Seagate ST33000651SS Constellation ES (.1) SATA Product Manual - Page 36

About FIPS

Page 36 highlights

4.0 About FIPS The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. Government Computer Security Standard used to accredit cryptographic modules. It is titled 'Security Requirements for Cryptographic Modules (FIPS PUB 140-2)' and is issued by the National Institute of Standards and Technology (NIST). Purpose This standard specifies the security requirements that will be satisfied by a cryptographic module utilized within a security system protecting sensitive but unclassified information. The standard provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3 and Level 4. These levels are intended to cover the wide range of potential applications and environments in which cryptographic modules may be employed. Seagate Enterprise SEDs The SEDs referenced in this Product Manual have been validated by CMVP and have been thoroughly tested by a NVLAP accredited lab to satisfy FIPS 140-2 Level 2 requirements. In order to operate in FIPS Approved Mode of Operation, these SEDs require security initialization. For more information, refer to 'Security Rules' section in the 'Security Policy' document uploaded on the NIST website. To reference the product certification visit - http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm and search for "Seagate". Level 2 security Security Level 2 enhances the physical security mechanisms of a Security Level 1 cryptographic module by adding the requirement for tamper-evidence, which includes the use of tamper-evident coatings or seals on removable covers of the module. Tamper-evident coatings or seals are placed on a cryptographic module so that the coating or seal must be broken to attain physical access to the critical security parameters (CSP) within the module. Tamper-evident seals are placed on covers to protect against unauthorized physical access. In addition Security Level 2 requires, at a minimum, role-based authentication in which a cryptographic module authenticates the authorization of an operator to assume a specific role and perform a corresponding set of services.. Figure 6. Example of FIPS tamper evidence labels. Note. Does not represent actual drive. 30 Constellation ES Serial ATA Product Manual, Rev. D

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56

30
Constellation ES Serial ATA Product Manual, Rev. D
4.0
About FIPS
The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. Government Computer Secu-
rity Standard used to accredit cryptographic modules. It is titled 'Security Requirements for Cryptographic Mod-
ules (FIPS PUB 140-2)' and is issued by the National Institute of Standards and Technology (NIST).
Purpose
This standard specifies the security requirements that will be satisfied by a cryptographic module utilized within
a security system protecting sensitive but unclassified information. The standard provides four increasing,
qualitative levels of security: Level 1, Level 2, Level 3 and Level 4. These levels are intended to cover the wide
range of potential applications and environments in which cryptographic modules may be employed.
Seagate Enterprise SEDs
The SEDs referenced in this Product Manual have been validated by CMVP and have been thoroughly tested
by a NVLAP accredited lab to satisfy FIPS 140-2 Level 2 requirements. In order to operate in FIPS Approved
Mode of Operation, these SEDs require security initialization. For more information, refer to 'Security Rules'
section in the 'Security Policy' document uploaded on the NIST website. To reference the product certification
visit -
roups/STM/cmvp/documents/140-1/1401vend.htm
and search for "Seagate".
Level 2 security
Security Level 2 enhances the physical security mechanisms of a Security Level 1 cryptographic module by
adding the requirement for tamper-evidence, which includes the use of tamper-evident coatings or seals on
removable covers of the module. Tamper-evident coatings or seals are placed on a cryptographic module so
that the coating or seal must be broken to attain physical access to the critical security parameters (CSP)
within the module. Tamper-evident seals are placed on covers to protect against unauthorized physical access.
In addition Security Level 2 requires, at a minimum, role-based authentication in which a cryptographic module
authenticates the authorization of an operator to assume a specific role and perform a corresponding
set
of
services..
Figure 6. Example of FIPS tamper evidence labels.
Note.
Does not represent actual drive.