140 SP 3271
140 SP 3271
Version: 1.3
2018-04-23
© 2018 Western Digital Corporation or its affiliates. Public Material - May be reproduced only in its original entirety [without revision].
Ultrastar SS300 TCG Enterprise SSD
CONTENTS
1. Cryptographic Module Overview ............................................................................................................. 4
1.1 Models .......................................................................................................................................................................................4
1.2 Security Level............................................................................................................................................................................5
2. Modes of Operation ................................................................................................................................... 5
2.1 FIPS Approved Mode of Operation .....................................................................................................................................5
2.2 Approved Algorithms..............................................................................................................................................................6
3. Ports and Interfaces .................................................................................................................................... 7
4. Identification and Authentication Policy ................................................................................................. 7
4.1 Crypto-Officer ..........................................................................................................................................................................7
4.1.1 Secure ID (SID) Authority ...............................................................................................................................................7
4.1.2 EraseMaster Authority ......................................................................................................................................................7
4.2 BandMaster Authority (User) .................................................................................................................................................7
4.3 Anybody ....................................................................................................................................................................................8
4.4 Maker .........................................................................................................................................................................................8
5. Access Control Policy ................................................................................................................................ 9
5.1 Roles and Services....................................................................................................................................................................9
5.2 Unauthenticated Services ..................................................................................................................................................... 11
5.3 Definition of Critical Security Parameters (CSPs) ............................................................................................................ 12
5.4 Definition of Public Security Parameters .......................................................................................................................... 13
5.5 SP800-132 Key Derivation Function Affirmations .......................................................................................................... 13
5.6 Definition of CSP Modes of Access .................................................................................................................................. 13
6. Operational Environment ....................................................................................................................... 15
7. Security Rules ............................................................................................................................................ 15
7.1 Invariant Rules....................................................................................................................................................................... 15
7.2 Initialization Rules ................................................................................................................................................................ 16
7.3 Zeroization Rules .................................................................................................................................................................. 17
8. Physical Security Policy ............................................................................................................................ 17
8.1 Mechanisms ........................................................................................................................................................................... 17
8.2 Operator Responsibility ....................................................................................................................................................... 18
9. Mitigation of Other Attacks Policy ........................................................................................................ 18
10. Definitions ................................................................................................................................................. 18
11. Acronyms ................................................................................................................................................... 20
12. References .................................................................................................................................................. 21
12.1 NIST Specifications .............................................................................................................................................................. 21
12.2 Trusted Computing Group Specifications ........................................................................................................................ 21
12.3 International Committee on Information Technology Standards T10 Technical Committee Standards................. 21
12.4 Corporate Documents .......................................................................................................................................................... 22
12.5 SCSI Commands ................................................................................................................................................................... 22
Figures
Figure 1: Ultrastar SS300 Cryptographic Boundary...................................................................................... 4
Figure 2: Tamper-Evident Seals .................................................................................................................... 17
Figure 3: Tamper Evidence on Tamper Seals ............................................................................................. 18
2. Modes of Operation
2.1 FIPS Approved Mode of Operation
The Cryptographic Module has a single FIPS Approved mode of operation. Configuration and policy determine the
Cryptographic Module’s FIPS mode of operation. The Cryptographic Module enters FIPS Approved Mode after
successful completion of the Initialize Cryptographic service instructions. See Section 7.2 for information on the
Cryptographic Module’s initialization rules. The operator can determine if the Cryptographic Module is operating in a
FIPS approved mode by invoking the Get FIPS mode service 1. The Crypto-Officer shall not enable the Maker
Authority after the cryptographic module enters FIPS Approved mode. The cryptographic module is in FIPS non-
Approved mode whenever a successful authentication to the Maker Authority occurs. If the Crypto-Officer enables
the Maker Authority after the module enters FIPS Approved mode the Crypto-Officer must also execute the TCG
Revert Method to zeroize the cryptographic module. If the Crypto-Officer, subsequently, executes the Initialize
Cryptographic service instructions provided in Section 7.2 with the intent of placing the cryptographic module in
FIPS Approved mode the Crypto-Officer must first execute the TCG Revert Method to zeroize the cryptographic
module.
The chapter titled FIPS 140 Crypto-Officer Instructions within the Ultrastar SS300 Product Manual provides
information on how to execute the Initialize Cryptographic service as well as the TCG Revert Method.
1 A return value of 1 indicates that the cryptographic module is operating in FIPS Approved mode.
FIPS 140- 2 Security Policy Page 5 of 23
Ultrastar SS300 TCG Enterprise SSD
2.2 Approved Algorithms
The Cryptographic Module supports the following FIPS Approved algorithms. All algorithms and key lengths
comply with NIST SP 800-131A.
2
Tested AES ECB-128. However, the cryptographic module does not use this algorithm.
3
Tested AES XTS-128. However, the cryptographic module does not use this algorithm.
4 SHA-256 Cert. #3519
The Cryptographic Module supports the following non-Approved but allowed algorithm:
• A hardware NDRNG seeds the Approved [SP800-90A] DRBG. The NDRNG provides a minimum of 256
bits of entropy for key generation.
Table 5 - Ultrastar SS300 Pins and FIPS 140-2 Ports and Interfaces
FIPS 140-2 Interface Cryptographic Module Port Connector Pins
Power Power connector
Control Input SAS connector, Serial connector
Status Output SAS connector, Serial connector
Data Input SAS connector, Serial connector
Data Output SAS connector, Serial connector
5
See the Cryptographic Module Acceptance and Provisioning section within the Ultrastar SS300 Product Manual
FIPS 140- 2 Security Policy Page 9 of 23
Ultrastar SS300 TCG Enterprise SSD
6
See the Cryptographic Module Acceptance and Provisioning section within the Ultrastar SS300 Product Manual
FIPS 140- 2 Security Policy Page 10 of 23
Ultrastar SS300 TCG Enterprise SSD
7
See the FIPS 140 Compliance Descriptor section within the Ultrastar SS300 Product Manual
MEK - Media Encryption Key 8 XTS-AES-256 (512 bits) Encrypts and decrypts LBA Bands.
(16 total - 1 per LBA band) Each key is only associated with one
LBA band. MEKs are generated from
the DRBG without modification.
KEK – Key Encrypting Key SP 800-132 PBKDF (256 Ephemeral keys derived from
(16 total) bits) BandMaster PINs and 256-bit KDF salts
that wrap the MEKs using an [SP 800-
38F] AES-256 Key Wrap.
Note: Keys protected by this [SP 800-
132] PBKDF derived key shall not leave
the module.
NDRNG 256-byte Entropy output Entropy source for DRBG
DRBG Internal CTR_DRBG state All properties and state associated with
(384 bits) the [SP800-90A] Deterministic Random
Bit Generator
8
A concatenation of XTS-AES Key1 (256 bits) and XTS-AES Key2 (256 bits)
Type of CSP
Service CSPs and Keys
Access
Get Data Store None None
Get None None
CO PIN W
User PIN W
Zeroize (TCG Revert) DRBG G
KEK G
MEK Z, G, W
SCSI None None
FIPS 140 Compliance Descriptor None None
6. Operational Environment
The Cryptographic Module operating environment is non-modifiable. Therefore, the FIPS 140-2 operational
environment requirements are not applicable to this module. While operational, the Cryptographic Module prohibits
additions, deletions, or modification of the code working set. Firmware can be upgraded, whereby it is replaced in its
entirety, with an authenticated download service. If the download operation is successfully, authorized and verified,
the Cryptographic Module will begin operating with the new code working set. Firmware loaded into the module that
is not on the certificate is out of the scope of this validation and requires a separate FIPS 140-2 validation.
7. Security Rules
The Ultrastar SS300 enforces applicable FIPS 140-2 Level 2 security requirements. This section documents the security
rules that the Cryptographic Module enforces.
7.1 Invariant Rules
1. The Cryptographic Module supports two distinct types of operator roles: Crypto-Officer and
User. The module also supports an additional role, the Maker role. Initialization disables the
Maker role.
2. Cryptographic Module power cycles clear all existing authentications.
3. After the Cryptographic Module has successfully completed all self-tests and initialized according to the
instructions provided in Section 7.2, it is in FIPS Approved mode. The Crypto-Officer shall not enable
the Maker Authority after the cryptographic module enters FIPS Approved mode.
4. When the Cryptographic Module is unable to authenticate TCG Credentials, operators do not have access
to any cryptographic service other than the unauthenticated Generate Random service.
5. The Cryptographic Module performs the following tests. Upon failure of any test, the Cryptographic
Module enters a soft error state. The Cryptographic module reports the error condition by transmitting
an UEC via the [SCSI] protocol. After entering the soft error state, the cryptographic module does not
process functional commands unless a power cycle occurs.
A. Power up Self-Tests
1) Firmware Integrity 32-bit EDC
2) Firmware AES Encrypt KAT, Cert #4281
3) Firmware AES Decrypt KAT, Cert #4281
4) RSA 2048 PSS Verify KAT, Cert #2302
9
The DRBG KAT is inclusive of the instantiate, generate and reseed function health tests required in [SP 800-90A]
1 2
10. Definitions
• Allowed: NIST approved, i.e., recommended in a NIST Special Publication, or acceptable, i.e., no known
security risk as opposed to deprecated, restricted and legacy-use. [SP800-131A]
• Anybody: A formal TCG term for an unauthenticated role. [TCG Core]
• Approved mode of operation: A mode of the cryptographic module that employs only approved security
functions. [FIPS140]
• Approved: [FIPS140] approved or recommended in a NIST Special Publication.
• Authenticate: Prove the identity of an Operator or the integrity of an object.
• Authorize: Grant an authenticated Operator access to a service or an object.
• Ciphertext: Encrypted data transformed by an Approved security function.
• Confidentiality: A cryptographic property that sensitive information is not disclosed to unauthorized parties.
• Credential: A formal TCG term for data used to authenticate an Operator. [TCG Core]
• Critical Security Parameter (CSP): Security-related information (e.g., secret and private cryptographic keys,
and authentication data such as credentials and PINs) whose disclosure or modification can compromise the
security of a cryptographic module. [FIPS140]
• Cryptographic Boundary: An explicitly defined continuous perimeter that establishes the physical bounds
of a cryptographic module and contains all the hardware, software, and/or firmware components of a
cryptographic module. [FIPS140]
• Cryptographic key (Key): An input parameter to an Approved cryptographic algorithm
FIPS 140- 2 Security Policy Page 18 of 23
Ultrastar SS300 TCG Enterprise SSD
• Cryptographic Module: The set of hardware, software, and/or firmware used to implement approved
security functions contained within the cryptographic boundary. [FIPS140]
• Crypto-Officer: An Operator performing cryptographic initialization and management functions. [FIPS140]
• Data at Rest: User data residing on the storage device media when the storage device is powered off.
• Discovery: A TCG method that provides the properties of the TCG device. [TCG Enterprise]
• Drive Writes per Day (DWPD): Drive Writes Per Day defines how many times the entire capacity of the
SSD can be overwrite every single day of its usable life without failure during the warranty period.
• Integrity: A cryptographic property that sensitive data has not been modified or deleted in an unauthorized
and undetected manner.
• Interface: A logical entry or exit point of a cryptographic module that provides access to the cryptographic
module for logical information flows. [FIPS140]
• Key Derivation Function (KDF): An Approved cryptographic algorithm by which one or more keys are
derived from a shared secret and other information.
• Key Encrypting Key (KEK): A cryptographic key used to encrypt or decrypt other keys.
• Key management: The activities involving the handling of cryptographic keys and other related security
parameters during the entire life cycle of the Cryptographic Module. The handling of authentication data is
representative of a key management activity.
• Key Wrap: An Approved cryptographic algorithm that uses a KEK to provide Confidentiality and Integrity.
• LBA Band: A formal [TCG Core] term that defines a contiguous logical block range (sequential LBAs) to
store encrypted User Data; bands do not overlap and each has its own unique encryption key and other
settable properties.
• Manufactured SID (MSID): A unique default value assigned to each SED during manufacturing. Typically,
the manufacturer prints the MSID on an external label. The MSID is readable with the TCG protocol. It is
the initial and default value for all TCG credentials. [TCG Core]
• Method: A TCG command or message. [TCG Core]
• Operator: A consumer, either human or automation, of cryptographic services that is external to the
Cryptographic Module. [FIPS140]
• Personal Identification Number (PIN): A formal TCG term designating a string of octets used to
authenticate an identity. [TCG Core]
• Plaintext: Unencrypted data.
• Port: A physical entry or exit point of a cryptographic module that. A port provides access to the
Cryptographic Module’s physical signals. [FIPS140]
• PSID (Physical Security Identifier): a SED unique value that is printed on the Cryptographic Module’s
label and is used as authentication data and proof of physical presence for the Zeroize service.
• Public Security Parameters (PSP): Public information, that if modified can compromise the security of the
cryptographic module (e.g., a public key of a key pair).
• Read Data: An external request to transfer User Data from the SED. [SCSI Block]
• Reserved Area: Private data on the Storage Medium that is not accessible outside the Cryptographic
Boundary.
• Security Identifier (SID): A TCG authority used by the Crypto-Officer. [TCG Core]
• Self-Encrypting Drive (SED): A storage device that provides data storage services.
FIPS 140- 2 Security Policy Page 19 of 23
Ultrastar SS300 TCG Enterprise SSD
• Session: A formal TCG term that envelops the lifetime of an Operator’s authentication. [TCG Core]
• Storage Medium: The non-volatile, persistent storage location of a SED; it is partitioned into two disjoint
sets, a User Data area and a Reserved Area.
• User Data: Data transferred from/to a SED using the Read Data and Write Data commands. [SCSI Block]
• User: An Operator that consumes cryptographic services. [FIPS140]
• Write Data: An external request to transfer User Data to a SED. [SCSI Block]
• Zeroize: Invalidate a Critical Security Parameter. [FIPS140]
11. Acronyms
• CO: Cryptographic Office [FIPS140]
• CRC: Cyclic Redundancy Check
• CSP: Critical Security Parameter [FIPS140]
• DRAM: Dynamic Random Access Memory
• DRBG: Deterministic Random Bit Generator
• DW/D: Drive Writes per Day
• EDC: Error Detection Code
• EMI: Electromagnetic Interference
• FIPS: Federal Information Processing Standard
• KAT: Known Answer Test
• KDF: Key Derivation Function
• LBA: Logical Block Address
• MEK: Media Encryption Key
• MSID: Manufactured Security Identifier
• NDRNG: Non-deterministic Random Number Generator
• NIST: National Institute of Standards and Technology
• PIN: Personal Identification Number
• PSID: Physical Security Identifier
• PSP: Public Security Parameter
• SAS: Serial Attached SCSI
• SCSI: Small Computer System Interface
• SED: Self Encrypting Drive
• SID: TCG Security Identifier, the authority representing the Cryptographic Module owner
• SSD: Solid-state Drive
• TCG: Trusted Computing Group
• UEC: Universal Error Code
• XTS: A mode of AES that utilizes "Tweakable" block ciphers
FIPS 140- 2 Security Policy Page 20 of 23
Ultrastar SS300 TCG Enterprise SSD
12. References
12.1 NIST Specifications
• [AES] Advanced Encryption Standard, FIPS PUB 197, NIST, November 2001
• [DSS] Digital Signature Standard, FIPS PUB 186-4, NIST, July 2013
• [FIPS140] Security Requirements for Cryptographic Modules, FIPS PUB 140-2, NIST, December 2002
• [HMAC] The Keyed-Hash Message Authentication Code, FIPS PUB 198-1, July 2008
• [SHA] Secure Hash Standard (SHS), FIPS PUB 180-4, NIST, August 2015
• [SP800 38A] Recommendation for Block Cipher Modes of Operation: Methods and Techniques, NIST,
December 2001
• [SP800-38E] Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for
Confidentiality on Storage Devices, SP800-38E, NIST, January 2010
• [SP800-38F] Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping, NIST,
December 2012
• [SP800-57] Recommendation for Key Management – Part I General (Revision 4), NIST, January 2016
• [SP800-90A] Recommendation for Random Number Generation Using Deterministic Random Bit
Generators (Revision 1), NIST, June 2015
• [SP800-90B] Recommendation for the Entropy Sources Used for Random Bit Generation, NIST, January
2018
• [SP800-131A] Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key
Lengths (Revision 1), NIST, November 2015
• [SP800-132] Recommendation for Password-Based Key Derivation, NIST, December 2010
• [SP800 133] Recommendation for Cryptographic Key Generation, NIST, December 2012
12.2 Trusted Computing Group Specifications
• [TCG Core] TCG Storage Architecture Core Specification, Version 2.0 Revision 1.0 (April 20, 2009)
• [Enterprise] TCG Storage Security Subsystem Class: Enterprise Specification, Version 1.00 Revision 3.00 (January 10,
2011)
• [TCG App Note] TCG Storage Application Note: Encrypting Storage Devices Compliant with SSC: Enterprise, Version
1.00 Revision 1.00 Final
• [TCG Opal] TCG Storage Security Subsystem Class: Opal Specification, Version 2.00 Final Revision 1.00 (February
24, 2012)
• TCG Storage Interface Interactions Specification (SIIS), Version 1.02, (2011)
12.3 International Committee on Information Technology Standards T10 Technical Committee
Standards
• [SCSI Core] SCSI Primary Commands-4 Rev 15 (SPC-4)
• [SCSI Block] SCSI Block Commands Rev15 (SBC-3)
• [SAS] Serial Attached SCSI-2 Rev 13 (SAS-2)