Seagate Secure TCG SSC SED Assurance Activity Report
Seagate Secure TCG SSC SED Assurance Activity Report
Seagate Secure TCG SSC SED Assurance Activity Report
Version 1.2
April 4, 2018
Prepared by:
Leidos Inc.
https://www.leidos.com/CC-FIPS140
Common Criteria Testing Laboratory
6841 Benjamin Franklin Drive
Columbia, MD 21046
Prepared for:
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Evaluation Personnel:
Gary Grainger
Kevin Steiner
1.1 Evidence
[Guide] Seagate Secure® TCG Enterprise and TCG Opal SSC Self-Encrypting Drive Common
Criteria Configuration Guide, version 1.0, February 14, 2018)
[KMD] Seagate Secure® TCG Enterprise SSC Self-Encrypting Drive and TCG Opal SSC Self-
Encrypting Drive Common Criteria Full Drive Encryption – Encryption Engine Key
Management Description, Version 1.0, March 7, 2018 (Seagate Proprietary)
[ST] Seagate Secure® TCG SSC Self-Encrypting Drives Security Target, Version 0.9, March 7,
2018
1
The evaluation team relied upon public draft: Information technology - ATA/ATAPI Command Set - 2
(ACS-2), Working Draft Project American National Standard, Revision 7, June 22, 2011
The evaluator shall review the TSS to determine that a symmetric key is supported by the product, that
the TSS includes a description of the protection provided by the product for this key.
[ST] section 6.1 “Overview of TOE Operations” summarizes how Seagate self-encrypting drives (SEDs)
encrypt all user data. In particular, “Seagate SEDs support subdividing user storage. The storage ranges
are called bands. Each band is secured with its own authentication key and media encryption key Section
6.1 and section 6.2.5 “Key Chaining (Recipient) (FCS_KYC_EXT.2)” summarize key chain protections
(search for “Each Band has its own key chain” and “maintaining a chain of intermediary keys originating
from the BEV to the DEK” respectively). Table 1 lists the keys that make up a band’s key chain.
Table 1 Per-band Key Chain
[ST] section 6.2.1 “Cryptographic Key Generation (FCS_CKM.1(b), FCS_CKM.1(c))” states the size of
an MEK is 512 bits (for AES-XTS-256) and the size of all other symmetric keys (that is, intermediate
keys) is 256 bits.
The evaluator shall verify that the AGD guidance instructs the administrator how to configure the TOE
to use the selected key size(s) for all uses specified by the AGD documentation and defined in this cPP.
[Guide] section “Cryptographic Symmetric Key Sizes and Key Generation” states, “The size of the AES
keys is not configurable.”
If the TOE uses a symmetric key as part of the key chain, the KMD should detail how the symmetric key
is used as part of the key chain.
[KMD] describes the generation and use of intermediate keys and MEK keys.
The evaluator shall examine the TSS to determine that it describes how the TOE obtains a DEK (either
generating the DEK or receiving from the environment).
[ST] section 6.2.1 “Cryptographic Key Generation (FCS_CKM.1(b), FCS_CKM.1(c))” states “The TOE
generates symmetric cryptographic keys using a Random Bit Generator (Hash_DRBG (any))”. Section
6.2.1 covers the Media Encryption Key for each band, which are the AES-XTS DEKs used by the TOE.
If the TOE generates a DEK, the evaluator shall review the TSS to determine that it describes how the
functionality described by FCS_RBG_EXT.1 is invoked. If the DEK is generated outside of the TOE,
the evaluator checks to ensure that for each platform identified in the TOE Description, the TSS
describes the interface used by the TOE to invoke this functionality. The evaluator uses the description
of the interface between the RBG and the TOE to determine that it requests a key greater than or equal
to the required key sizes.
[ST] section 6.2.1 “Cryptographic Key Generation (FCS_CKM.1(b), FCS_CKM.1(c))” states the TOE
invokes the drive’s Hash_DRBG(any) random bit generator to obtain 512 bits for AES-XTS-256 keys.
The TOE generates all DEKs. Thus, this assurance activity is not applicable.
If the TOE received the DEK from outside the host platform, then the evaluator shall verify that the
KMD describes how the TOE unwraps the DEK.
The TOE generates all DEKs. Thus, this assurance activity is not applicable.
The evaluator queried the DRBG for random 256 bit data three times. The evaluator confirmed that each
output was 256 bits and unique.O
The evaluator shall verify the TSS provides a high level description of how keys stored in volatile
memory are destroyed. The evaluator to verify that TSS outlines:
- if and when the TSF or the Operational Environment is used to destroy keys from volatile
memory;
[ST] FCS_CKM.4(a) selects option “erase” and so this assurance activity is not applicable.
[ST] FCS_CKM.4(a) selects option “erase” and so this assurance activity is not applicable.
The evaluator shall check the guidance documentation if the TOE depends on the Operational
Environment for memory clearing and how that is achieved.
[ST] FCS_CKM.4(a) selects option “erase” and so this assurance activity is not applicable.
The evaluator shall check to ensure the KMD lists each type of key, its origin, possible memory locations
in volatile memory.
[KMD] section 2 is “Keys and Key Hierarchy.” Section 2 describes the Authentication Key, intermediate
keys, and MEK that make up the key hierarchy for each band. The proprietary version of this AAR
summarizes the type of each key, its origins, and possible locations in volatile memory as well as
identifying [KMD] sections containing this information.
Key Management Description may be used if necessary details describe proprietary information
The evaluator examines the TSS to ensure it describes how the keys are managed in volatile memory.
This description includes details of how each identified key is introduced into volatile memory (e.g. by
derivation from user input, or by unwrapping a wrapped key stored in non-volatile memory) and how
they are overwritten.
[ST] section 6.1 “Overview of TOE Operations” and section 6.2.5 “Key Chaining (Recipient)
(FCS_KYC_EXT.2)” summarize key chain protections (search for “Each Band has its own key chain”
and “maintaining a chain of intermediary keys originating from the BEV to the DEK” respectively). The
sections describe how each key is introduced into volatile memory, as summarized in Table 2 below.
Table 2 Per-band Key Storage in Volatile Memory
[KMD] describes Seagate SED functions that use a drive’s key chains. [ST] section 6.2.2 “Cryptographic
Key Destruction (FCS_CKM.4(a), FCS_CKM.4(b), FCS_CKM.4(c)(1) HDD, FCS_CKM.4(c)(2) SSH
and Hybrid FCS_CKM.4(e), FCS_CKM_EXT.4(a), FCS_CKM_EXT.4(b), FCS_CKM_EXT.6)” states
“When the SED generates a new key to erase a band, the existing key is overwritten with a new value of
a key” and “The keys are removed immediately after they are used or when they are no longer needed,
using a single overwrite of zeroes.”
[ST] FCS_CKM.4(b) applies to volatile memory only. Table 2 Per-band Key Storage in Volatile Memory
summarizes the keys stored in volatile memory. [ST] section 6.2.2 “Cryptographic Key Destruction
(FCS_CKM.4(a), FCS_CKM.4(b), FCS_CKM.4(c)(1) HDD, FCS_CKM.4(c)(2) SSH and Hybrid
FCS_CKM.4(e), FCS_CKM_EXT.4(a), FCS_CKM_EXT.4(b), FCS_CKM_EXT.6)” describes the types
of volatile memory along with type of memory controller used to access volatile memory (search for “The
TOE contains two types of volatile memory”).
The evaluator shall examine the TSS to ensure it describes the method that is used by the memory
controller to write and read memory from each type of memory listed. The purpose here is to provide a
description of how the memory controller works so one can determine exactly how keys are written to
memory. The description would include how the data is written to and read from memory (e.g., block
level, cell level), mechanisms for copies of the key that could potentially exist (e.g., a copy with parity
bits, a copy without parity bits, any mechanisms that are used for redundancy).
[ST] FCS_CKM.4(b) applies to volatile memory only. [ST] section 6.2.2 “Cryptographic Key Destruction
(FCS_CKM.4(a), FCS_CKM.4(b), FCS_CKM.4(c)(1) HDD, FCS_CKM.4(c)(2) SSH and Hybrid
FCS_CKM.4(e), FCS_CKM_EXT.4(a), FCS_CKM_EXT.4(b), FCS_CKM_EXT.6)” describes memory
controller access to volatile memory (search for “volatile memory is accessed using standard micro-
controller memory interface controllers and addressing schemes”).
The evaluator shall examine the TSS to ensure it describes the destruction procedure for each key that
has been identified. If different types of memory are used to store the key(s), the evaluator shall check
to ensure that the TSS identifies the destruction procedure for each memory type where keys are stored
(e.g., key X stored in flash memory is destroyed by overwriting once with zeros, key X’ stored in
EEPROM is destroyed by a overwrite consisting of a pseudo random pattern – the EEPROM used in
the TOE uses a wear-leveling scheme as described).
[ST] FCS_CKM.4(b) applies to volatile memory only. Table 2 Per-band Key Storage in Volatile Memory
summarizes key destruction during drive operation. Please see section 2.1.3 above for key destruction by
removal of power to memory.
If the ST makes use of the open assignment and fills in the type of pattern that is used, the evaluator
examines the TSS to ensure it describes how that pattern is obtained and used. The evaluator shall verify
that the pattern does not contain any CSPs.
[ST] FCS_CKM.4(b) does not make use of the open assignment for fill value. This assurance activity does
not apply.
The evaluator shall check that the TSS identifies any configurations or circumstances that may not
strictly conform to the key destruction requirement.
There are a variety of concerns that may prevent or delay key destruction in some cases. The evaluator
shall check that the guidance documentation identifies configurations or circumstances that may not
strictly conform to the key destruction requirement, and that this description is consistent with the
relevant parts of the TSS and any other relevant Required Supplementary Information. The evaluator
shall check that the guidance documentation provides guidance on situations where key destruction
may be delayed at the physical layer.
For example, when the TOE does not have full access to the physical memory, it is possible that the
storage may be implementing wear-leveling and garbage collection. This may create additional copies
of the key that are logically inaccessible but persist physically. In this case, it is assumed the drive
supports the TRIM command and implements garbage collection to destroy these persistent copies when
not actively engaged in other tasks.
FCS_CKM.4.1(b) only applies to volatile memory based on the selections in [ST]. Overwriting volatile
memory immediately destroys a key.
Drive vendors implement garbage collection in a variety of different ways, as such there is a variable
amount of time until data is truly removed from these solutions. There is a risk that data may persist for
a longer amount of time if it is contained in a block with other data not ready for erasure. It is assumed
the operating system and file system of the OE support TRIM, instructing the non-volatile memory to
erase copies via garbage collection upon their deletion.
Each Seagate device is a single drive. Hence, this assurance activity is not applicable.
Finally, it is assumed the keys are not stored using a method that would be inaccessible to TRIM, such
as being contained in a file less than 982 bytes which would be completely contained in the master file
table.
The evaluator checked [KMD], which confirms the [ST] information cited above
Key Management Description may be used if necessary details describe proprietary information
The evaluator examines the TSS to ensure it describes how the keys are managed in volatile memory.
This description includes details of how each identified key is introduced into volatile memory (e.g. by
derivation from user input, or by unwrapping a wrapped key stored in non-volatile memory) and how
they are overwritten.
[ST] FCS_CKM.4(c)(1) and FCS_CKM.4(c)(2) apply to non-volatile memory only. Please see section
2.1.4 above for volatile memory key destruction.
The evaluator shall check to ensure the TSS lists each type of key that is stored, and identifies the
memory type (volatile or non-volatile) where key material is stored.
Table 1 Per-band Key Chain in section 2.1.1 above lists keys used by Seagate SEDs. Please see section
2.1.4 above for volatile memory key storage. [ST] section 6.1 “Overview of TOE Operations” indicates a
Seagate SED never stores an Authentication Key in non-volatile memory (search for “PIN values are
never stored directly on the SED.”) [ST] section 6.1 “Overview of TOE Operations” and section 6.2.2
“Cryptographic Key Destruction (FCS_CKM.4(a), FCS_CKM.4(b), FCS_CKM.4(c)(1) HDD,
FCS_CKM.4(c)(2) SSH and Hybrid FCS_CKM.4(e), FCS_CKM_EXT.4(a), FCS_CKM_EXT.4(b),
FCS_CKM_EXT.6)” indicate each initial intermediate key is derived not stored in non-volatile memory
(search for “The drive lock PIN is used as an input to the PBKDF function to generate an intermediate
key” and “All keys and key material are stored in the system area on the media”, respectively).
The TSS identifies and describes the interface(s) that is used to service commands to read/write memory.
The evaluator examines the interface description for each different media type to ensure that the
interface supports the selection(s) made by the ST Author.
The evaluator checked [ST] section 6 “TOE Summary Specification.” The evaluator found no
configurations or circumstances that did not conform strictly to key destruction requirements
FCS_CKM.4(c)(1) and FCS_CKM.4(c)(2).
There are a variety of concerns that may prevent or delay key destruction in some cases. The evaluator
shall check that the guidance documentation identifies configurations or circumstances that may not
strictly conform to the key destruction requirement, and that this description is consistent with the
relevant parts of the TSS and any other relevant Required Supplementary Information. The evaluator
shall check that the guidance documentation provides guidance on situations where key destruction
may be delayed at the physical layer.
For example, when the TOE does not have full access to the physical memory, it is possible that the
storage may be implementing wear-leveling and garbage collection. This may create additional copies
of the key that are logically inaccessible but persist physically. In this case, it is assumed the drive
supports the TRIM command and implements garbage collection to destroy these persistent copies when
not actively engaged in other tasks.
FCS_CKM.4.1(c)(1) and FCS_CKM.4.1(c)(2) only apply to non-volatile memory based on the selections
in [ST].
[Guide] section “Cryptographic Key Destruction” describes wear leveling implemented in Seagate TCG
Enterprise SSD and TCG Opal Hybrid HDD SED drives. Seagate SED key destruction entails unmapping
the block containing a key and subsequently erasing the block before the drives remaps the block for other
use. In the interim between unmapping and remapping, a Seagate SED will produce random results for a
read to an unmapped physical block. Thus, key destruction is effectively immediate on Seagate solid-state
and hybrid devices. Key destruction (overwrite) is immediate on hard-disk devices.
Drive vendors implement garbage collection in a variety of different ways, as such there is a variable
amount of time until data is truly removed from these solutions. There is a risk that data may persist for
a longer amount of time if it is contained in a block with other data not ready for erasure. It is assumed
the operating system and file system of the OE support TRIM, instructing the non-volatile memory to
erase copies via garbage collection upon their deletion.
As described above, key destruction is effectively immediate on Seagate solid-state and hybrid devices.
Key destruction (overwriting) is immediate on hard-disk devices.
It is assumed that if a RAID array is being used, only set-ups that support TRIM are utilized. It is
assumed if the drive is connected via PCI-Express, the operating system supports TRIM over that
channel. It is assumed the drive is healthy and contains minimal corrupted data and will be end of life
Each Seagate device is a single drive. Hence, this assurance activity is not applicable.
Finally, it is assumed the keys are not stored using a method that would be inaccessible to TRIM, such
as being contained in a file less than 982 bytes which would be completely contained in the master file
table.
As described above, key destruction is effectively immediate on Seagate solid-state and hybrid devices.
Key destruction (overwriting) is immediate on hard-disk devices.
The evaluator checked [KMD], which confirms the [ST] information cited above
For these tests the evaluator shall utilize appropriate development environment (e.g. a Virtual Machine)
and development tools (debuggers, simulators, etc.) to test that keys are cleared, including all copies of
the key that may have been created internally by the TOE during normal cryptographic processing with
that key.
Test 1: Applied to each key held as plaintext in volatile memory and subject to destruction by overwrite
by the TOE (whether or not the plaintext value is subsequently encrypted for storage in volatile or non-
volatile memory). In the case where the only selection made for the destruction method key was removal
of power, then this test is unnecessary. The evaluator shall:
1. Record the value of the key in the TOE subject to clearing.
2. Cause the TOE to perform a normal cryptographic processing with the key from Step #1.
3. Cause the TOE to clear the key.
4. Cause the TOE to stop the execution but not exit.
5. Cause the TOE to dump the entire memory of the TOE into a binary file.
6. Search the content of the binary file created in Step #5 for instances of the known key value from
Step #1.
7. Break the key value from Step #1 into 3 similar sized pieces and perform a search using each
piece.
8. Steps 1-6 ensure that the complete key does not exist anywhere in volatile memory. If a copy is
found, then the test fails.
Step 7 ensures that partial key fragments do not remain in memory. If a fragment is found, there is a
miniscule chance that it is not within the context of a key (e.g., some random bits that happen to match).
If this is the case the test should be repeated with a different key in Step #1. If a fragment is found the
test fails.
Test 3: Applied to each key held as non-volatile memory and subject to destruction by overwrite by the
TOE. The evaluator shall use special tools (as needed), provided by the TOE developer if necessary, to
view the key storage location:
1. Record the storage location of the key in the TOE subject to clearing.
2. Cause the TOE to perform a normal cryptographic processing with the key from Step #1.
3. Cause the TOE to clear the key.
4. Search the storage location in Step #1 of non-volatile memory to ensure the appropriate pattern
is utilized.
The test succeeds if correct pattern is used to overwrite the key in the memory location. If the pattern is
not found the test fails.
Tests 1-3 above have been combined in a test suite in which the evaluator performed all tests in
conjunction. The test suite comprised of 17 tests; designed to test three main components: key (PIN,
intermediate keys, MEK LOCK/UNLOCK, MEK ERASE BAND, AUTHENTICATE PASSWORD, and ERASE
UNIT), type of memory (Volatile and Non-Volatile), and Standard (TCG and ATA). Each test recorded the value
of the key material, destroyed the key, and verified the key was destroyed by searching memory that no traces of
the key remained. For the situation where the key was not stored in plaintext the evaluator recorded the value of the
key, confirmed that a search for the key returned the key not found, destroyed the key, confirmed that a search for
the key still yielded it not being found then finally performing a binary compare of memory both before and after
the key destruction to confirm no data segments of memory remained the same.
The evaluator shall examine the TOE’s keychain in the TSS/KMD and identify each instance a key is
destroyed by this method. In each instance the evaluator shall verify all keys capable of decrypting the
target key are destroyed in accordance with a specified key destruction method.
[KMD] identifies the Seagate SED functions that use cryptographic erase. In each function, the Seagate
SED destroys all the keys capable of decrypting the target key.
The evaluator shall verify the TSS provides a high level description of what it means for keys and key
material to be no longer needed and when then should be expected to be destroyed.
The evaluator shall verify the KMD includes a description of the areas where keys and key material
reside and ...
Please see sections 2.1.4 and 2.1.5 above for a summary of keys in volatile and non-volatile memory.
[KMD] includes additional detail regarding key material.
The evaluator shall verify the KMD includes a description of … and when the keys and key material are
no longer needed.
Please see sections 2.1.4 and 2.1.5 above for a summary of keys in volatile and non-volatile memory.
[KMD] includes additional detail regarding key material.
The evaluator shall verify the KMD includes a key lifecycle, that includes
1. a description where key material reside,
2. how the key material is used,
3. how it is determined that keys and key material are no longer needed, and
4. how the material is destroyed once it is not needed
and that the documentation in the KMD follows FCS_CKM.4(a) for the destruction.
[KMD] describes Seagate SED functions that use a drive’s key chains.
Each function description in [KMD] provides a detailed description of how the function uses each key
and associated key material.
The evaluator shall verify the TSS provides a description of what keys and key material are destroyed
when entering any Compliant power saving state.
The evaluator shall validate that guidance documentation contains clear warnings and information on
conditions in which the TOE may end up in a non-Compliant power saving state indistinguishable from
a Compliant power saving state.
[Guide] section “Cryptographic Key and Key Material Destruction (Power Management)” states “It is not
possible for a Seagate Self Encrypting Drive to end up in a non-compliant power saving state.”
In that case it must contain mitigation instructions on what to do in such scenarios.
Seagate SEDs support only one power-saving state. Hence, this assurance activity is not applicable.
The evaluator shall verify the KMD includes a description of the areas where keys and key material
reside.
This assurance activity duplicates a KDM assurance activity in section 2.1.7 above. Please see the results
in that section.
The evaluator shall verify the KMD includes a key lifecycle that includes0
1. a description where key material reside,
2. how the key material is used,
3. and how the material is destroyed once it is not needed
and that the documentation in the KMD follows FCS_CKM.4(b) for the destruction.
Key Management Description may be used if necessary details describe proprietary information)
The evaluator shall examine the TOE’s keychain in the TSS/KMD and verify all keys subject to
destruction are destroyed according to one of the specified methods.
The evaluator checked [KMD], which confirms the [ST] information cited above
The evaluator shall check the TSS to ensure that it describes the overall flow of the signature
verification. This should at least include
1. identification of the format and general location (e.g., "firmware on the hard drive device"
rather than “memory location 0x00007A4B") of the data to be used in verifying the digital
signature;
2. how the data received from the operational environment are brought on to the device; and
3. any processing that is performed that is not part of the digital signature algorithm (for instance,
checking of certificate revocation lists).
Each section below contains the tests the evaluators must perform for each type of digital signature
scheme. Based on the assignments and selections in the requirement, the evaluators choose the specific
activities that correspond to those selections.
It should be noted that for the schemes given below, there are no key generation/domain parameter
generation testing requirements. This is because it is not anticipated that this functionality would be
needed in the end device, since the functionality is limited to checking digital signatures in delivered
updates. This means that the domain parameters should have already been generated and encapsulated
in the hard drive firmware or on-board non-volatile storage. If key generation/domain parameter
generation is required, the evaluation and validation scheme must be consulted to ensure the correct
specification of the required evaluation activities and any additional components.
The following tests are conditional based upon the selections made within the SFR.
The following tests may require the developer to provide access to a test platform that provides the
evaluator with tools that are typically not found on factory products.
Seagate Secure TCG SSC Self-Encrypting Drives use algorithm implementations validated under the
CAVP (http://csrc.nist.gov/groups/STM/cavp/index.html). NIAP Policy Letter #5 defines the applicability
and relationship of NIST CAVP and CMVP testing to assurance activities associated with cryptography
requirements in NIAP-approved protection profiles (https://www.niap-
ccevs.org/Documents_and_Guidance/ccevs/policy-ltr-5-update2.pdf). This section along with section
3.5.2 Cryptographic Algorithm Validation Programming Testing confirm CAVP certificates cited in [ST]
contain the information required by NIAP Policy Letter #5.
ECDSA Algorithm Tests
ECDSA FIPS 186-4 Signature Verification Test
For each supported NIST curve (i.e., P-256, P-384 and P-521) and SHA function pair, the evaluator
shall generate a set of 10 1024-bit message, public key and signature tuples and modify one of the
values (message, public key or signature) in five of the 10 tuples. The evaluator shall obtain in response
a set of 10 PASS/FAIL values.
[ST] does not select the ECDSA option in FCS_COP.1(a). Thus, this assurance activity is not applicable.
RSA Signature Algorithm Tests
Signature Verification Test
The evaluator shall perform the Signature Verification test to verify the ability of the TOE to recognize
another party’s authentic and unauthentic signatures. The evaluator shall inject errors into the test
vectors produced during the Signature Verification Test by introducing errors in some of the public
keys e, messages, IR format, and/or signatures. The TOE attempts to verify the signatures and returns
success or failure.
The evaluator shall use these test vectors to emulate the signature verification test using the
corresponding parameters and verify that the TOE detects these errors.
[ST] Table 2 TOE Hardware and Firmware and Table 5 Cryptographic Functions provide information on
cryptographic implementations and CAVP certificates for each TOE device. In section 3.5.2 below, Table
Cert Implementation
#2662 Balto RSA in Hardware
#1933 Cheops RSA in Hardware
#2013 Myna RSA in Hardware
#1934 ARMv7 RSA in Firmware 5.0 (Firmware)
#2056 ARMv7 RSA in Firmware 5.1 (Firmware)
The evaluator shall check that the association of the hash function with other TSF cryptographic
functions (for example, the digital signature verification function) is documented in the TSS.
The evaluator checks the operational guidance documents to determine that any system configuration
necessary to enable required hash size functionality is provided.
[Guide] section “Cryptographic Operation (Hash Algorithm)” states the hash algorithm is not configurable
in Seagate SEDs.
The TSF hashing functions can be implemented in one of two modes. The first mode is the byte-oriented
mode. In this mode the TSF only hashes messages that are an integral number of bytes in length; i.e.,
the length (in bits) of the message to be hashed is divisible by 8. The second mode is the bit-oriented
mode. In this mode the TSF hashes messages of arbitrary length. As there are different tests for each
mode, an indication is given in the following sections for the bit-oriented vs. the byte-oriented test mode.
The evaluator shall perform all of the following tests for each hash algorithm implemented by the TSF
and used to satisfy the requirements of this cPP.
Seagate Secure TCG SSC Self-Encrypting Drives use algorithm implementations validated under the
CAVP (http://csrc.nist.gov/groups/STM/cavp/index.html). NIAP Policy Letter #5 defines the applicability
and relationship of NIST CAVP and CMVP testing to assurance activities associated with cryptography
requirements in NIAP-approved protection profiles (https://www.niap-
ccevs.org/Documents_and_Guidance/ccevs/policy-ltr-5-update2.pdf). This section along with section
3.5.2 Cryptographic Algorithm Validation Programming Testing confirm CAVP certificates cited in [ST]
contain the information required by NIAP Policy Letter #5.
Short Messages Test – Bit-oriented Mode
The evaluators devise an input set consisting of m+1 messages, where m is the block length of the hash
algorithm. The length of the messages range sequentially from 0 to m bits. The message text shall be
pseudorandomly generated. The evaluators compute the message digest for each of the messages and
ensure that the correct result is produced when the messages are provided to the TSF.
[ST] Table 2 TOE Hardware and Firmware and Table 5 Cryptographic Functions provide information on
cryptographic implementations and CAVP certificates for each TOE device. In section 3.5.2 below, Table
19, Table 20, and Table 21 verify the correspondence between each TOE device, its cryptographic
implementations (hardware and firmware), and CAVP certificates. The tables confirm information
required by NIAP Policy #5 (https://www.niap-ccevs.org/Documents_and_Guidance/policy-ltr-5-
add2.pdf) for each TOE device. Table 4 lists certificates and implementations applicable to
FCS_COP.1(b).
Table 4 Seagate Secure TCG SSC Self-Encrypting Drives CAVP SHS Certificates
Cert Implementation
#3984 Balto SHA in Hardware
#3515 Cheops SHA in Hardware
#3128 Cheops SHA in Hardware
#3250 Myna SHA in Hardware
#1225 ARMv7 SHS in Firmware 3.0 (Firmware)
#3304 ARMv7 SHS in Firmware 5.0 (Firmware)
[ST] does not select the CMAC option in FCS_COP.1(c). Thus, this assurance activity is not applicable.
Seagate Secure TCG SSC Self-Encrypting Drives use algorithm implementations validated under the
CAVP (http://csrc.nist.gov/groups/STM/cavp/index.html). NIAP Policy Letter #5 defines the applicability
and relationship of NIST CAVP and CMVP testing to assurance activities associated with cryptography
requirements in NIAP-approved protection profiles (https://www.niap-
ccevs.org/Documents_and_Guidance/ccevs/policy-ltr-5-update2.pdf). This section along with section
3.5.2 Cryptographic Algorithm Validation Programming Testing confirm CAVP certificates cited in [ST]
contain the information required by NIAP Policy Letter #5.
If HMAC was selected:
For each of the supported parameter sets, the evaluator shall compose 15 sets of test data. Each set
shall consist of a key and message data. The evaluator shall have the TSF generate HMAC tags for
these sets of test data. The resulting MAC tags shall be compared to the result of generating HMAC
tags with the same key using a known good implementation.
[ST] Table 2 TOE Hardware and Firmware and Table 5 Cryptographic Functions provide information on
cryptographic implementations and CAVP certificates for each TOE device. In section 3.5.2 below, Table
19, Table 20, and Table 21 verify the correspondence between each TOE device, its cryptographic
implementations (hardware and firmware), and CAVP certificates. The tables confirm information
required by NIAP Policy #5 (https://www.niap-ccevs.org/Documents_and_Guidance/policy-ltr-5-
Cert Implementation
#3243 Balto HMAC in Hardware
#2815 Cheops HMAC in Hardware
#2460 Cheops HMAC in Hardware
#2565 Myna HMAC in Hardware
#1597 ARMv7 HMAC in Firmware 4.0 (Firmware)
#2613 ARMv7 HMAC in Firmware 5.0 (Firmware)
[ST] does not select the CMAC option in FCS_COP.1(c). Thus, this assurance activity is not applicable.
The evaluator shall verify the TSS includes a description of the key wrap function(s) and shall verify the
key wrap uses an approved key wrap algorithm according to the appropriate specification.
[ST] section 6.1 “Overview of TOE Operations” and section 6.2.3 “Cryptographic Operation
(FCS_COP.1(a), FCS_COP.1(b), FCS_COP.1(c), FCS_COP.1(d), FCS_COP.1(f))” describe the key
wrap functions (search for “This intermediate key is used as an input to the AES GCM mode function to
generate an intermediate wrap key” and “This wrap key and a second plain text intermediate wrap key are
The evaluator shall review the KMD to ensure that all keys are wrapped using the approved method
and a description of when the key wrapping occurs.
The description of key wrapping in [KMD] is consistent with the summary in [ST] sections 6.1 and 6.2.3
identified above. [KMD] describes Seagate SED functions that use a drive’s key chains. The description
for each function identifies each instance when a Seagate SED uses AES-GCM or AES-KW key wrap.
The evaluator shall verify the TSS includes a description of the key size used for encryption and the
mode used for encryption.
If multiple encryption modes are supported, the evaluator examines the guidance documentation to
determine that the method of choosing a specific mode/key size by the end user is described.
[Guide] section “Cryptographic Operation (AES Data Encryption/Decryption)” states, “For each function
the specific AES encryption/decryption mode is fixed and not configurable.”
AES-CBC Tests
For the AES-CBC tests described below, the plaintext, ciphertext, and IV values shall consist of 128-bit
blocks. To determine correctness, the evaluator shall compare the resulting values to those obtained by
submitting the same inputs to a known-good implementation.
These tests are intended to be equivalent to those described in NIST’s AES Algorithm Validation Suite
(AESAVS) (http://csrc.nist.gov/groups/STM/cavp/documents/aes/AESAVS.pdf). Known answer values
tailored to exercise the AES-CBC implementation can be obtained using NIST’s CAVS Algorithm
Validation Tool or from NIST’s ACPV service for automated algorithm tests (acvp.nist.gov), when
available. It is not recommended that evaluators use values obtained from static sources such as the
example NIST’s AES Known Answer Test Values from the AESAVS document, or use values not
generated expressly to exercise the AES-CBC implementation.
KAT-2 (KeySBox):
To test the encrypt functionality of AES-CBC, the evaluator shall supply a set of five different key values
for each selected key size and obtain the ciphertext value that results from AES-CBC encryption of an
all-zeros plaintext using the given key value and an IV of all zeros.
To test the decrypt functionality of AES-CBC, the evaluator shall supply a set of five different key values
for each selected key size and obtain the plaintext that results from AES-CBC decryption of an all-zeros
ciphertext using the given key and an IV of all zeros.
[ST] Table 2 TOE Hardware and Firmware and Table 5 Cryptographic Functions provide information on
cryptographic implementations and CAVP certificates for each TOE device. In section 3.5.2 below, Table
19, Table 20, and Table 21 verify the correspondence between each TOE device, its cryptographic
implementations (hardware and firmware), and CAVP certificates. The tables confirm information
required by NIAP Policy #5 (https://www.niap-ccevs.org/Documents_and_Guidance/policy-ltr-5-
add2.pdf) for each TOE device. Table 6 lists certificates and implementations applicable to
FCS_COP.1(c).
Cert Implementation
#4843 Balto AES in Hardware
#4279 Cheops AES in Hardware
#3758 Cheops AES in Hardware
#3940 Myna AES in Hardware
#1343 ARMv7 AES in Firmware 3.0 (Firmware)
The following tests are conditional based upon the selections made in the SFR.
AES-GCM Test
The evaluator shall test the authenticated encrypt functionality of AES-GCM for each combination of
the following input parameter lengths:
128 bit and 256 bit keys
Two plaintext lengths. One of the plaintext lengths shall be a non-zero integer multiple of 128
bits, if supported. The other plaintext length shall not be an integer multiple of 128 bits, if
supported.
Three AAD lengths. One AAD length shall be 0, if supported. One AAD length shall be a non-
zero integer multiple of 128 bits, if supported. One AAD length shall not be an integer multiple
of 128 bits, if supported.
Two IV lengths. If 96 bit IV is supported, 96 bits shall be one of the two IV lengths tested.
The evaluator shall test the encrypt functionality using a set of 10 key, plaintext, AAD, and IV tuples for
each combination of parameter lengths above and obtain the ciphertext value and tag that results from
AES-GCM authenticated encrypt. Each supported tag length shall be tested at least once per set of 10.
The IV value may be supplied by the evaluator or the implementation being tested, as long as it is known.
The evaluator shall test the decrypt functionality using a set of 10 key, ciphertext, tag, AAD, and IV 5-
tuples for each combination of parameter lengths above and obtain a Pass/Fail result on authentication
and the decrypted plaintext if Pass. The set shall include five tuples that Pass and five that Fail.
The results from each test may either be obtained by the evaluator directly or by supplying the inputs
to the implementer and receiving the results in response. To determine correctness, the evaluator shall
compare the resulting values to those obtained by submitting the same inputs to a known good
implementation.
[ST] Table 2 TOE Hardware and Firmware and Table 5 Cryptographic Functions provide information on
cryptographic implementations and CAVP certificates for each TOE device. In section 3.5.2 below, Table
19, Table 20, and Table 21 verify the correspondence between each TOE device, its cryptographic
implementations (hardware and firmware), and CAVP certificates. The tables confirm information
required by NIAP Policy #5 (https://www.niap-ccevs.org/Documents_and_Guidance/policy-ltr-5-
add2.pdf) for each TOE device. Table 7 lists certificates and implementations applicable to
FCS_COP.1(c).
Cert Implementation
#4843 Balto AES in Hardware
#2804 ARMv7 GCM in Firmware 1.0 (Firmware)
#2841 ARMv7 GCM in Firmware 2.0 (Firmware)
The following tests are conditional based upon the selections made in the SFR.
XTS-AES Test
The evaluator shall test the encrypt functionality of XTS-AES for each combination of the following
input parameter lengths:
256 bit (for AES-128) and 512 bit (for AES-256) keys
Three data unit (i.e., plaintext) lengths. One of the data unit lengths shall be a non-zero integer
multiple of 128 bits, if supported. One of the data unit lengths shall be an integer multiple of
128 bits, if supported. The third data unit length shall be either the longest supported data unit
length or 216 bits, whichever is smaller.
using a set of 100 (key, plaintext and 128-bit random tweak value) 3-tuples and obtain the ciphertext
that results from XTS-AES encrypt.
The evaluator may supply a data unit sequence number instead of the tweak value if the implementation
supports it. The data unit sequence number is a base-10 number ranging between 0 and 255 that
implementations convert to a tweak value internally.
The evaluator shall test the decrypt functionality of XTS-AES using the same test as for encrypt,
replacing plaintext values with ciphertext values and XTS-AES encrypt with XTS-AES decrypt.
[ST] Table 2 TOE Hardware and Firmware and Table 5 Cryptographic Functions provide information on
cryptographic implementations and CAVP certificates for each TOE device. In section 3.5.2 below, Table
19, Table 20, and Table 21 verify the correspondence between each TOE device, its cryptographic
implementations (hardware and firmware), and CAVP certificates. The tables confirm information
required by NIAP Policy #5 (https://www.niap-ccevs.org/Documents_and_Guidance/policy-ltr-5-
add2.pdf) for each TOE device. Table 8 lists certificates and implementations applicable to
FCS_COP.1(c).
Table 8 Seagate Secure TCG SSC Self-Encrypting Drives CAVP XTS-AES Certificates
Cert Implementation
#4843 Balto AES in Hardware
#4279 Cheops AES in Hardware
#3758 Cheops AES in Hardware
#3940 Myna AES in Hardware
The evaluator shall verify the TSS includes a description of the key derivation function and shall verify
the key derivation uses an approved derivation mode and key expansion algorithm according to SP 800-
108 and SP 800-132.
[ST] section 6.2.4 “Cryptographic Key Derivation (FCS_KDF_EXT.1)” describes how Seagate SEDs
derive an intermediate key from an Authentication PIN in accordance with NIST SP 800-132.
The evaluator shall examine the vendor’s KMD to ensure that all keys used are derived using an
approved method and a description of how and when the keys are derived.
The description of key wrapping in [KMD] is consistent with the summary in [ST] section 6.2.4 identified
above. [KMD] describes Seagate SED functions that use a drive’s key chains. The description for each
function identifies each instance when a Seagate SED drives an intermediate key.
The evaluator shall examine the KMD to ensure it describes a high level key hierarchy and details of
the key chain. The description of the key chain shall be reviewed to ensure it maintains a chain of keys
using key wrap or key derivation methods that meet FCS_KDF_EXT.1, FCS_COP.1(d),
FCS_COP.1(e), and/or FCS_COP.1(g).
Table 1 Per-band Key Chain in section 2.1.1 above summarize the key chain as presented in [ST]. Sections
2.1.15 “FCS_KDF_EXT.1 Cryptographic Key Derivation” and 2.1.13 “FCS_COP.1(d) Cryptographic
Operation (Key Wrapping)” address key derivation and key wrap methods Seagate SEDs use to protect
the key chain from BEV (Authentication PIN) to DEK (MEK).
The evaluator shall examine the KMD to ensure that it describes how the key chain process functions,
such that it does not expose any material that might compromise any key in the chain. (e.g. using a key
directly as a compare value against a TPM) This description must include a diagram illustrating the
key hierarchy implemented and detail where all keys and keying material is stored or what it is derived
from. The evaluator shall examine the key hierarchy to ensure that at no point the chain could be broken
without a cryptographic exhaust or knowledge of the BEV and the effective strength of the DEK is
maintained throughout the Key Chain.
Figure 1 Key Hierarchy Diagram in [KMD] provides an overview of the key chain and key processing.
[KMD] describes each key together with supporting values (such as, salt and initialization vector values),
[KMD] describes Seagate SED functions that use a drive’s key chains. Each function description in
[KMD] provides a detailed description of how the function uses each key and associated key material.
The evaluator shall verify the KMD includes a description of the strength of keys throughout the key
chain.
For any RBG services provided by a third party, the evaluator shall ensure the TSS includes a statement
about the expected amount of entropy received from such a source, and a full description of the
processing of the output of the third-party source. The evaluator shall verify that this statement is
consistent with the selection made in FCS_RBG_EXT.1.2 for the seeding of the DRBG.
Seagate SEDs do not make use of third-party RBG services. This assurance activity does not apply.
If the ST specifies more than one DRBG, the evaluator shall examine the TSS to verify that it identifies
the usage of each DRBG mechanism.
The evaluator shall verify that the AGD guidance instructs the administrator how to configure the TOE
to use the selected DRBG mechanism(s), if necessary, and provides information regarding how to
instantiate/call the DRBG for RBG services needed in this cPP.
[Guide] section “Cryptographic Operation (Random Bit Generation)” states, “Neither the DRBG or the
entropy system are configurable.”
[ST] Table 2 TOE Hardware and Firmware and Table 5 Cryptographic Functions provide information on
cryptographic implementations and CAVP certificates for each TOE device. In section 3.5.2 below, Table
19, Table 20, and Table 21 verify the correspondence between each TOE device, its cryptographic
implementations (hardware and firmware), and CAVP certificates. The tables confirm information
required by NIAP Policy #5 (https://www.niap-ccevs.org/Documents_and_Guidance/policy-ltr-5-
add2.pdf) for each TOE device. Table 10 lists certificates and implementations applicable to
FCS_COP.1(a).
Table 9 Seagate Secure TCG SSC Self-Encrypting Drives CAVP DRBG Certificates
Cert Implementation
#62 800-90 DRBG 1.0 (Firmware)
#1146 Hash_Based DRBG 2.0 (Firmware)
The evaluator shall ensure the TSS describes how salts are generated. The evaluator shall confirm that
the salt is generating using an RBG described in FCS_RBG_EXT.1 or by the Operational Environment.
If external function is used for this purpose, the TSS should include the specific API that is called with
inputs.
[ST] section 6.2.7 “Cryptographic Operation (Salt, Nonce, and Initialization Vector Generation)
(FCS_SNI_EXT.1)” describes the 128-bit salt values associated with Authentication PINs, which Seagate
SEDs use to derive intermediate keys. The Seagate SEDs generate random salt values.
The evaluator shall ensure the TSS describes how nonces are created uniquely and how IVs and tweaks
are handled (based on the AES mode). The evaluator shall confirm that the nonces are unique and the
IVs and tweaks meet the stated requirements.
[ST] FCS_SNI_EXT.1.2 selects option “no nonces”. [ST] section 6.2.7 “Cryptographic Operation (Salt,
Nonce, and Initialization Vector Generation) (FCS_SNI_EXT.1)” describes tweaks and IV consistent with
FCS_SNI_EXT.1.3 (search for “The tweak values used for XTS are non-negative integers “)
The evaluator shall examine the TSS to determine which authorization factors support validation.
[ST] Table 6 Try Limits Summary identifies Authentication PINs that can unlock a Seagate SED band.
These Authentication PINs are labeled BEV in the Credential Name column of Table 6. [ST] section 6.2.8
“Validation (FCS_VAL_EXT.1(a), FCS_VAL_EXT.1(b))” states “The TOE requires the validation of the
BEV prior to allowing access to TSF data after exiting a compliant power saving state.”
[conditional] If the validation functionality is configurable, the evaluator shall examine the operational
guidance to ensure it describes how to configure the TOE to ensure the limits regarding validation
attempts can be established.
[ST] FCS_VAL_EXT.1(b) specifies the validation function is not configurable for Seagate SEDs with
SAS interface.
[ST] FCS_VAL_EXT.1(a) specifies validation function limits on failed validation attempts are
configurable for Seagate SEDs with SATA interfaces. Seagate SED drives have a separate counter for
each credential which keeps track of the number of unsuccessful authentication attempts for each
credential. [Guide] section “Validation - Try Limits and Persistence Settings” identifies which validation
failure limits an administrator may configure. [TCG Core] sections 5.3.4.1.1.2 and 5.3.2.12 and [TCG
Opal] sections 4.2.1.8 and 4.3.1.9 cover Try Limit behavior and configuration.
TD0229 adds this guidance assurance activity.
[conditional] If ST Author assigned, the evaluator shall examine the operational guidance to ensure it
states the values the TOE uses for limits regarding validation attempts.
The table in [Guide] section “Validation - Try Limits and Persistence Settings” identifies which of the
authorization factors are a BEV, which allow to management functions or encrypted user data after power
is applied to a Seagate SED.
The evaluator shall examine the KMD to verify that it described the method the TOE employs to limit
the number of consecutively failed authorization attempts.
[ST] section 6.2.8 “Validation (FCS_VAL_EXT.1(a), FCS_VAL_EXT.1(b))” described the method the
TOE employs to limit the number of consecutively failed authorization attempts. This description is
consistent with a more detailed description in [KMD].
The evaluator shall examine the vendor’s KMD to ensure it describes how validation is performed. The
description of the validation process in the KMD provides detailed information how the TOE validates
the BEV.
[KMD] includes a step-by-step validation procedure. The procedure shows Seagate SEDs use approved
algorithms as intended and handles keys as specified in [CPP FDE EE].
The evaluator successfully authenticated to the TOE with the correct credentials. The evaluator then
attempted to authenticate to the TOE using incorrect credentials until the try limit was reached. The
evaluator then attempted to authenticate to the TOE with correct credentials and observed that the TOE
After test 1, the evaluator power cycled the TOE. The evaluator confirmed that when the lockout was
expected to be persistent the TOE was still locked out and for the non-persistent instances of the TOE it
allowed successful authentication with correct credentials.
[ST] section 6.4.1 “Protection of Data on Disk (FDP_DSK_EXT.1)” states “The TOE is encrypted by
default without user intervention using AES:XTS”. Seagate Opal SEDs provide unencrypted storage for
operating system use, which includes a shadow master boot record used for booting the host. Seagate
SEDs use unencrypted system area (for example, to store keys wrapped in accordance with
FCS_COP.1(d)). Section 6.4.1 explains there is no host access to the system area. The system area includes
TCG Data Store tables, which can only be accessed by administrators through access-controlled TCG
commands. The section warns administrators not to store protected data in the TCG Data Tables.
For the cryptographic functions that are provided by the Operational Environment, the evaluator shall
check the TSS to ensure it describes, for each platform identified in the ST, the interface(s) used by the
TOE to invoke this functionality.
As summarized above, Seagate SEDs encrypt all user data by default. [ST] section 6.4.1 “Protection of
Data on Disk (FDP_DSK_EXT.1)” describes taking ownership of a drive, which restricts data reads and
writes to authenticated users. [ST] section 6.1 “Overview of TOE Operations” describes subdividing user
storage into storage ranges called bands.
The evaluator shall verify the TSS describes areas of the disk that it does not encrypt (e.g., portions
associated with the Master Boot Records (MBRs), boot loaders, partition tables, etc.).
Seagate Opal SEDs provide unencrypted storage for operating system use, which includes a shadow
master boot record used for booting the host. Seagate SEDs use unencrypted system area (for example, to
store keys wrapped in accordance with FCS_COP.1(d)). Section 6.4.1 explains there is no host access to
the system area. The system area includes TCG Data Store tables, which can only be accessed by
administrators through access-controlled TCG commands. The section warns administrators not to store
protected data in the TCG Data Tables.
If the TOE supports multiple disk encryptions, the evaluator shall examine the administration guidance
to ensure the initialization procedure encrypts all storage devices on the platform.
Seagate SEDs do not support multiple disk encryptions. Thus, this assurance activity is not applicable.
The evaluator shall review the AGD guidance to determine that it describes the initial steps needed to
enable the FDE function, including any necessary preparatory steps. The guidance shall provide
instructions that are sufficient, on all platforms, to ensure that all hard drive devices will be encrypted
when encryption is enabled.
[Guide] describes putting a Seagate SED into its evaluated configuration in the following three sections
(depending on device type).
Section 2.0 TCG Enterprise Configuration & Operation
Section 3.0 TCG Opal Configuration & Operation
Section 4.0 ATA Mode Configuration & Operation
Each of these sections includes example commands for each configuration step. While examining the TOE
security function interfaces, the evaluation team confirmed the steps and example commands would
The evaluator shall verify the KMD includes a description of the data encryption engine, its components,
and details about its implementation (e.g. for hardware: integrated within the device’s main SOC or
separate co-processor, for software: initialization of the product, drivers, libraries (if applicable),
logical interfaces for encryption/decryption, and areas which are not encrypted (e.g. boot loaders,
portions associated with the Master Boot Record (MBRs), partition tables, etc.)). The evaluator shall
verify the KMD provides a functional (block) diagram showing the main components (such as memories
and processors) and the data path between, for hardware, the device’s host interface and the device’s
persistent media storing the data, or for software, the initial steps needed to the activities the TOE
performs to ensure it encrypts the storage device entirely when a user or administrator first provisions
the product. The hardware encryption diagram shall show the location of the data encryption engine
within the data path. The evaluator shall validate that the hardware encryption diagram contains
enough detail showing the main components within the data path and that it clearly identifies the data
encryption engine.
[KMD] provides a description of the Seagate SEDs. The description includes a block diagram of the data
encryption engine, write and read data flows through the Seagate SED, and drive operation. The
description covers access to the unencrypted shadow master boot record and TCG Data Store Tables of
the drive. [KMD] describes the TCG Opal boot process as well as initial conditions required for each type
of Seagate SED. [KMD] provides the information required by this assurance activity.
The evaluator shall verify the KMD provides sufficient instructions for all platforms to ensure that when
the user enables encryption, the product encrypts all hard storage devices. The evaluator shall verify
that the KMD describes the data flow from the device’s host interface to the device’s persistent media
storing the data. The evaluator shall verify that the KMD provides information on those conditions in
which the data bypasses the data encryption engine (e.g. read-write operations to an unencrypted
Master Boot Record area).
[KMD] explains Seagate SEDs encrypt all user data by default. Seagate SEDs restricts user data reads and
writes once a user takes ownership suing a TCG controller. [KMD] also explains exceptions for
unencrypted access to Opal SED shadow master boot record and TCG Data Store Tables (search for “TCG
Opal SEDs contain two other unencrypted areas”). The explanations include the data flow from a Seagate
SED’s host interface to the drives persistent media.
The evaluator shall verify that the KMD provides a description of the platform’s boot initialization, the
encryption initialization process, and at what moment the product enables the encryption. The evaluator
shall validate that the product does not allow for the transfer of user data before it fully initializes the
encryption.
The Seagate TOE consists of self-encrypting drivers. [KMD] states “Out of the box all Seagate SED
drives are encrypted but not locked by default.”
Seagate has test tools with multiple functions to support drive examination.
The evaluator configured the TOE to have 64 KB bands at the beginning and end of the drive. The
evaluator wrote repeating instances of the string ‘AB’ to the beginning of the drive and repeating instances
of the string ‘CD’ to the end of the drive. The evaluator then queried the drive to confirm the data had
been written to the correct location. The evaluator then generated a new encryption key for each band.
Option A: The evaluator shall ensure the TSS describes how the TOE changes the DEK.
[ST] section 6.3.1 “Specification of Management Functions (FMT_SMF.1)” describes destroying and
generating a new MEK when changing the MEK (search for “The TOE changes a DEK”). Seagate SEDs
generate MEKs and do not support provisioning keys.
Option B: The evaluator shall ensure the TSS describes how the TOE cryptographically erases the DEK.
[ST] section 6.3.1 “Specification of Management Functions (FMT_SMF.1)” covers steps needed to
initiate a firmware update: take ownership of the drive, change the SID, and issue download command
(search for “Firmware updates are initiated using”). [ST] section 6.5.1 “Firmware Access Control and
Update Authentication (FPT_FAC_EXT.1, FPT_FUA_EXT.1)” provides additional process details.
Please see also sections 2.4.1 and 2.4.2 below.
Option D: If additional management functions are claimed in the ST, the evaluator shall verify that the
TSS describes those functions.
Option A: The evaluator shall review the AGD guidance and shall determine that the instructions for
changing a DEK exist. The instructions must cover all environments on which the TOE is claiming
conformance, and include any preconditions that must exist in order to successfully generate or re-
generate the DEK.
Security functions Erase Band and RevertSP change MEKs. The evaluator confirmed the [Guide] includes
sufficient instructions to invoke Erase Band and RevertSP in the course of examining the TOE security
function interfaces. Please sees section 3.1.1 below for the results of the examination.
Option C: The evaluator shall examine the operational guidance to ensure that it describes how to
initiate TOE firmware/software updates.
[Guide] section “Firmware Access Control and Firmware Trusted Update” provides instructions for
initiating a TOE firmware update.
Option D: Default Authorization Factors: It may be the case that the TOE arrives with default
authorization factors in place. If it does, then the selection in item D must be made so that there is a
mechanism to change these authorization factors. The operational guidance shall describe the method
by which the user changes these factors when they are taking ownership of the device. The TSS shall
describe the default authorization factors that exist.
[Guide] describes putting a Seagate SED into its evaluated configuration in section “General Setup &
Configuration.” The configuration steps for each type of drive include changing PINs (that is,
authorization factors) to take ownership of a drive. [ST] section 6.1 “Overview of TOE Operations”
identifies applicable PINs (search for “For TCG Enterprise there are four authentication PINs needed in
order to gain access to all” and “For TCG Opal there are five authentication PINs needed in order to gain
access to all” and “In addition, for ATA security mode, there are also”).
Disable Key Recovery: The guidance for disabling this capability shall be described in the AGD
documentation.
Neither [ST] nor [Guide] identify a key recovery mechanism for Seagate SEDs. Thus, this assurance
activity is not applicable.
Option D: If the TOE offers the functionality to import an encrypted DEK, the evaluator shall ensure
the KMD describes how the TOE imports a wrapped DEK and performs the decryption of the wrapped
DEK.
Option A and B: The evaluator shall verify that the TOE has the functionality to change and
cryptographically erase the DEK (effectively removing the ability to retrieve previous user data).
The evaluator authenticated to the TOE, changed the authentication PIN and successfully toggled the
firmware download port. The evaluator then attempted to toggle the firmware download port without
authenticating, which was denied by the TOE. For TCG Opal, the evaluator authenticated and successfully
configured the authentication try limit. For TCG Enterprise, the evaluator authenticated and attempted to
configure the authentication try limit, which is not supported and denied by the TOE.
The evaluator shall examine the TSS to ensure that it describes information stating how the Access
Control process takes place along with a description of the values that are used.
In the evaluated configuration, a Seagate SED’s download port is locked. [ST] section 6.5.1 “Firmware
Access Control and Update Authentication (FPT_FAC_EXT.1, FPT_FUA_EXT.1)” explains a drive
The evaluator ensures that the Operational Guidance describes how the user will be expected to interact
with the authorization process.
[Guide] section “Firmware Access Control and Firmware Trusted Update” describes the authorization
process (search for “Authenticate with SID credential (password).”).
The evaluator authenticated to the TOE and confirmed that the firmware upgrade was rejected as the
firmware download port is locked. The evaluator then unlocked the firmware download port and attempted
to upgrade the TOE. The evaluator confirmed that this attempt was successful.
The evaluator shall examine the TSS to ensure that it describes how the TOE uses the RTU, what type
of key or hash value, and where the value is stored on the RTU. The evaluator shall also verify that the
TSS contains a description (storage location) of where the original firmware exists.
[ST] section 6.5.1 “Firmware Access Control and Update Authentication (FPT_FAC_EXT.1,
FPT_FUA_EXT.1)” describes the firmware download and installation process. The description covers:
Firmware validation in volatile memory (DRAM)
Firmware validation using a 2048-bit public key for Seagate,
Storage of the Seagate public key in ROM,
Error exit if firmware validation fails,
Storage of firmware in flash memory if validation succeeds, and
Locking download port either by explicit command from administrator or by power-on reset.
[ST] section 6.2.3 “Cryptographic Operation (FCS_COP.1(a), FCS_COP.1(b), FCS_COP.1(c),
FCS_COP.1(d), FCS_COP.1(f))” adds that Seagate SEDs store the signature validation firmware routines
in ROM (search for “using FW routines and the public key in ROM”).
The evaluator shall examine the TSS to verify that it describes the method by which intermediate keys
are generated using submask combining.
[ST] section 6.5.2 “Protection of Key and Key Material (FPT_KYP_EXT.1)” states “Intermediate keys
are not generated using submask combining.” Rather Seagate SEDs store keys in non-volatile memory
using AES-GCM and AES-KW key wrapping.
The evaluator shall examine the KMD for a description of the methods used to protect keys stored in
non-volatile memory.
[ST] section 6.5.2 “Protection of Key and Key Material (FPT_KYP_EXT.1)” explains Seagate SEDs store
keys in non-volatile memory using AES-GCM and AES-KW key wrapping. Please see section 2.1.13
above for assurance activity results regarding key wrapping.
The evaluator shall verify the KMD to ensure it describes the storage location of all keys and the
protection of all keys stored in non-volatile memory. The description of the key chain shall be reviewed
to ensure the selected method is followed for the storage of wrapped or encrypted keys in non-volatile
memory and plaintext keys in non-volatile memory meet one of the criteria for storage.
Please see section 2.1.5 above for a review of key storage in non-volatile memory. As specified in
FPT_KYP_EXT.1, intermediate keys in non-volatile memory are key wrapped using either AES-GCM or
AES-KW.
The evaluator shall validate the TSS contains a list of Compliant power saving states.
[ST] section “6.5.3 Power Saving States and Timing (FPT_PWR_EXT.1, FPT_PWR_EXT.2)” states
“The TOE supports two states: device full off (D0) and device full on (D3).”
The evaluator shall ensure that guidance documentation contains a list of Compliant power saving
states.
[Guide] section “Power Saving States and Timing of Power Saving States” identifies the compliant power
saving state (search for “device full off (D0)”).
If additional power saving states are supported, then the evaluator shall validate that the guidance
documentation states how the use of non-Compliant power saving states can be avoided.
Seagate SEDs do not support any additional power saving states. Thus, this assurance activity is not
applicable.
The evaluator shall confirm that for each listed Compliant state all key/key materials are removed from
volatile memory by using the test defined in FCS_CKM.4(b).
N/A—The TOE does not support any Compliant power saving states. The TOE only supports 2 power
states; Fully On and Off.
The evaluator shall validate that the TSS contains a list of conditions under which the TOE enters a
Compliant power saving state.
[ST] section “6.5.3 Power Saving States and Timing (FPT_PWR_EXT.1, FPT_PWR_EXT.2)” states
“The device changes to off when the system removes power to the drive.”
The evaluator shall check that the guidance contains a list of conditions under which the TOE enters a
Compliant power saving state.
[Guide] section “Power Saving States and Timing of Power Saving States” explains “The device changes
to off when the system removes power to the drive.”
Additionally, the evaluator shall verify that the guidance documentation provides information on how
long it is expected to take for the TOE to fully transition into the Compliant power saving state (e.g.
how many seconds for the volatile memory to be completely cleared).
[Guide] section “Power Saving States and Timing of Power Saving States” states, “After power is
removed, it takes approximately 2 seconds for DRAM volatile memory and about 30 ms for SRAM
volatile memory to completely power down.”
The evaluator shall trigger each condition in the list of identified conditions and ensure the TOE ends
up in a Complaint power saving state by running the test identified in FCS_CKM.4(b).
N/A—The TOE does not support any Compliant power saving states. The TOE only supports 2 power
states; Fully On and Off.
The evaluator shall examine the TSS to ensure that it describes at a high level the process for verifying
that security version checking is performed before an upgrade is installed.
[ST] section 6.5.4 “RollBack Protection (FPT_RBP_EXT.1)” describes in general terms an internal block
point mechanism that Seagate SEDs use to prevent downgrading to a lower security version number.
The evaluator shall verify that a high level description of the types of error codes are provided and
when an error would be triggered.
[ST] section 6.5.4 “RollBack Protection (FPT_RBP_EXT.1)” explains Seagate SEDs reject firmware with
a lower security version number and return an error code. Section 6.5.4 includes error codes and messages.
The evaluator ensures that a description is provided on how the user should interpret the error codes.
[Guide] section “Firmware Rollback Protection” identifies the rollback error codes and provides messages
explaining the errors.
The evaluator queried the current version of TOE firmware. The evaluator then attempted to upgrade the
TOE to an earlier version of the firmware. The attempted was denied by the TOE and an error was
The evaluator shall verify that the TSS describes the known-answer self-tests for cryptographic
functions.
[ST] section 6.5.5 “TST Testing (FPT_TST_EXT.1)” identifies the power-on and continuous self-test for
Seagate SED cryptographic functions.
The evaluator shall verify that the TSS describes, for some set of non-cryptographic functions affecting
the correct operation of the TOE and the method by which the TOE tests those functions. The evaluator
shall verify that the TSS includes each of these functions, the method by which the TOE verifies the
correct operation of the function.
[ST] section 6.5.5 “TST Testing (FPT_TST_EXT.1)” describes firmware load check and secure boot
process, which validate drive firmware at download and at drive power-on, respectively. Please see
sections 2.1.10 and 2.4.2 above for review of the firmware download and power-on function tests.
The evaluator shall verify that the TSF data are appropriate for TSF Testing. For example, more than
blocks are tested for AES in CBC mode, output of AES in GCM mode is tested without truncation, or
512-bit key is used for testing HMAC-SHA-512.
The test assurance activities in the following sections of this report ensure the TSF data is suitable for
testing.
2.1.10 FCS_COP.1(a) Cryptographic Operation (Signature Verification)
[ST] section 6.5.5 “TST Testing (FPT_TST_EXT.1)” describes tests Firmware 800-90 DRBG (CRNGT)
and Firmware 800-90 DRBG Entropy (CRNGT) in addition to Firmware 800-90 DRBG KAT (search for
“Health test as described above”).
If any FCS_COP functions are implemented by the TOE, the TSS shall describe the known-answer self-
tests for those functions.
[ST] section 6.5.5 “TST Testing (FPT_TST_EXT.1)” identifies the power-on and continuous self-test for
Seagate SED cryptographic functions.
The evaluator shall verify that the TSS describes, for some set of non-cryptographic functions affecting
the correct operation of the TSF, the method by which those functions are tested. The TSS will describe,
for each of these functions, the method by which correct operation of the function/component is verified.
The evaluator shall determine that all of the identified functions/components are adequately tested on
start-up.
[ST] section 6.5.5 “TST Testing (FPT_TST_EXT.1)” describes firmware load check and secure boot
process, which validate drive firmware at download and at drive power-on, respectively. Please see
sections 2.1.10 and 2.4.2 above for review of the firmware download and power-on function tests.
The evaluator shall examine the TSS to ensure that it describes information stating that an authorized
source signs TOE updates and will have an associated digital signature.
[ST] section 6.5.1 “Firmware Access Control and Update Authentication (FPT_FAC_EXT.1,
FPT_FUA_EXT.1)” indicates Seagate digitally signs all firmware updates with an RSA key
corresponding to an RSA public key stored in drive ROM.
The evaluator shall examine the TSS contains a definition of an authorized source along with a
description of how the TOE uses public keys for the update verification mechanism in the Operational
Environment.
[ST] section 6.5.1 “Firmware Access Control and Update Authentication (FPT_FAC_EXT.1,
FPT_FUA_EXT.1)” identifies Seagate as the authorized source of firmware updates (search for “the
authorized source that signs TOE updates is Seagate”).
The evaluator ensures the TSS contains details on the protection and maintenance of the TOE update
credentials.
[ST] section 6.5.1 “Firmware Access Control and Update Authentication (FPT_FAC_EXT.1,
FPT_FUA_EXT.1)” indicates Seagate digitally signs all firmware updates with an RSA key
corresponding to an RSA public key stored in drive ROM.
If the Operational Environment performs the signature verification, then the evaluator shall examine
the TSS to ensure it describes, for each platform identified in the ST, the interface(s) used by the TOE
to invoke this cryptographic functionality.
The evaluator ensures that the operational guidance describes how the TOE obtains vendor updates to
the TOE ….
[Guide] section “Firmware Access Control and Firmware Trusted Update” describes obtaining a signed
firmware update package from Seagate and gives the URL https://www.seagate.com/support-home.
The evaluator ensures that the operational guidance describes … the processing associated with
verifying the digital signature of the updates (as defined in FCS_COP.1(a)) ...
[Guide] section “Firmware Access Control and Firmware Trusted Update” covers signature verification
(search for “4. The signature is verified using PKCS #1, v1.5 RSA signature algorithm and public key in
ROM.”).
The evaluator ensures that the operational guidance describes … the actions that take place for
successful and unsuccessful cases.
[Guide] section “Firmware Access Control and Firmware Trusted Update” describes Seagate SED
behavior in both the successful (update installed) and unsuccessful (error code returned) cases.
The evaluators shall perform the following tests (if the TOE supports multiple signatures, each using a
different hash algorithm, then the evaluator performs tests for different combinations of authentic and
unauthentic digital signatures and hashes, as well as for digital signature alone):
Test 1: The evaluator performs the version verification activity to determine the current version of the
TOE. After the update tests described in the following tests, the evaluator performs this activity again
to verify that the version correctly corresponds to that of the update.
The evaluator queried the current version of the TOE firmware. The evaluator then obtained an unsigned
TOE firmware update and attempted to upgrade the TOE. The TOE rejected the update and the evaluator
queried the TOE firmware version again and confirmed it went unchanged. The evaluator acquired a valid,
signed update and attempted to upgrade the TOE. The evaluator confirmed that the TOE accepted the
The EAs for this assurance component focus on understanding the interfaces (e.g., application
programing interfaces, command line interfaces, graphical user interfaces, network interfaces)
described in the AGD documentation, and possibly identified in the TOE Summary Specification (TSS)
in response to the SFRs. Specific evaluator actions to be performed against this documentation are
identified (where relevant) for each SFR in Section 2 (Evaluation Activities for SFRs), and in EAs for
AGD, ATE and AVA SARs in other parts of Section 5.
The EAs presented in this section address the CEM work units ADV_FSP.1-1, ADV_FSP.1-2,
ADV_FSP.1-3, and ADV_FSP.1-5.
The EAs are reworded for clarity and interpret the CEM work units such that they will result in more
objective and repeatable actions by the evaluator. The EAs in this SD are intended to ensure the
evaluators are consistently performing equivalent actions.
The documents to be examined for this assurance component in an evaluation are therefore the Security
Target, AGD documentation, and any required supplementary information required by the cPP: no
additional “functional specification” documentation is necessary to satisfy the EAs. The interfaces that
need to be evaluated are also identified by reference to the EAs listed for each SFR, and are expected
to be identified in the context of the Security Target, AGD documentation, and any required
supplementary information defined in the cPP rather than as a separate list specifically for the purposes
of CC evaluation. The direct identification of documentation requirements and their assessment as part
of the EAs for each SFR also means that the tracing required in ADV_FSP.1.2D (work units
ADV_FSP.1-4, ADV_FSP.1-6 and ADV_FSP.1-7 is treated as implicit and no separate mapping
information is required for this element.
The evaluator shall examine the interface documentation to ensure it describes the purpose and method
of use for each TSFI that is identified as being security relevant.
In this context, TSFI are deemed security relevant if they are used by the administrator to configure the
TOE, or to perform other administrative functions (e.g., audit review or performing updates).
Additionally, those interfaces that are identified in the ST, or guidance documentation, as adhering to
the security policies (as presented in the SFRs), are also considered security relevant. The intent, is that
these interfaces will be adequately tested, and having an understanding of how these interfaces are used
in the TOE is necessary to ensure proper test coverage is applied.
The set of TSFI that are provided as evaluation evidence are contained in the Administrative Guidance
and User Guidance.
Example
Security Function Security Service Interface Specification Section
Step
Change PIN Set PIN 2 TCG Set [TCG Core] 5.3.3.7 Basic Table Method Group - Set (Table and
Object Method)
[TCG Core] 5.3.4.2 Table Management
[TCG Ent] 10.3.3.2 Set
Disable Authority See example 6 TCG Set See above See Change PIN
[TCG Core] 5.3.2.10 Access Control Metadata Group - Authority
(Object Table)
[TCG Ent] 11.3.1 Authorities & Credentials
Erase Band Cryptographic N/A TCG Erase [TCG Ent] 10.5.4.1 Erase
Erase
FW Download Firmware N/A TCG Set See above See Change PIN
Download
SCSI Write [TCG SIIS] 3 SCSI Interface
Buffer
FW Download (Port See "Firmware 10 TCG Set See above See Change PIN
Lock/Unlock) Access Control Note: Firmware Download Port is a Seagate-defined
and Firmware port. See sections “TCG Enterprise Setup &
Trusted Update" Configuration” and “Firmware Access Control and
Firmware Trusted Update”.
FW Download (Set Lock on See example 9 TCG Set See above See Change PIN
Reset) Note: Firmware Download Port is a Seagate-defined
port. See sections “TCG Enterprise Setup &
Configuration” and “Firmware Access Control and
Firmware Trusted Update”.
FW Download See example 1 TCG [TCG Core] 5.3.3.12 Access Control Method Group -
(Authenticate) Authenticate Authenticate (SP Method)
[TCG Core] 5.3.4.1 Authentication
[TCG Ent] 11.2.2 Authenticate Method Deviations
Table 13 Mapping from Security Function to TCG Opal SSC Interface Specification
Example
Security Function Security Service Interface Specification Section
Step
Change PIN Set PIN 2 TCG Set [TCG Core] 5.3.3.7 Basic Table Method Group - Set
(Table and Object Method)
[TCG Core] 5.3.4.2 Table Management
[TCG Opal] 4.2.4 Admin Template Methods
[TCG Opal] 4.3.6 Locking Template Methods
Transition to TCG Opal See "Protection of 1 TCG Activate See above See Take Ownership
Security Mode Data on Disk &
Specification of
Management
Functions"
Unlock Band Lock / Unlock User N/A TCG Set See above See Lock Band
Data Range for Read
and/or Write
Verify PIN See example 2 TCG Authenticate See above See Firmware (Authenticate)
Example
Security Function Security Service Interface Specification Section
Step
Change PIN Set PIN 1, 2 ATA SECURITY SET [ATA-8 ASC2] 7.47 SECURITY SET PASSWORD - F1h, PIO
Password Data-Out
N/A TCG set [TCG Core] 5.3.2.4 Locking SP Life Cycle Interactions with
the ATA Security Feature Set
[TCG Core] 5.3.4.2 Table Management
[TCG Opal] 4.2.4 Admin Template Methods
[TCG Opal] 4.3.6 Locking Template Methods
Disable Authority See example 3 TCG Set See above See Change PIN
[TCG Core] 5.3.2.10 Access Control Metadata Group -
Authority (Object Table)
[TCG Opal] 4.2.1.7 Authority (M)
Erase Band Cryptographic Erase N/A ATA SECURITY [ATA-8 ASC2] 7.44 SECURITY ERASE PREPARE - F3h,
ERASE PREPARE Non-Data
ATA SECURITY [ATA-8 ASC2] 7.45 SECURITY ERASE UNIT - F4h, PIO
ERASE UNIT Data-Out
FW Download Load complete N/A ATA DOWNLOAD [TCG Opal] 5.1.4 Examples
firmware image MICROCODE
[ATA-8 ACS2] 7.12 DOWNLOAD MICROCODE - 92h, PIO
Data-Out/Non-Data
FW Download (Port See "Firmware 5 TCG Set See above See Change PIN
Lock/Unlock) Access Control and
Firmware Trusted
Update"
FW Download (Set See example 4 TCG Set See above See Change PIN
Lock on Reset)
FW Download See example 3 TCG Authenticate [TCG Core] 5.3.3.12 Access Control Method Group -
(Authenticate) Authenticate (SP Method)
[TCG Core] 5.3.4.1 Authentication
[TCG Opal] 4.2.4 Admin Template Methods
The evaluator shall check the interface documentation to ensure it identifies and describes the
parameters for each TSFI that is identified as being security relevant.
Please see section 3.1.1.1 above, which summarizes the evaluation team’s examination of TOE security
function interfaces. The evaluation team used the mappings to confirm [Guide] and the public
specifications adequately identify and describe the parameters for each TOE security function interface.
The evaluator shall examine the interface documentation to develop a mapping of the interfaces to
SFRs.
The evaluator uses the provided documentation and first identifies, and then examines a representative
set of interfaces to perform the EAs presented in Section 2 (Evaluation Activities for SFRs), including
the EAs associated with testing of the interfaces.
It should be noted that there may be some SFRs that do not have an interface that is explicitly “mapped”
to invoke the desired functionality. For example, generating a random bit string, destroying a
cryptographic key that is no longer needed, or the TSF failing to a secure state, are capabilities that
may be specified in SFRs, but are not invoked by an interface.
However, if the evaluator is unable to perform some other required EA because there is insufficient
design and interface information, then the evaluator is entitled to conclude that an adequate functional
specification has not been provided, and hence that the verdict for the ADV_FSP.1 assurance
component is a ‘fail’.
Please see Table 11 Mapping from SFR to Security Functions in section 3.1.1.1 above
It is not necessary for a TOE to provide separate documentation to meet the individual requirements of
AGD_OPE and AGD_PRE. Although the Evaluation Activities in this section are described under the
traditionally separate AGD families, the mapping between real TOE documents and AGD_OPE and
AGD_PRE requirements may be many-to-many, as long as all requirements are met in documentation
that is delivered to administrators and users (as appropriate) as part of the TOE.
Specific requirements and checks on the user guidance documentation are identified (where relevant)
in the individual Evaluation Activities for each SFR, and for some other SARs (e.g. ALC_CMC.1).
Evaluation Activity:
Each Seagate SED firmware and hardware contain the drive’s cryptographic engine, which is not
configurable.
In addition to SFR-related Evaluation Activities, the following information is also required.
The operational guidance shall describe how to configure the IT environments that are
supported to shut down after an administratively defined period of inactivity.
The TOE is a set of Seagate SEDs, which rely on the host platform for power management. Thus, this
assurance activity is not applicable.
In addition to SFR-related Evaluation Activities, the following information is also required.
The operational guidance shall identify system “sleeping” states for all supported operating
environments and for each environment, provide administrative guidance on how to disable the
sleep state. As stated above, the TOE developer may be providing an integrator’s guide and
“power states” may be an abstraction that SEDs provide at various levels – e.g., may simply
provide a command that the Host Platform issues to manage the state of the device, and the Host
Platform is responsible for providing a more sophisticated power management scheme.
[Guide] sections “Power Saving States and Timing of Power Saving States” and “Cryptographic Key and
Key Material Destruction (Power Management)” provide sufficient information for a host platform to
manage a Seagate SED’s power states.
In addition to SFR-related Evaluation Activities, the following information is also required.
The TCG Storage and ATA Security Specifications identified in section 1.3 above specify interfaces and
behaviors for self-encrypting drives, which include the Seagate SEDs. [Guide] serves to identify the
interfaces and behaviors related to the security functional requirements and security functions in [ST].
As for the operational guidance, specific requirements and checks on the preparative procedures are
identified (where relevant) in the individual Evaluation Activities for each SFR.
Evaluation Activity:
The evaluator shall check the requirements below are met by the preparative procedures.
The contents of the preparative procedures will be verified by the Evaluation Activities defined below
and as appropriate for each individual SFR in section Error! eference source not found sections 2, 3,
and 4.
Preparative procedures shall be distributed to administrators and users (as appropriate) as part of the
TOE, so that there is a reasonable guarantee that administrators and users are aware of the existence
and role of the documentation in establishing and maintaining the evaluated configuration.
Seagate wrote [Guide] to provide administrators and users with guidance to configure and operate a
Seagate SED in the evaluated configuration. Applicable sections in [Guide] are “Setup and Configuration”
and “TCG Enterprise, TCG Opal and ATA Enhanced Mode Security Mode Services”. Section “Setup and
Configuration” covers each of TCG Enterprise, TCG Opal, and ATA Mode devices. Section “TCG
Enterprise, TCG Opal and ATA Enhanced Mode Security Mode Services” describes the correspondence
from device services to ATA and TCG commands.
The NIAP Product Compliant List entry for this evaluation includes a copy of [Guide].
TCG and ATA public specifications supplement [Guide] with detailed interface information. Please see
section 1.3 above for a list of specifications. Section 3.1.1 above presents results of the evaluation team’s
check of the specifications.
The contents of the preparative procedures will be verified by the Evaluation Activities defined below
and as appropriate for each individual SFR in section Error! eference source not found.. sections 2,
3, and 4
In addition to SFR-related Evaluation Activities, the following information is also required.
Preparative procedures must include a description of how the administrator verifies that the operational
environment can fulfil its role to support the security functionality (including the requirements of the
Security Objectives for the Operational Environment specified in the Security Target). The
documentation should be in an informal style and should be written with sufficient detail and
explanation that they can be understood and used by the target audience (which will typically include
IT staff who have general IT experience but not necessarily experience with the TOE itself).
[Guide] section “Introduction” states the need for host system that supports TCG or ATA security mode
commands. Section “Setup and Configuration” covers each of TCG Enterprise, TCG Opal, and ATA
Mode devices.
The preparative procedures must include
instructions to manage the security of the TSF as a product and as a component of the larger
operational environment; and
[Guide] section “Protection of Data on Disk & Specification of Management Functions” covers managing
security of Seagate SEDs. The section addresses personalization of a drive, interaction with an
Authorization Acquisition component, supporting multiple users, and erasing a drive.
The preparative procedures must include
instructions to provide a protected administrative capability.
[Guide] section “TCG Enterprise, TCG Opal and ATA Enhanced Mode Security Mode Services”
identifies security services along with access restrictions on those services. Please see [Guide] tables 4.1,
4.3, and 4.5.
When evaluating that the TOE has been provided and is labelled with a unique reference, the evaluator
performs the work units as presented in the CEM.
The evaluator obtained the TOE from the vendor and observed it is labelled with a unique reference in the
form of a serial number and identifiers to match the model number and firmware in the Security Target.
When evaluating the developer’s coverage of the TOE in their CM system, the evaluator performs the
work units as presented in the CEM.
The evaluator confirmed via the Security Target that the developer provided an identification of the TOE
defined as: Product Name, model number, standard, capacity and firmware. [ST] uniquely identifies each
of [ST], [KMD], and [Guide] by title, version and date.
An evaluation activity is defined here for evaluation of Exact Conformance claims against a cPP in a
Security Target. Other aspects of ASE remain as defined in the CEM.
The table below indicates the actions to be taken for particular ASE_CCL.1 elements in order to
determine exact conformance with a cPP.
3.4.1.1 ASE_CCL.1.8C
Evaluator Action
The evaluator shall check that the statements of security problem definition in the PP and ST are
identical.
[ST] section 3 “Security Problem Definition” includes by reference the security problem definition from
[CPP FDE EE] excluding A.STRONG_CRYPTO. The exclusions is consistent with the instructions in
[CPP FDE EE] section A.1 Internal Cryptographic Implementation.
3.4.1.2 ASE_CCL.1.9C
Evaluator Action
The evaluator shall check that the statements of security objectives in the PP and ST are identical.
[ST] section 4.1 “Security Objectives for the Operational Environment” reproduces security objectives
verbatim from [CPP FDE EE] section 4.1 “Security Objectives for the Operational Environment”.
OE.TRUSTED_CHANNEL
OE.INITIAL_DRIVE_STATE
OE.PASSPHRASE_STRENGTH
OE.POWER_DOWN
OE.SINGLE_USE_ET
OE.TRAINED_USERS
OE.PHYSICAL
[ST] section 4.1 explicitly excludes OE. STRONG_ENVIRONMENT_CRYPTO, which is consistent
with instructions in [CPP FDE EE] section A.1 “Internal Cryptographic Implementation” (search for “ST
author shall omit OE.STRONG_ENVIRONMENT_CRYPTO and its corresponding assumption’).
3.4.1.3 ASE_CCL.1.10C
Evaluator Action
The evaluator shall check that the statements of security requirements in the ST include all the
mandatory SFRs in the cPP, and all of the selection-based SFRs that are entailed by selections made in
other SFRs (including any SFR iterations added in the ST). The evaluator shall check that if any other
[ST] section 5 “IT Security Requirements” states the SFRs and SARs are from [CPP FDE EE]. Table 16
below confirms all SFRs in [ST] come from [CPP FDE EE]. The correct reproduction of SFRs and
completion of operations on SFRs is assessed in the ASE_REQ.1 work units. Table 17 below confirms
the correspondence between [ST] SARs and [CPP FDE EE] SARs.
Table 16 ST Security Functional Requirements
PP SFR ST SFR
FCS_CKM.1(b) Cryptographic Key Generation FCS_CKM.1(b) Cryptographic Key Generation
(Symmetric Keys) (Symmetric Keys)
FCS_CKM.1(c) Cryptographic Key Generation (Data FCS_CKM.1(c) Cryptographic Key Generation (Data
Encryption Key) Encryption Key)
FCS_CKM.4(a) Cryptographic Key Destruction FCS_CKM.4(a) Cryptographic Key Destruction
(Power Management) (Power Management)
FCS_CKM.4(b) Cryptographic Key Destruction FCS_CKM.4(b) Cryptographic Key Destruction
(TOE-Controlled Hardware) (TOE-Controlled Hardware)
FCS_CKM.4(c) Cryptographic Key Destruction FCS_CKM.4(c)(1) HDD Cryptographic Key
(General Hardware) Destruction (General Hardware)
FCS_CKM.4(c) Cryptographic Key Destruction FCS_CKM.4(c)(2) SDD and Hybrid Cryptographic
(General Hardware) Key Destruction (General Hardware)
FCS_CKM.4(e) Cryptographic Key Destruction (Key FCS_CKM.4(e) Cryptographic Key Destruction (Key
Cryptographic Erase) Cryptographic Erase)
FCS_CKM_EXT.4(a) Cryptographic Key and Key FCS_CKM_EXT.4(a) Cryptographic Key and Key
Material Destruction (Destruction Timing) Material Destruction (Destruction Timing)
FCS_CKM_EXT.4(b) Cryptographic Key and Key FCS_CKM_EXT.4(b) Cryptographic Key and Key
Material Destruction (Power Management) Material Destruction (Power Management)
FCS_CKM_EXT.6 Cryptographic Key Destruction FCS_CKM_EXT.6 Cryptographic Key Destruction
Types Types
FCS_COP.1(a) Cryptographic Operation (Signature FCS_COP.1(a) Cryptographic Operation (Signature
Verification) Verification)
FCS_COP.1(b) Cryptographic Operation (Hash FCS_COP.1(b) Cryptographic Operation (Hash
Algorithm) Algorithm)
FCS_COP.1(c) Cryptographic Operation (Message FCS_COP.1(c) Cryptographic Operation (Message
Authentication) Authentication)
FCS_COP.1(d) Cryptographic Operation (Key FCS_COP.1(d) Cryptographic Operation (Key
Wrapping) Wrapping)
FCS_COP.1(f) Cryptographic Operation (AES Data FCS_COP.1(f) Cryptographic Operation (AES Data
Encryption/Decryption) Encryption/Decryption)
FCS_KDF_EXT.1 Cryptographic Key Derivation FCS_KDF_EXT.1 Cryptographic Key Derivation
PP SAR ST SAR
Basic Functional Specification (ADV_FSP.1) ADV_FSP.1 Basic functional specification
Operational User Guidance (AGD_OPE.1) AGD_OPE.1: Operational user guidance
Preparative Procedures (AGD_PRE.1) AGD_PRE.1: Preparative procedures
Labeling of the TOE (ALC_CMC.1) ALC_CMC.1 Labelling of the TOE
TOE CM Coverage (ALC_CMS.1) ALC_CMS.1 TOE CM coverage
Independent Testing – Sample (ATE_IND.1) ATE_IND.1 Independent testing - sample
Vulnerability Survey (AVA_VAN.1) AVA_VAN.1 Vulnerability survey
Conformance Claims (ASE_CCL.1) ASE_CCL.1 Conformance Claims
Extended Components Definition (ASE_ECD.1) ASE_ECD.1 Extended Components Definition
ST Introduction (ASE_INT.1) ASE_INT.1 ST Introduction
Security Objectives for the Operational ASE_OBJ.1 Security Objectives for the
Environment (ASE_OBJ.1) Operational Environment
Stated Security Requirements (ASE_REQ.1) ASE_REQ.1 Stated Security Requirements
Security Problem Definition (ASE_SPD.1) ASE_SPD.1 Security Problem Definition
TOE Summary Specification (ASE_TSS.1) ASE_TSS.1 TOE Summary Specification
Testing is performed to confirm the functionality described in the TSS as well as the operational
guidance documentation. The focus of the testing is to confirm that the requirements specified in the
SFRs are being met.
The evaluator should consult Appendix B FDE Equivalency Considerations when determining the
appropriate strategy for testing multiple variations or models of the TOE that may be under evaluation.
The SFR-related Evaluation Activities in the SD identify the specific testing activities necessary to verify
compliance with the SFRs. The tests identified in these other Evaluation Activities constitute a sufficient
set of tests for the purposes of meeting ATE_IND.1.2E. It is important to note that while the Evaluation
Activities identify the testing that is necessary to be performed, the evaluator is responsible for ensuring
that the interfaces are adequately tested for the security functionality specified for each SFR.
Evaluation Activity:
The evaluator received the TOE from the vendor and confirmed that it conforms with the hardware,
configuration and firmware describe in the ST.
Evaluation Activity:
The evaluator shall examine the TOE to determine that it has been installed properly and is in a known
state.
The evaluator received the TOE from the vendor and powered it on. The evaluator confirmed it presented
no errors and entered a running state. The evaluator performed a version and model verification activity
prior to testing.
Evaluation Activity:
The evaluator shall prepare a test plan that covers all of the testing actions for ATE_IND.1 in the CEM
and in the SFR-related Evaluation Activities. While it is not necessary to have one test case per test
listed in an Evaluation Activity, the evaluator must show in the test plan that each applicable testing
requirement in the SFR-related Evaluation Activities is covered.
The test plan identifies the platforms to be tested, and for any platforms not included in the test plan but
included in the ST, the test plan provides a justification for not testing the platforms. This justification
must address the differences between the tested platforms and the untested platforms, and make an
argument that the differences do not affect the testing to be performed. It is not sufficient to merely
assert that the differences have no affect; rationale must be provided. If all platforms claimed in the ST
are tested, then no rationale is necessary.
The test plan describes the composition and configuration of each platform to be tested, and any setup
actions that are necessary beyond what is contained in the AGD documentation. It should be noted that
the evaluator is expected to follow the AGD documentation for installation and setup of each platform
either as part of a test or as a standard pre-test condition. This may include special test drivers or tools.
For each driver or tool, an argument (not just an assertion) should be provided that the driver or tool
will not adversely affect the performance of the functionality by the TOE and its platform. This also
includes the configuration of any cryptographic engine to be used (e.g. for cryptographic protocols
being evaluated).
The test plan identifies high-level test objectives as well as the test procedures to be followed to achieve
those objectives, and the expected results.
The test report (which could just be an updated version of the test plan) details the activities that took
place when the test procedures were executed, and includes the actual results of the tests. This shall be
a cumulative account, so if there was a test run that resulted in a failure, so that a fix was then installed
and then a successful re-run of the test was carried out, then the report would show a “fail” result
followed by a “pass” result (and the supporting details), and not just the “pass” result2.
2
It is not necessary to capture failures that were due to errors on the part of the tester or test environment.
The intention here is to make absolutely clear when a planned test resulted in a change being required
The test plan laid out a subset of all instances of the TOE in the evaluation to be tested. Similar instances
of the TOE were grouped together based on similar form factor, standard, type of storage memory and
firmware. When an instance or instances of the TOE were not tested justification was provided in the test
report via equivalency rationale.
The test report lists each instance of the TOE tested for each SFR and details it as defined in the ST. The
test report also shows configuration performed on the TOE to place it into CC compliant mode as
described in guidance.
The test plan established and set of procedures to follow with steps and configuration necessary to achieve
the expected result.
The test report describes in detail the activities the evaluator performed along with actual results in the
form of evidence to accomplish each test. Each test account in accompanied by a test result in the form of
‘pass’ or ‘fail’. The test report also establishes an overall result for the cumulative test activities stated by
a ‘pass’ or ‘fail’.
to the originally specified test configuration in the test plan, to the evaluated configuration identified in
the ST and operational guidance, or to the TOE itself.
Representative
Product Name Model Numbers Firmware
Model
Nytro 3730 SSD, 7mm, SAS Interface XS1600ME10023 7539 XS1600ME10023
XS800ME10023
XS400ME10023
Nytro 3530 SSD, 7mm, SAS Interface XS6400LE70023 7539
XS1600LE10023
Nytro 3330 SSD, 7mm, SAS Interface XS1920SE10123 7539
Nytro 3130 SSD, 7mm, SAS Interface XS3840TE10023 7539
Nytro 3730 SSD, 15mm, SAS Interface XS3200ME70023 7539
Nytro 3330 SSD, 15mm, SAS Interface XS15360SE70123 7539
Nytro 3130 SSD, 15mm, SAS Interface XS15360TE70023 7539
XS7680TE70023
Exos 15E900, 2.5-Inch, 15K-RPM, SAS Interface ST900MP0166 CK10 ST900MP0166
ST600MP0156
Exos 15E900, 2.5-Inch, 15K-RPM, SAS Interface ST900MP0126 CKF1 ST900MP0126
ST600MP0026
FireCuda 2.5", SATA Interface (Hybrid) ST2000LX003 SSM1 ST2000LX003
ST1000LX017
BarraCuda 2.5", SATA Interface ST2000LM010 SDM2 ST2000LM010
ST1000LM038
ST500LM033
BarraCuda Pro 2.5", SATA Interface ST1000LM050 SDM2 ST1000LM050
ST500LM035
Exos 10E2400, 2.5-Inch, 10K-RPM, SAS Interface ST1200MM0069 CSF2 ST1200MM0069
Exos 10E2400, 2.5-Inch, 10K-RPM, SAS Interface ST2400MM0149 CS10 ST2400MM0149
ST1800MM0149
ST1200MM0149
Exos X10, 3.5-inch, 7K-RPM, SAS Interface ST10000NM0246 CT10 ST10000NM0246
Exos X10, 3.5-inch, 7K-RPM, SAS Interface ST10000NM0236 CT12 ST10000NM0236
Exos X10, 3.5-inch, 7K-RPM, SATA Interface ST10000NM0186 CT14 ST10000NM0186
Exos X10, 3.5-inch, 7K-RPM, SATA Interface ST10000NM0176 CTF1 ST10000NM0176
XS1600ME10023
ST10000NM0246
ST10000NM0236
ST10000NM0186
ST10000NM0176
ST1200MM0069
ST2400MM0149
ST2000DM011
ST2000LM010
ST1000LM050
ST900MP0166
ST900MP0126
ST2000LX003
Firmware
800-90 DRBG 1.0 (Firmware) X X X X
ARMv7 AES in Firmware 3.0 (Firmware) X X X X X X X X X X X X X
ARMv7 AES Key Wrap in Firmware 1.0 (Firmware) X X X X X X X X X X X X X
ARMv7 GCM in Firmware 1.0 (Firmware) X X X X
ARMv7 GCM in Firmware 2.0 (Firmware) X X X X X X X X X
ARMv7 HMAC in Firmware 4.0 (Firmware) X X X X
ARMv7 HMAC in Firmware 5.0 (Firmware) X X X X X X X X X
ARMv7 RSA in Firmware 5.0 (Firmware) X X X X
ARMv7 RSA in Firmware 5.1 (Firmware) X X X X X X X X X
ARMv7 SHS in Firmware 3.0 (Firmware) X X X X
ARMv7 SHS in Firmware 5.0 (Firmware) X X X X X X X X X
Hash_Based DRBG 2.0 (Firmware) X X X X X X X X X
Balto AES in Hardware X
Balto HMAC in Hardware X
Balto RSA in Hardware X
Balto SHA in Hardware X
Cheops AES in Hardware (cert #4279) X X X X X X
ST10000NM0246
ST10000NM0236
ST10000NM0186
ST10000NM0176
ST1200MM0069
ST2400MM0149
ST2000DM011
ST2000LM010
ST1000LM050
ST900MP0166
ST900MP0126
ST2000LX003
Firmware
Cheops AES in Hardware (cert #3758) X X X X X X
Cheops HMAC in Hardware (cert #2815) X X X X X X
Cheops HMAC in Hardware (cert #2460) X X X X X X
Cheops RSA in Hardware X X X X X X
Cheops SHA in Hardware (cert #3515) X X X X X X
Cheops SHA in Hardware (cert #3128) X X X X X X
Myna AES in Hardware X X X X X X
Myna HMAC in Hardware X X X X X X
Myna RSA in Hardware X X X X X X
Myna SHA in Hardware X X X X X X
Table 21 summarizes the correspondence between each cryptographic implementation and the certificate information required by NIAP
Policy #5. Column CAVP List provides links to each applicable CAVP Validation List. Column Cert identifies the CAVP certificate
applicable to each implementation. Column Capabilities reproduces the information relevant to NIAP Policy #5 from the CAVP
certificate. Some capabilities list dependencies on other CAVP certificates. Table 21 reproduced such dependencies in column Depend.
Column ‘Depend Met?’ records a check of the dependencies. Column
All Seagate SEDs in the evaluation run firmware on ARM processors, which is consistent with the operational environments identified
on the firmware CAVP certificates. Balto, Cheops, and Myna are hardware cryptographic implementations. CAVP does not list
operational environments for hardware implementations.
The evaluator found the CAVP certificates identified in [ST] are sufficient to satisfy NIAP Policy #5.
CAVP Depend
Implementation Environment Capabilities List Cert Depend
Met?
800-90 DRBG 1.0 (Firmware) ARM Cortex-R Family Hash based: DRBG #62 SHS #1225 Yes
Modes: SHA-256
ARMv7 AES in Firmware 3.0 ARM Cortex-R Family AES-CBC: AES #1343 None Yes
(Firmware) Modes: Decrypt, Encrypt
Key Lengths: 128, 256 (bits)
ARMv7 AES Key Wrap in Firmware ARM Cortex-R Family AES KW: AES #2947 AES #1343 Yes
1.0 (Firmware) Modes: Decrypt, Encrypt
CIPHK transformation
direction: Forward
Key Lengths: 256 (bits)
Plain Text Lengths: 128, 192,
256, 320, 4096 (bits)
ARMv7 GCM in Firmware 1.0 ARM Cortex-R Family AES-GCM: AES #2804 AES #1343 Yes
(Firmware) Modes: Decrypt, Encrypt
Key Lengths: 128, 256 (bits)
Tag Lengths: 128 (bits)
Plain Text Lengths: 0, 8, 24,
128, 256 (bits)
AAD Lengths: 0, 8, 24, 128,
256 (bits)
96 bit IV supported
Other IV Lengths supported
ARMv7 GCM in Firmware 2.0 ARM Cortex-R Family AES-GCM: AES #2841 AES #1343 Yes
(Firmware) Modes: Decrypt, Encrypt
Key Lengths: 128, 256 (bits)
Tag Lengths: 128 (bits)
Plain Text Lengths: 0, 8, 24,
256 (bits)
AAD Lengths: 0, 8, 24, 256
(bits)
While vulnerability analysis is inherently a subjective activity, a minimum level of analysis can be
defined and some measure of objectivity and repeatability (or at least comparability) can be imposed
on the vulnerability analysis process. In order to achieve such objectivity and repeatability it is
important that the evaluator follows a set of well-defined activities, and documents their findings so
others can follow their arguments and come to the same conclusions as the evaluator. While this does
not guarantee that different evaluation facilities will identify exactly the same type of vulnerabilities or
come to exactly the same conclusions, the approach defines the minimum level of analysis and the scope
of that analysis, and provides Certification Bodies a measure of assurance that the minimum level of
analysis is being performed by the evaluation facilities.
In order to meet these goals some refinement of the AVA_VAN.1 CEM work units is needed. The
following table indicates, for each work unit in AVA_VAN.1, whether the CEM work unit is to be
performed as written, or if it has been clarified by an Evaluation Activity. If clarification has been
provided, a reference to this clarification is provided in the table.
Table 22 SD Table 2. Mapping of AVA_VAN.1 CEM Work Units to Evaluation Activities
Because of the level of detail required for the evaluation activities, the bulk of the instructions are
contained in Appendix A, while an “outline” of the assurance activity is provided below.
The developer shall provide documentation identifying the list of software and hardware components
that compose the TOE. Hardware components apply to all systems claimed in the ST, and should identify
at a minimum the processors used by the TOE. Software components include any libraries used by the
TOE, such as cryptographic libraries. This additional documentation is merely a list of the name and
version number of the components, and will be used by the evaluators in formulating hypotheses during
their analysis.
The evaluator shall examine the documentation outlined below provided by the vendor to confirm that
it contains all required information. This documentation is in addition to the documentation already
required to be supplied in response to the EAs listed previously.
In addition to the activities specified by the CEM in accordance with Table 2 above, the evaluator shall
perform the following activities.
The evaluator formulates hypotheses in accordance with process defined in Appendix A.1. The evaluator
documents the flaw hypotheses generated for the TOE in the report in accordance with the guidelines
in Appendix A.3. The evaluator shall perform vulnerability analysis in accordance with Appendix A.2.
The results of the analysis shall be documented in the report according to Appendix A.3.
The evaluators searched public sources of vulnerability information in accordance with [CPP FDE EE
SD] section A.1.1 Type 1 Hypotheses — Public-Vulnerability-based. Sections 3.6.2.2.1.1, 3.6.2.2.1.3, and
3.6.2.2.1.4 below list the identifiers of potential vulnerabilities returned by the searches. None of the
hypotheses in [CPP FDE EE SD] A.1.2 Type 2 Hypotheses — iTC-Sourced apply to the Seagate Secure
TCG SSC Self-Encrypting Drives TOE.
The evaluators examined the identified flaw hypotheses as documented in sections 3.6.2.2.1 and 3.6.2.2.2
below. The examination did not find any residual vulnerabilities in the Seagate Secure TCG SSC Self-
Encrypting Drives TOE.
Search
Search Term NVD Link Disposition Residual
Date
1/30/2018 Seagate CVE-2018-5347 Unrelated technology: Media Server No
1/30/2018 Seagate CVE-2015-7269 See Disposition: Precluded by CPP FDE EE No
1/30/2018 Seagate CVE-2015-7268 See Disposition: Precluded by CPP FDE EE No
1/30/2018 Seagate CVE-2015-7267 See Disposition: Precluded by CPP FDE EE No
1/30/2018 Seagate CVE-2013-6924 Unrelated technology: network attached storage devices No
1/30/2018 Seagate CVE-2014-8686 Unrelated technology: network attached storage devices No
1/30/2018 Seagate CVE-2014-8684 Unrelated technology: network attached storage devices No
1/30/2018 Seagate CVE-2014-8687 Unrelated technology: network attached storage devices No
1/30/2018 Seagate CVE-2015-2876 Unrelated technology: wireless storage devices No
1/30/2018 Seagate CVE-2015-2875 Unrelated technology: wireless storage devices No
1/30/2018 Seagate CVE-2015-2874 Unrelated technology: wireless storage devices No
Search US-Cert
Search Term Disposition Residual
Date Link
2/7/2018 Seagate 903500 Duplicate: CVE-2015-2874 CVE-2015-2875 CVE-2015-2876 No
2/7/2018 Seagate 515283 Duplicate: CVE-2012-2568 No
2/7/2018 Seagate 403307 Unrelated technology: Crystal Reports No
2/7/2018 Seagate 964064 Unrelated product: BIOS or host controller (Seagate found issue) No
2/7/2018 Seagate Secure TCG Opal SSC None No results found No
2/7/2018 Seagate Secure TCG Enterprise SSC None No results found No
2/7/2018 ARMv7 None No results found No
2/7/2018 ARM Cortex-R None No results found No
2/7/2018 ARM Processor 649219 Unrelated technology: Intel CPU hardware No
2/7/2018 800-90 DRBG 1.0 Firmware None No results found No
2/7/2018 ARMv7 AES in Firmware None No results found No
2/7/2018 ARMv7 AES Key Wrap in Firmware None No results found No
2/7/2018 ARMv7 GCM in Firmware None No results found No
2/7/2018 ARMv7 HMAC in Firmware None No results found No
2/7/2018 ARMv7 RSA in Firmware None No results found No
2/7/2018 ARMv7 SHS in Firmware None No results found No
2/7/2018 Hash_Based DRBG 2.0 Firmware None No results found No
2/7/2018 Balto None No results found No
2/7/2018 Cheops None No results found No
2/7/2018 Myna None No results found No
2/7/2018 drive encryption 821865 Unrelated technology: CREDANT Mobile Guardian Shield No
2/7/2018 drive encryption 437385 Unrelated technology: PaperThin CommonSpot content management No
system
2/7/2018 drive encryption 582497 Unrelated technology: Android applications No
2/7/2018 disk encryption 166743 Unrelated technology: Das U-Boot boot loader No
2/7/2018 disk encryption 900031 Unrelated technology: Faircom c-treeACE database No