Level 3 Non-Proprietary Security Policy For
Total Page:16
File Type:pdf, Size:1020Kb
LEVEL 3 NON-PROPRIETARY SECURITY POLICY FOR SafeNet Luna K7+ Cryptographic Module (Used as a standalone device and as an embedded device in a SafeNet Luna Network HSM configured to use PED or Password Authentication) (FIPS 140-2 Physical Security Level 4) DOCUMENT NUMBER: 002-010937-001 REVISION LEVEL: H REVISION DATE: May 7, 2018 SECURITY LEVEL: Non-Proprietary © Copyright 2018 Gemalto. ALL RIGHTS RESERVED This document may be freely reproduced and distributed whole and intact including this copyright notice. Gemalto reserves the right to make changes in the product or its specifications mentioned in this publication without notice. Accordingly, the reader is cautioned to verify that information in this publication is current before placing orders. The information furnished by Gemalto in this document is believed to be accurate and reliable. However, no responsibility is assumed by Gemalto for its use, or for any infringements of patents or other rights of third parties resulting from its use. Document is Uncontrolled When Printed. 002-010937-001 Revision Level: H PREFACE This document deals only with operations and capabilities of the SafeNet Luna K7+ Cryptographic Module and SafeNet Luna K7+ Cryptographic Module for SafeNet Luna Network HSM in the technical terms of a FIPS 140-2 cryptographic module security policy. More information is available on the SafeNet HSMs and other Gemalto products from the following sources: The Gemalto internet site contains information on the full line of security products at https://safenet.gemalto.com. For answers to technical or sales related questions please refer to the contacts listed below or on the Gemalto internet site at https://safenet.gemalto.com/contact-us/. SafeNet Contact Information: Gemalto 4690 Millennium Drive Belcamp, MD 21017 Telephone: 410-931-7500 TTY Users: 800-735-2258 Fax: 410-931-7524 SafeNet Canada, Inc. 20 Colonnade Road Suite 200 Ottawa, Ontario K2E 7M6 Telephone: +1 613 723 5077 Fax: +1 613 723 5079 Gemalto Sales: 800-533-3958 SafeNet Technical Support: U.S. 800-545-6608 International 410-931-7520 SafeNet Customer Service: U.S. 866-251-4269 EMEA +44 (0) 1276 60 80 00 APAC 852 3157 7111 Document is Uncontrolled When Printed Page ii of iv 002-010937-001 Revision Level: H TABLE OF CONTENTS Section Title Page 1. INTRODUCTION ..................................................................................................................................... 1 1.1 Purpose ............................................................................................................................................ 1 1.2 Scope ................................................................................................................................................ 1 1.3 Validation Overview .......................................................................................................................... 1 1.4 Functional Overview ......................................................................................................................... 2 2. MODULE OVERVIEW ............................................................................................................................. 2 2.1 Module Specification ........................................................................................................................ 2 2.2 Ports and Interfaces ......................................................................................................................... 3 2.2.1 Trusted Path .............................................................................................................................. 4 2.2.2 Remote PED .............................................................................................................................. 5 2.2.1 Secure Messaging ..................................................................................................................... 6 2.3 Roles and Services ........................................................................................................................... 6 2.3.1 Roles ......................................................................................................................................... 6 2.3.2 Services ..................................................................................................................................... 8 2.4 Authentication ................................................................................................................................. 13 2.4.1 Activation ................................................................................................................................. 13 2.4.2 M of N ...................................................................................................................................... 14 2.5 Physical Security ............................................................................................................................ 14 2.5.1 Tamper Detection Envelope .................................................................................................... 14 2.5.2 External Event ......................................................................................................................... 14 2.5.3 PCIe Card Removal ................................................................................................................ 14 2.5.4 EFP .......................................................................................................................................... 15 2.5.5 Decommission ......................................................................................................................... 15 2.5.1 Secure Transport Mode ........................................................................................................... 15 2.5.2 Fault Tolerance........................................................................................................................ 15 2.6 Operational Environment ................................................................................................................ 16 2.7 Cryptographic Key Management .................................................................................................... 16 2.7.1 FIPS-Approved Algorithm Implementations ............................................................................ 16 2.7.2 Non-Approved Algorithm Implementations ............................................................................. 19 2.7.3 Cryptographic Keys and Critical Security Parameters ............................................................ 21 2.7.4 Key Generation........................................................................................................................ 26 2.7.5 Key Entry & Output .................................................................................................................. 26 Document is Uncontrolled When Printed Page iii of iv 002-010937-001 Revision Level: H 2.7.6 Key Storage ............................................................................................................................. 26 2.7.7 Zeroization ............................................................................................................................... 27 2.8 Electromagnetic Interference/Electromagentic Capability .............................................................. 27 2.9 Self-Tests ........................................................................................................................................ 27 2.9.1 Power-On Self-Tests ............................................................................................................... 27 2.9.2 Conditional Self-Tests ............................................................................................................. 29 2.10 Mitigation of Other Attacks .......................................................................................................... 30 3. GUIDANCE ............................................................................................................................................ 30 3.1 FIPS 140-2 Approved Mode of Operation ...................................................................................... 30 3.2 Firmware Loading ........................................................................................................................... 30 APPENDIX A. GLOSSARY OF ACRONYMS/ABBREVIATIONS .......................................................... 31 LIST OF TABLES Table Title Page Table 1-1 FIPS 140-2 Security Levels .......................................................................................................... 1 Table 2-1 Mapping of FIPS 140-2 Interfaces to Physical and Logical Interfaces ......................................... 4 Table 2-2 Mapping of FIPS 140-2 Roles to Module Roles ........................................................................... 7 Table 2-3 Roles and Access Rights by Service ............................................................................................ 8 Table 2-4 Roles and Required Identification and Authentication ................................................................ 13 Table 2-5 Strengths of Authentication Mechanisms ................................................................................... 13 Table 2-6 FIPS-Approved Algorithm Implementations ............................................................................... 16 Table 2-7 Allowed Security Function for the