Security Target for Mercury Systems ASURRE-Stor Solid State Self
Total Page:16
File Type:pdf, Size:1020Kb
Security Target for Mercury Systems ASURRE-StorTM Solid State Self- Encrypting Drive Version: 1.1 2020-2-06 Prepared For: Mercury Systems, Inc. 3601 E University Dr Phoenix, AZ 85034 Prepared By: Devin Becker UL Verification Services Inc. Security Target for Mercury Systems ASURRE-StorTM Solid State Self-Encrypting Drive Notices: ©2020 Mercury Systems, Inc. All rights reserved. All other brand names are trademarks, registered trademarks, or service marks of their respective companies or organizations It is prohibited to copy, reproduce or retransmit the information contained within this documentation without the express written permission of Mercury Systems, Inc., 3601 E University Dr., Phoenix, AZ 85034. Document Change Log Version Date Author Changes 1.0 1/8/2020 Devin Becker Original Document 1.1 2/06/2020 Devin Becker Updated to address ECR comments Page 2 of 40 Security Target for Mercury Systems ASURRE-StorTM Solid State Self-Encrypting Drive Table of Contents 1. Security Target (ST) Introduction ........................................................................................ 6 1.1 Security Target Reference ........................................................................................... 6 1.2 Target of Evaluation Reference.................................................................................... 6 1.3 Target of Evaluation Overview ..................................................................................... 7 1.3.1 TOE Product Type ................................................................................................ 7 1.3.2 TOE Usage ........................................................................................................... 7 1.3.3 TOE Major Security Features Summary ................................................................ 7 1.3.4 TOE IT environment hardware/software/firmware requirements............................ 7 1.4 Target of Evaluation Description .................................................................................. 7 1.4.1 Target of Evaluation Physical Boundaries ............................................................. 7 1.4.2 Target of Evaluation Logical Boundaries .................................................................... 8 1.4.3 TOE Description ................................................................................................... 8 1.5 Notation, Formatting, and Conventions ........................................................................ 9 2. Conformance Claims .........................................................................................................11 2.1 Common Criteria Conformance Claims .......................................................................11 2.2 Conformance to Protection Profiles .............................................................................11 2.3 Conformance to Security Packages ............................................................................11 2.4 Conformance Claims Rationale...................................................................................11 3. Security Problem Definition ................................................................................................13 3.1 Threats .......................................................................................................................13 3.2 Organizational Security Policies ..................................................................................14 3.3 Assumptions ...............................................................................................................14 4. Security Objectives ............................................................................................................17 4.1 Security Objectives for the Operational Environment ..................................................17 5. Extended Components Definition .......................................................................................18 5.1 Extended Security Functional Requirements Definitions .............................................18 5.2 Extended Security Assurance Requirements Definitions .............................................18 6. Security Requirements .......................................................................................................19 6.1 Security Functional Requirements ..............................................................................19 6.1.1 Class FCS: Cryptographic Support ......................................................................20 6.1.2 Class FDP: User Data Protection .........................................................................24 6.1.3 Class FMT: Security Management .......................................................................24 6.1.4 Class FPT: Protection of the TSF .........................................................................25 6.2 Security Assurance Requirements ..............................................................................27 6.2.1 Extended Security Assurance Requirements .......................................................27 Page 3 of 40 Security Target for Mercury Systems ASURRE-StorTM Solid State Self-Encrypting Drive 7. TOE Summary Specification ..............................................................................................28 7.1 Cryptographic Support ................................................................................................28 7.1.1 Cryptographic Key Generation and Derivation .....................................................28 7.1.2 Cryptographic Key and Key Material Destruction .................................................30 7.1.3 Cryptographic Operations ....................................................................................31 7.2 User Data Protection ...................................................................................................32 7.2.1 Protection of Data on Disk ...................................................................................32 7.3 Security Management .................................................................................................33 7.3.1 Specification of Management Functions ...............................................................33 7.3.2 Security Roles ......................................................................................................34 7.4 Protection of the TSF ..................................................................................................34 7.4.1 Protection of Key and Key Material ......................................................................34 7.4.2 Power Saving States ............................................................................................34 7.4.3 Trusted Update ....................................................................................................34 7.4.4 TSF Testing .........................................................................................................35 8. Terms and Definitions ........................................................................................................37 9. References ........................................................................................................................40 Page 4 of 40 Security Target for Mercury Systems ASURRE-StorTM Solid State Self-Encrypting Drive Table 1: FIPS Approved Cryptographic Algorithms .................................................................... 9 Table 2: Applied Technical Decisions ........................................................................................11 Table 3: Threats ........................................................................................................................13 Table 4: Assumptions................................................................................................................14 Table 5: Security Objectives for the Operational Environment ...................................................17 Table 6: Security Functional Requirements ...............................................................................19 Table 7: Assurance Requirements ............................................................................................27 Table 8: Cryptographic Key Table – Mode 1 .............................................................................30 Table 9: Cryptographic Key Table – Mode 6 .............................................................................31 Table 10: Cryptographic Operations ..........................................................................................31 Table 11: Self-tests ...................................................................................................................35 Table 12: Conditional self-tests .................................................................................................35 Table 13: cPP Glossary ............................................................................................................37 Table 14: CC Abbreviations and Acronyms ...............................................................................38 Table 15: TOE Guidance Documentation ..................................................................................40 Table 16: Common Criteria v3.1 References ............................................................................40 Table 17: Supporting Documentation ........................................................................................40 Page 5 of 40 Security Target for Mercury Systems ASURRE-StorTM