Security Target for Mercury Systems ASURRE-Stor Solid State Self

Security Target for Mercury Systems ASURRE-Stor Solid State Self

Security Target for Mercury Systems ASURRE-StorTM Solid State Self- Encrypting Drive Version: 1.1 2020-2-06 Prepared For: Mercury Systems, Inc. 3601 E University Dr Phoenix, AZ 85034 Prepared By: Devin Becker UL Verification Services Inc. Security Target for Mercury Systems ASURRE-StorTM Solid State Self-Encrypting Drive Notices: ©2020 Mercury Systems, Inc. All rights reserved. All other brand names are trademarks, registered trademarks, or service marks of their respective companies or organizations It is prohibited to copy, reproduce or retransmit the information contained within this documentation without the express written permission of Mercury Systems, Inc., 3601 E University Dr., Phoenix, AZ 85034. Document Change Log Version Date Author Changes 1.0 1/8/2020 Devin Becker Original Document 1.1 2/06/2020 Devin Becker Updated to address ECR comments Page 2 of 40 Security Target for Mercury Systems ASURRE-StorTM Solid State Self-Encrypting Drive Table of Contents 1. Security Target (ST) Introduction ........................................................................................ 6 1.1 Security Target Reference ........................................................................................... 6 1.2 Target of Evaluation Reference.................................................................................... 6 1.3 Target of Evaluation Overview ..................................................................................... 7 1.3.1 TOE Product Type ................................................................................................ 7 1.3.2 TOE Usage ........................................................................................................... 7 1.3.3 TOE Major Security Features Summary ................................................................ 7 1.3.4 TOE IT environment hardware/software/firmware requirements............................ 7 1.4 Target of Evaluation Description .................................................................................. 7 1.4.1 Target of Evaluation Physical Boundaries ............................................................. 7 1.4.2 Target of Evaluation Logical Boundaries .................................................................... 8 1.4.3 TOE Description ................................................................................................... 8 1.5 Notation, Formatting, and Conventions ........................................................................ 9 2. Conformance Claims .........................................................................................................11 2.1 Common Criteria Conformance Claims .......................................................................11 2.2 Conformance to Protection Profiles .............................................................................11 2.3 Conformance to Security Packages ............................................................................11 2.4 Conformance Claims Rationale...................................................................................11 3. Security Problem Definition ................................................................................................13 3.1 Threats .......................................................................................................................13 3.2 Organizational Security Policies ..................................................................................14 3.3 Assumptions ...............................................................................................................14 4. Security Objectives ............................................................................................................17 4.1 Security Objectives for the Operational Environment ..................................................17 5. Extended Components Definition .......................................................................................18 5.1 Extended Security Functional Requirements Definitions .............................................18 5.2 Extended Security Assurance Requirements Definitions .............................................18 6. Security Requirements .......................................................................................................19 6.1 Security Functional Requirements ..............................................................................19 6.1.1 Class FCS: Cryptographic Support ......................................................................20 6.1.2 Class FDP: User Data Protection .........................................................................24 6.1.3 Class FMT: Security Management .......................................................................24 6.1.4 Class FPT: Protection of the TSF .........................................................................25 6.2 Security Assurance Requirements ..............................................................................27 6.2.1 Extended Security Assurance Requirements .......................................................27 Page 3 of 40 Security Target for Mercury Systems ASURRE-StorTM Solid State Self-Encrypting Drive 7. TOE Summary Specification ..............................................................................................28 7.1 Cryptographic Support ................................................................................................28 7.1.1 Cryptographic Key Generation and Derivation .....................................................28 7.1.2 Cryptographic Key and Key Material Destruction .................................................30 7.1.3 Cryptographic Operations ....................................................................................31 7.2 User Data Protection ...................................................................................................32 7.2.1 Protection of Data on Disk ...................................................................................32 7.3 Security Management .................................................................................................33 7.3.1 Specification of Management Functions ...............................................................33 7.3.2 Security Roles ......................................................................................................34 7.4 Protection of the TSF ..................................................................................................34 7.4.1 Protection of Key and Key Material ......................................................................34 7.4.2 Power Saving States ............................................................................................34 7.4.3 Trusted Update ....................................................................................................34 7.4.4 TSF Testing .........................................................................................................35 8. Terms and Definitions ........................................................................................................37 9. References ........................................................................................................................40 Page 4 of 40 Security Target for Mercury Systems ASURRE-StorTM Solid State Self-Encrypting Drive Table 1: FIPS Approved Cryptographic Algorithms .................................................................... 9 Table 2: Applied Technical Decisions ........................................................................................11 Table 3: Threats ........................................................................................................................13 Table 4: Assumptions................................................................................................................14 Table 5: Security Objectives for the Operational Environment ...................................................17 Table 6: Security Functional Requirements ...............................................................................19 Table 7: Assurance Requirements ............................................................................................27 Table 8: Cryptographic Key Table – Mode 1 .............................................................................30 Table 9: Cryptographic Key Table – Mode 6 .............................................................................31 Table 10: Cryptographic Operations ..........................................................................................31 Table 11: Self-tests ...................................................................................................................35 Table 12: Conditional self-tests .................................................................................................35 Table 13: cPP Glossary ............................................................................................................37 Table 14: CC Abbreviations and Acronyms ...............................................................................38 Table 15: TOE Guidance Documentation ..................................................................................40 Table 16: Common Criteria v3.1 References ............................................................................40 Table 17: Supporting Documentation ........................................................................................40 Page 5 of 40 Security Target for Mercury Systems ASURRE-StorTM

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    40 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us