage in the R&S Power Sensors...4 5 Secure Erase Procedures...7 6 Instrument Declassification... 8 1 Overview In many cases, it is imperative that the R&S NRPxxN R&S power sensorss are used in a secured environment. Generally these highly secured environments do not allow any test equipment to leave the area unless it can be proven that no user information leaves with the test equipment. Security concerns can arise when devices need to leave a secured area e.g. to be calibrated or serviced. This document describes the types of memory and their usage in the R&S NRPxxN. It provides a statement regarding the volatility of all memory types and specifies the steps required to declassify an instrument through memory clearing or sanitization procedures. These sanitization procedures are designed for customers who need to meet the requirements specified by the US Defense Security Service (DSS). 2 Instrument Models Covered Product name Order number R&S NRPxxS(N) R&S NRP8S 1419.0006.02 R&S NRP8SN 1419.0012.02 R&S NRP18S 1419.0029.02 R&S NRP18SN 1419.0035.02 R&S NRP18S-10 1424.6721.02 R&S NRP18S-20 1424.6738.02 2

Security Terms and Definitions Product name Order number R&S NRP18S-25 1424.6744.02 R&S NRP33S 1419.0064.02 R&S NRP33SN 1419.0070.02 R&S NRP33SN-V 1419.0129.02 R&S NRP40S 1419.0041.02 R&S NRP40SN 1419.0058.02 R&S NRP50S 1419.0087.02 R&S NRP50SN 1419.0093.02 R&S NRPxxA(N) R&S NRP6A 1424.6796.02 R&S NRP6AN 1424.6809.02 R&S NRP18A 1424.6815.02 R&S NRP18AN 1424.6821.02 R&S NRPxxT(N) R&S NRP18T 1424.6115.02 R&S NRP18TN 1424.6121.02 R&S NRP33T 1424.6138.02 R&S NRP33TN 1424.6144.02 R&S NRP40T 1424.6150.02 R&S NRP40TN 1424.6167.02 R&S NRP50T 1424.6173.02 R&S NRP50TN 1424.6180.02 R&S NRP67T 1424.6196.02 R&S NRP67TN 1424.6209.02 R&S NRP110T 1424.6215.02 3 Security Terms and Definitions Clearing The term "clearing" is defined in Section 8-301a of DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)". Clearing is the process of eradicating the data on media so that the data can no longer be retrieved using the standard inter- 3

Types of Memory and Information Storage in the R&S Power Sensors faces on the instrument. Therefore, clearing is typically used when the instrument is to remain in an environment with an acceptable level of protection. Sanitization The term "sanitization" is defined in Section 8-301b of DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)". Sanitization is the process of removing or eradicating stored data so that the data cannot be recovered using any known technology. Instrument sanitization is typically required when an instrument is moved from a secure to a non-secure environment, such as when it is returned for service of calibration. The memory sanitization procedures described in this document are designed for customers who need to meet the requirements specified by the US Defense Security Service (DSS). These requirements are specified in the "Clearing and Sanitization Matrix" in Section 14.1.16 of the ISFO "Manual for the Certification and Accreditation of Classified Systems under the NISPOM". Instrument declassification The term "instrument declassification" refers to procedures that must be undertaken before an instrument can be removed from a secure environment, for example when the instrument is returned for calibration. Declassification procedures include memory sanitization or memory removal, or both. The declassification procedures described in this document are designed to meet the requirements specified in DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)", Chapter 8. 4 Types of Memory and Information Storage in the R&S Power Sensors The R&S power sensors contain two independent processor systems; one is running the firmware application (MAIN) and the second one acts as a communication frontend for the USB channels (COMM). Both processor systems access various memory areas. The following table provides an overview of the memory components that are part of your instrument. For a detailed description regarding type, size, usage and location, refer to the subsequent sections. 4

Types of Memory and Information Storage in the R&S Power Sensors Volatile Memory Memory type Size Content Volatility User data Sanitization procedure SDRAM MAIN processor OCRAM MAIN processor SRAM COMM processor Flash COMM processor Flash MAIN processor 512 MiB RAM used by operating system, firmware and FPGA to control the power sensor operation 256 KiB On-chip RAM of processor; used for booting the sensor only 52 KiB Communication and interface protocols (USB) 256 KiB Firmware for communication channels (USB) of the sensor 64 MiB Boot code, operating system and sensor firmware; user data (user calibration data, save/recall settings, configuration settings) Volatile Yes Turn off instrument power (disconnect USB / LAN) Volatile No Turn off instrument power (disconnect USB / LAN) Volatile Yes Turn off instrument power (disconnect USB / LAN) Non-volatile No None required Non-volatile Yes Secure erase (see Chapter 5, "Secure Erase Procedures", on page 7) 4.1 Volatile Memory The volatile memory in the instrument does not have battery backup. It loses its contents as soon as power is removed from the instrument (disconnect USB or LAN). The volatile memory is not a security concern. Removing power from this memory meets the memory sanitization requirements specified in the "Clearing and Sanitization Matrix" in Section 5.2.5.5.5 of the ISFO Process Manual for the Certification and Accreditation of Classified Systems under the NIS- POM. SDRAM (MAIN processor) The SDRAM has a size of 512 MiB SDRAM. It is used by the operating system, the firmware and FPGA to control the power sensor functionality. 5

Types of Memory and Information Storage in the R&S Power Sensors Non-Volatile Memory Sanitization procedure: Turn off instrument power (disconnect USB or LAN) OCRAM (MAIN processor) The OCRAM has a size of 256 KiB. It is used to boot the R&S power sensors. Sanitization procedure: Turn off instrument power (disconnect USB or LAN) SRAM The SRAM has a size of 52 KiB. It is used by the COMM processor for the communication and interface protocols. Sanitization procedure: Turn off instrument power (disconnect USB or LAN) 4.2 Non-Volatile Memory The R&S power sensors contain non-volatile memory on both processor systems, MAIN and COMM. Flash (COMM processor) The flash memory on the COMM processor has a size of 256 KiB. It contains the COMM processor firmware. The firmware controls the communication channels (USB) of the R&S power sensors. In addition, it contains sensor specific data. The memory is programmed in the factory or through firmware updates in the field. The flash memory on the COMM processor does not hold user data nor can the user access the microcontroller flash memory. Sanitization procedure: None required (no user data) Flash (MAIN processor) The serial NOR flash memory has a size of 64 MiB. It is partitioned in different sections. Boot Code Kernel 16 MiB Unused JFFS2 Filesystem 32 MiB 16 MiB OS Files Firmware User Data Boot code kernel This section has a size of 16 MiB and contains boot code (u-boot images) and the operating system kernel. This section is initialized during production and during firmware updates. It cannot be accessed by the user and is not modified during instrument operation. Unused section 6

Secure Erase Procedures This section has a size of 16 MiB and is currently unused and reserved for later use. This section cannot be accessed by the user and is not modified during instrument operation. JFFS2 file system This section has a size of 32 MiB and is controlled by the JFFS2 file system (Journaling Flash File System). It contains the main firmware and user data. The main firmware includes the root file system, measurement firmware including factory calibration data and web pages. User data includes user calibration data, save/recall data, configuration settings. Sanitization procedure: Secure Erase with remote I/O command: SERVice:SECure:ERASe, see next chapter for details. 5 Secure Erase Procedures Because the SDRAM, the OCRAM and the SRAM are erased when power is removed from the power sensor, they do not pose a security risk. The flash memory on the COMM processor contains no user data. Therefore, it is deemed that it does not pose a risk either. The flash memory on the MAIN processor is the only memory type that does not lose its contents when power is removed. It can contain user data. You can sanitize the flash memory by sending the remote I/O command SERVice:SECure:ERASe to the power sensor. SERVice:SECure:ERASe triggers the following actions: Operating system files and power sensor firmware are temporarily saved. A full sector erase command as per manufacturer data sheet is applied to every single sector of the JFFS2 area. Every addressable location of the JFFS2 area is overwritten by a single character. Another full sector erase command as per manufacturer data sheet is applied to every single sector of the JFFS2 area. The JFFS2 file system is recreated and operating system files as well as instrument firmware are restored. The Secure Erase Procedure meets the memory sanitization requirements specified in the "Clearing and Sanitization Matrix" in Section 14.1.16 of the ISFO Process Manual for the Certification and Accreditation of Classified Systems under the NISPOM. 7

Instrument Declassification 6 Instrument Declassification Before you can remove the R&S power sensors from a secured area (for example to perform service or calibration), all classified user data needs to be removed. You can declassify the R&S power sensors as follows: 1. Connect the R&S power sensors via USB or LAN to a PC. 2. Sanitize the non-volatile memory as described in Secure Erase Procedures by sending the remote I/O command sequence: SERVice:UNLock 1234 // enables service functions SERVice:SECure:ERASe "string" // "string" will be returned in case of sanitization completes successfully, e.g. use current date of sanitization The sanitization will last approximately 10 minutes. During that time the white LED on the R&S power sensors blinks with a rate of 1.5 sec. After completion, you can query the result with the remote I/O command: SERVice:SECure:ERASe:STATus? which will return the "string" used in the erase command, e.g. "Sanitization2017-07-17" (or an error code in case the sanitization failed). 3. After memory sanitization, disconnect the power sensor from USB or LAN to remove power supply. R&S NRP Sanitizer tool Another alternative to directly sending the sanitization command to the R&S power sensors (as described in step 2), is to use the R&S NRP Sanitizer tool which is available from the Internet site, see www.rohde-schwarz.com. This tool requires Microsoft Windows 7 or Microsoft Windows 10 and an installed VISA library. After downloading the installer file to your PC and installing the R&S NRP Sanitizer perform the following steps: 1. Start the tool. 8

Instrument Declassification The R&S NRP Sanitizer tool scans automatically for USB power sensors. For LAN power sensors, enter the corresponding address information in the "Hostname or IP Address " field to add the sensor to the list. 2. Select the R&S power sensors you need to sanitize from the list of connected power sensors. 3. Start the sanitizing. 9

Instrument Declassification 4. After the sanitization process is complete, the following message is displayed on the screen: 5. Finally disconnect the R&S power sensors from USB or LAN to remove power supply. Following these steps removes all user data from the power sensor. The power sensor can now leave the secured area. These declassification procedures meet the needs of customers working in secured areas. Validity of instrument calibration after declassification During the declassification procedure, the R&S power sensors factory calibration data is saved and later restored to allow for sensor recalibration. The R&S power sensors remains fully functional after declassification. In certain cases, for example if the sensor has no saved factory calibration data, the complete user data including the calibration data is being erased from the sensor. In this case, the sensor will come up with a red blinking LED in "Fail-Safe-Mode". For recalibration it is necessary to contact the Rohde & Schwarz Backup Service to get the factory calibration data of the sensor. After the calibration data are written to the sensor, it is fully functional for recalibration. 10

Instrument Declassification 2016 Rohde & Schwarz GmbH & Co. KG Mühldorfstr. 15, 81671 München, Germany Phone: +49 89 41 29-0 Fax: +49 89 41 29 12 164 Email: info@rohde-schwarz.com Internet: www.rohde-schwarz.com Subject to change Data without tolerance limits is not binding. R&S is a registered trademark of Rohde & Schwarz GmbH & Co. KG. Trade names are trademarks of their owners. 11