Fireeye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402: Fips 140-2 Security Policy V0.5
Fireeye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402: Fips 140-2 Security Policy V0.5
Prepared By:
Acumen Security
18504 Office Park Dr
Montgomery Village, MD 20886
www.acumensecurity.net
Phone: +1 (703) 375-9820
1
FIPS 140-2 Security Policy v1.0
Table of Contents
1. Introduction ........................................................................................................................4
1.1 Purpose.........................................................................................................................4
1.2 Document Organization ................................................................................................4
1.3 Notices ..........................................................................................................................4
2. FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402 ...................................................5
2.1 Cryptographic Module Specification..............................................................................6
2.1.1 Cryptographic Boundary ........................................................................................6
2.2 Cryptographic Module Ports and Interfaces ..................................................................7
2.3 Roles, Services, and Authentication...............................................................................8
2.3.1 Authorized Roles ....................................................................................................8
2.3.2 Authentication Mechanisms ..................................................................................8
2.3.3 Services ..................................................................................................................9
2.4 Physical Security .........................................................................................................13
2.5 Cryptographic Key Management .................................................................................14
2.6 Cryptographic Algorithm .............................................................................................17
2.6.1 FIPS-approved Algorithms ....................................................................................17
2.6.2 Non-Approved Algorithms Allowed for Use With FIPS-approved services ............19
2.6.3 Non-Approved Algorithms ...................................................................................19
2.7 Electromagnetic Interference / Electromagnetic Compatibility (EMI/EMC) .................21
2.8 Self-Tests ....................................................................................................................22
2.8.1 Power-On Self-Tests .............................................................................................22
2.8.2 Conditional Self-Tests ..........................................................................................22
2.8.3 Self-Tests Error Handling ......................................................................................22
2.9 Mitigation of Other Attacks .........................................................................................23
3. Secure Operation ..............................................................................................................24
3.1 Secure Distribution .....................................................................................................24
3.1.1 Firmware Distribution ..........................................................................................24
3.1.2 Hardware Distribution .........................................................................................24
3.2 Installation ..................................................................................................................24
3.3 Initialization ................................................................................................................24
3.3.1 Entering New Authentication Credentials ............................................................24
2
FIPS 140-2 Security Policy v1.0
3
FIPS 140-2 Security Policy v1.0
1. Introduction
This is a non-proprietary FIPS 140-2 Security Policy for the FireEye HX Series: HX 4400, HX
4400D, HX 4402, and HX 9402. Below are the details of the product validated:
1.1 Purpose
This document was prepared as Federal Information Processing Standard (FIPS) 140-2
validation evidence. The document describes how the FireEye HX Series: HX 4400, HX 4400D,
HX 4402, and HX 9402 meets the security requirements of FIPS 140-2. It also provides
instructions to individuals and organizations on how to deploy the product in a secure FIPS-
approved mode of operation. Target audience of this document is anyone who wishes to use or
integrate this product into a solution that is meant to comply with FIPS 140-2 requirements.
This Security Policy and the other validation submission documentation were produced by
Acumen Security, LLC. under contract to FireEye, Inc. With the exception of this Non-
Proprietary Security Policy, the FIPS 140-2 Submission Package is proprietary to FireEye, Inc.
and is releasable only under appropriate non-disclosure agreements.
1.3 Notices
This document may be freely reproduced and distributed in its entirety without modification.
4
FIPS 140-2 Security Policy v1.0
5
FIPS 140-2 Security Policy v1.0
6
FIPS 140-2 Security Policy v1.0
7
FIPS 140-2 Security Policy v1.0
Configuration of the module can occur over several interfaces and at different levels depending
upon the role assigned to the user. There are multiple types of Cryptographic Officers that may
configure the module, as follows:
Admin: The system administrator is a “super user” who has all capabilities. The primary
function of this role is to configure the system.
Monitor: The system monitor has read-only access to some things the admin role can
change or configure.
Operator: The system operator has a subset of the capabilities associated with the
admin role. Its primary function is configuring and monitoring the system.
Analyst: The system analyst focuses on data plane analysis and possesses several
capabilities, including setting up alerts and reports.
Auditor: The system auditor reviews audit logs and performs forensic analysis to trace
how events occurred.
SNMP: The SNMP role provides system monitoring through SNMPv3.
The Users of the module are the remote IT devices and remote management clients accessing
the module via cryptographic protocols. These protocols include, SSH, TLS, and SNMPv3.
Unauthenticated users are only able to access the module LEDs and power cycle the module.
8
FIPS 140-2 Security Policy v1.0
2.3.3 Services
The services that are available to unauthenticated entities and the services that require
operators to assume an authorized role (Crypto-Officer or User) are listed in the table below.
9
FIPS 140-2 Security Policy v1.0
Please note that the keys and Critical Security Parameters (CSPs) listed below use the following
indicators to show the type of access required:
R (Read): The CSP is read
W (Write): The CSP is established, generated, or modified
Z (Zeroize): The CSP is zeroized
Table 4 - Services
11
FIPS 140-2 Security Policy v1.0
12
FIPS 140-2 Security Policy v1.0
13
FIPS 140-2 Security Policy v0.5
ECDSA ( P-256 P-
384 P-521)
TLS Public Key RSA (Private Key) This public key is used for TLS session authentication. NVRAM Overwritten w/ “00”
2048 – 3072 bits prior to replacement.
ECDSA (P-256 P-
384 P-521)
TLS Pre-Master Shared Secret, Shared Secret created using asymmetric cryptography DRAM Device power cycle.
Secret 384 bits from which new TLS session keys can be created.
TLS Session Triple-DES 192- Key used to encrypt/decrypt TLS session data. DRAM Device power cycle.
Encryption Key bits
AES 128, 256 bits
TLS Session HMAC SHA-1 160 HMAC-SHA-1 used for TLS data integrity protection. DRAM Device power cycle.
Integrity Key bits
Firmware Load RSA 2048-bit RSA key used to validate the integrity of a downloaded NVRAM Overwritten w/ “00”
Public Key firmware image. prior to replacement.
Admin Password Shared Secret, Authentication password for the Admin user role. NVRAM Overwritten w/ “00”
15
FIPS 140-2 Security Policy v1.0
16
FIPS 140-2 Security Policy v0.5
HMAC-SHA384;
HMAC-SHA512;
SHS 2837, Used for SSH, SNMP, and TLS
2836 traffic integrity. Used in support
SHA-1; of SSH, SNMP, and TLS key
SHA-224; derivation.
SHA-256; Firmware load test.
SHA-384;
SHA-512
RSA 1759, Used for SSH and TLS Session
1758 authentication.
FIPS186-4: Firmware load test.
186-4 KEY(gen);
ANSIX9.31 Sig(Gen): (2048 SHA(256, 384,
512)) (3072 SHA(256, 384, 512));
ANSIX9.31 Sig(Ver): (2048 SHA(1, 256,
384, 512)) (3072 SHA(1, 256, 384, 512));
ANSIX9.31 Sig(Ver): (1024 SHA(1, 256,
384, 512)); (CAVP tested but not used by
the module)
RSASSA-PKCS1_V1_5: SIG(gen) (2048
SHA(256, 384, 512)) (3072 SHA(256, 384,
512));
RSASSA-PKCS1_V1_5: SIG(Ver) (2048
SHA(1, 224, 256, 384, 512)) (3072 SHA(1,
224, 256, 384, 512))
RSASSA-PKCS1_V1_5: SIG(Ver) (1024
SHA(1, 224, 256, 384, 512)) (CAVP tested
but not used by the module)
ECDSA 696 Used for TLS Session
authentication. Supported curves
FIPS186-4: include, P-256 P-384 P-521.
PKG: CURVES(P-256 P-384 P-521
ExtraRandomBits TestingCandidates)
PKV: CURVES(P-256 P-384 P-521)
SigGen: CURVES(P-256: (SHA-224, 256,
384, 512) P-384: (SHA-224, 256, 384, 512)
P-521: (SHA-224, 256, 384, 512)
SigVer: CURVES(P-256: (SHA-1, 224, 256,
384, 512) P-384: (SHA-1, 224, 256, 384,
512) P-521: (SHA-1, 224, 256, 384, 512))
DRBG 843 Used in support of SSH and TLS
sessions. Used to seed RSA key
18
FIPS 140-2 Security Policy v1.0
CTR_DRBG generation.
CVL 533 SSH, TLS, and SNMP Key
Derivation.
TLS;
SSH; Note: The TLS, SSH, and SNMP
SNMP; protocols have not been reviewed or
FFC Ephem: (KARole: Initiator/responder) tested by the CAVP and CMVP.
Diffie-Hellman – CVL Cert. #533, provides 112 or 128-bits of encryption strength. Diffie-
Hellman with less than 112-bits of security strength is non-compliant and may not be
used.
RSA Key Wrapping – provides 112 or 128 bits of encryption strength. RSA with less than
112-bits of security strength is non-compliant and may not be used.
19
FIPS 140-2 Security Policy v1.0
Note: Services marked with a single asterisk (*) may use non-compliant cryptographic
algorithms. Use of these algorithms are prohibited in a FIPS-approved mode of operation.
20
FIPS 140-2 Security Policy v1.0
21
FIPS 140-2 Security Policy v1.0
2.8 Self-Tests
Self-tests are health checks that ensure that the cryptographic algorithms within the module
are operating correctly. The self-tests identified in FIPS 140-2 broadly fall within two categories
Power-On Self-Tests
Conditional Self-Tests
Both during execution of the self-tests and while in an error state, data output is inhibited.
22
FIPS 140-2 Security Policy v1.0
23
FIPS 140-2 Security Policy v1.0
3. Secure Operation
The following steps are required to put the module into a FIPS-approved mode of operation.
3.2 Installation
There are no FIPS 140 specific hardware installation steps required.
3.3 Initialization
Alternatively, perform the following to enable FIPS 140-2 compliance through the CLI.
3.4 Management
3.4.1 SSH Usage
When in FIPS 140-2 compliance mode, only the following algorithms may be used for SSH
communications,
25
FIPS 140-2 Security Policy v1.0
1. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
2. TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
3. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
4. TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
5. TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
6. TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
7. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
8. TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
9. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
10. TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
11. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
12. TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
13. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
14. TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
15. TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
16. TLS_DHE_RSA_WITH_AES_128_CBC_SHA
17. TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
18. TLS_DHE_RSA_WITH_AES_256_CBC_SHA
19. TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
20. TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
21. TLS_RSA_WITH_AES_128_GCM_SHA256
22. TLS_RSA_WITH_AES_256_GCM_SHA384
23. TLS_RSA_WITH_AES_128_CBC_SHA256
24. TLS_RSA_WITH_AES_256_CBC_SHA256
25. TLS_RSA_WITH_AES_128_CBC_SHA
26. TLS_RSA_WITH_AES_256_CBC_SHA
27. TLS_RSA_WITH_3DES_EDE_CBC_SHA
When the module’s power is lost and then restored, a new TLS key for use with the AES GCM
encryption/decryption is established.
26
FIPS 140-2 Security Policy v1.0
Appendix A: Acronyms
This section describes the acronyms used throughout the document.
Table 8 - Acronyms
Acronym Definition
CMVP Cryptographic Module Validation Program
CRNGT Continuous Random Number Generator Test
CSE Communications Security Establishment
CVL Component Validation List
FIPS Federal Information Processing Standard
KDF Key Derivation Function
NIST National Institute of Standards and Technology
NVRAM Non-Volatile Random Access Memory
POST Power-On Self-Test
PWCT Pairwise Consistency Test
27