Security Policy
Total Page:16
File Type:pdf, Size:1020Kb
Infineon Technologies AG CCS ESS Trusted Platform Module 2.0 SLB 9670 FIPS 140-2 Level 2 Non-Proprietary Security Policy Version: 1.01 Date: 21 June 2019 Trusted Platform Module 2.0 SLB 9670 Page 1 of 25 V1.01, 2019-06-21 FIPS 140-2 Level 2 Security Policy Project Specific Documents Table of Contents References .............................................................................................................................................................. 4 Acronyms and Definitions ....................................................................................................................................... 5 1 Overview .......................................................................................................................................................... 6 1.1 Versions, Configurations and Modes of Operation ......................................................................................... 6 1.2 Physical Characteristics and Cryptographic Boundary ..................................................................................... 7 1.3 Operational Environment ................................................................................................................................ 8 1.4 TPM Composition ............................................................................................................................................. 9 2 Cryptographic Functionality ............................................................................................................................ 10 2.1 Critical Security Parameters and Public Keys ................................................................................................. 12 3 Roles, Authentication and Services ................................................................................................................. 14 3.1 TPM Identification and Authentication Methods .......................................................................................... 14 3.2 Services .......................................................................................................................................................... 16 4 Self-tests ......................................................................................................................................................... 20 5 Physical Security Policy ................................................................................................................................... 22 6 Electromagnetic Interference and Compatibility (EMI/EMC) ........................................................................... 22 7 Mitigation of Other Attacks Policy................................................................................................................... 22 8 Security Rules and Guidance ........................................................................................................................... 23 8.1 Requirements for Secure Operation .............................................................................................................. 23 9 Annex A – Module Initialization ...................................................................................................................... 25 10 Annex B – Module Startup .............................................................................................................................. 25 Trusted Platform Module 2.0 SLB 9670 Page 2 of 25 V1.01, 2019-06-21 FIPS 140-2 Level 2 Security Policy Project Specific Documents List of Tables Table 1: References ........................................................................................................................................................... 4 Table 2: Acronyms and Definitions ................................................................................................................................... 5 Table 3: Security Level of Security Requirements ............................................................................................................. 6 Table 4: Configuration Part and Version Numbers ........................................................................................................... 6 Table 5: Types printed on packages .................................................................................................................................. 7 Table 6: Ports and Interfaces ............................................................................................................................................ 8 Table 7: Approved Cryptographic Functions ................................................................................................................... 10 Table 8: Allowed Cryptographic Functions ..................................................................................................................... 11 Table 9: Non-Approved Cryptographic Functions ........................................................................................................... 11 Table 10: Cryptographic Keys and CSPs .......................................................................................................................... 12 Table 11: Public Keys ....................................................................................................................................................... 13 Table 12: Roles Supported by the Module ..................................................................................................................... 14 Table 13: Roles and Required Identification and Authentication ................................................................................... 14 Table 14: Strength of Authentication Mechanisms ........................................................................................................ 15 Table 15: Unauthenticated Services CSP Access ............................................................................................................. 16 Table 16: Utility Support Services CSP Access ................................................................................................................ 17 Table 17: User Authenticated Services CSP Access ......................................................................................................... 18 Table 18: ADMIN (CO) Authenticated Services CSP Access ............................................................................................ 19 Table 19: DUP Authenticated Services CSP Access ......................................................................................................... 19 Table 20: TPM Challenge + Response Authentication and Encryption Services ............................................................. 19 Table 21: TPM Self-Tests ................................................................................................................................................. 20 Table 22: Mitigation of Other Attacks............................................................................................................................. 22 List of Figures Figure 1: TPM 2.0 in package PG-UQFN-32-1 (left: top view; right: bottom view) .......................................................... 7 Figure 2: TPM 2.0 in package PG-VQFN-32-13 (left: top view; right: bottom view) ......................................................... 7 Figure 3: Module Block Diagram ....................................................................................................................................... 9 Document History Version Change Description 0.90 • Initial Version based on TPM2.0 Security Policy for SLB9670,65,60 • Removed all Content/Referenceds to SLB9660,65,LPC and TSSOP Packages and added UQFN Package • Changed Physical Security from 2 to 3 • Updated Self Test Description for Key Load Test 0.91 • Removed SLBSLB9670UQ12 and SLB9670XU12 Table 5 since there will be no TPM1.2 SKU for UQFN- 32 Package 0.92 • Clarified that Sym HMAC Keys can also be written from external • Removed Annex • Added Clarification for Security Guidance 0.93 • Merged Changes from Spring SP 0.94 • Merged Final Changes from Spring SP from UL Review, Included change of operational environment to unmodifiable and added Vendor affirmed CKG Row to Algorithm Table 0.95 • Clarified in Security Guidance when to use Keys with EncryptedDuplication=1 0.96 • Removed NIST SP800-90A Continious Self Test for DRBG_Generate as aligned with UL and discussed internally 0.97 • Minor consistency fixes, formatting and typos 0.98 • Remove that NDRBG is validated according to NIST SP 800-90B • Update reference to FIPS 180-4, Secure Hash Standard (SHS) Trusted Platform Module 2.0 SLB 9670 Page 3 of 25 V1.01, 2019-06-21 FIPS 140-2 Level 2 Security Policy Project Specific Documents 0.99 • Minor corrections in Derive Sym Key (HMAC, KDK) Service and Clarification U-KDK CSP Description 1.00 • Update of Table 7: CAVP cert. number inserted • Table 15 to Table 20 resized to not truncate tables • Update of document version and date including footer 1.01 • Minor update of description in section 1.1 • Minor update of Table 7 • Minor update of Table 21 References Table 1: References Acronym Full Specification Name [FIPS 180-4] NIST, Secure Hash Standard, FIPS Publication 180-4, August 2015 [FIPS 186-4] NIST, Digital Signature Standard (DSS), FIPS Publication 186-4, July 2013 [FIPS140-2] NIST, Security Requirements for Cryptographic Modules, May 25, 2001 [FIPS197] NIST, Advanced Encryption Standard (AES), FIPS Publication