Seagate ST9500421AS Seagate Secure™ Technology Enables Robust Securi - Page 4

Trusted Send/Receive Command Set, Secure Partitions, Issuance Protocol

Page 4 highlights

Seagate Secure™ Technology Enables Robust Security Within the Hard Drive including encryption, hashing, secure storage, decryption, digital signature and random number generating functions. Trusted Send/Receive Command Set Extending trust to storage requires a secure communication infrastructure. For that reason, another critical element of Seagate Secure technology is the trusted send/receive (in/ out) command set specification, designed in collaboration with the standards bodies that define ATA and SCSI interfaces. Secure Partitions A 200-GB hard drive reserves roughly 200 MB for internal system memory. Seagate Secure technology uses this space to create secure partitions that are both logically and physically separated from the rest of the drive memory, with strong conditional access controls-providing an excellent place to store cryptographic keys. Seagate Secure-equipped drives can make these secure partitions exclusively available to applications that present the proper credentials. ISVs can make use of this capability to build strong authentication functions into their applications. Issuance Protocol Software applications, basic input/output systems and other programs interoperate with a Seagate Secure-equipped drive through strictly controlled communication channels. ISVs and developers can write applications and have them assigned to a secure partition in the drive through the issuance protocol. Anytime the application attempts to access those secure resources, it must present its credentials-given under the issuance protocol-to the administrator function in the drive. The administrator function authenticates the application, activates the appropriate secure partition, and thus allows the application to interact with the secure partition through the trusted send/ receive command set specification. Meeting Compliance Needs In recent years, government regulations have emerged that set strict requirements for the ways in which organizations manage and protect business and personal information. Seagate Secure technology helps companies address compliance issues by providing a simple, effective way to secure stored data through strong encryption and authentication. Encryption is recognized as a best practice against theft or loss of private data. In the United States, implementing effective data encryption can provide safe harbor from state and federal requirements for public disclosure of a data breach. The Trusted Computing Group The Trusted Computing Group (TCG) is a not-for-profit industry organization formed to develop, define and promote open standards for hardware-enabled trusted computing and security technologies. Seagate presented the Seagate Secure technology to TCG as the basis for extending trust and security to storage devices. This led to the formation of the Storage Work Group that includes all leading disk drive manufacturers as well as vendors of flash storage, storage management and storage integration. The Storage Work Group is developing the Core Storage Specification that will enable secure storage solutions to protect data and interoperate with trusted systems. The primary goal is to help users protect information assets such as data, passwords, and encryption keys from attack and theft. The Core Storage Specification is currently being finalized for publication and future Seagate Secure-enabled products will comply with the open standard. Seagate chairs the Storage Work Group is actively contributing to the standardization effort. Seagate Secure-Enabled Products As the world's largest hard drive supplier, Seagate can deliver a broad range of Seagate Secure security solutions through original equipment manufacturers (OEMs), system builders, integrators and software partners. Today, Seagate offers two product lines that feature Seagate Secure technology: the Momentus 5400 FDE drive for notebook computers, the first hard drive with full disk encryption, and the DB35 Series drive for digital video recorders (see Figure 4

  • 1
  • 2
  • 3
  • 4
  • 5

including encryption, hashing, secure storage,
decryption, digital signature and random number
generating functions.
Trusted Send/Receive Command Set
Extending trust to storage requires a secure
communication infrastructure. For that reason,
another critical element of Seagate Secure
technology is the trusted send/receive (in/
out) command set specification, designed in
collaboration with the standards bodies that
define ATA and SCSI interfaces.
Secure Partitions
A 200-GB hard drive reserves roughly 200 MB
for internal system memory. Seagate Secure
technology uses this space to create secure
partitions that are both logically and physically
separated from the rest of the drive memory, with
strong conditional access controls—providing
an excellent place to store cryptographic keys.
Seagate Secure-equipped drives can make
these secure partitions exclusively available to
applications that present the proper credentials.
ISVs can make use of this capability to build strong
authentication functions into their applications.
Issuance Protocol
Software applications, basic input/output
systems and other programs interoperate with a
Seagate Secure-equipped drive through strictly
controlled communication channels. ISVs and
developers can write applications and have them
assigned to a secure partition in the drive through
the issuance protocol. Anytime the application
attempts to access those secure resources, it
must present its credentials—given under the
issuance protocol—to the administrator function in
the drive. The administrator function authenticates
the application, activates the appropriate secure
partition, and thus allows the application to interact
with the secure partition through the trusted send/
receive command set specification.
Meeting Compliance Needs
In recent years, government regulations have
emerged that set strict requirements for the
ways in which organizations manage and protect
business and personal information. Seagate
Secure technology helps companies address
compliance issues by providing a simple, effective
way to secure stored data through strong
encryption and authentication. Encryption is
recognized as a best practice against theft or loss
of private data. In the United States, implementing
effective data encryption can provide safe harbor
from state and federal requirements for public
disclosure of a data breach.
The Trusted Computing Group
The Trusted Computing Group (TCG) is a
not-for-profit industry organization formed to
develop, define and promote open standards
for hardware-enabled trusted computing and
security technologies. Seagate presented the
Seagate Secure technology to TCG as the
basis for extending trust and security to storage
devices. This led to the formation of the Storage
Work Group that includes all leading disk drive
manufacturers as well as vendors of flash storage,
storage management and storage integration.
The Storage Work Group is developing the Core
Storage Specification that will enable secure
storage solutions to protect data and interoperate
with trusted systems. The primary goal is to help
users protect information assets such as data,
passwords, and encryption keys from attack
and theft. The Core Storage Specification is
currently being finalized for publication and
future Seagate Secure-enabled products will
comply with the open standard. Seagate chairs
the Storage Work Group is actively contributing
to the standardization effort.
Seagate Secure-Enabled Products
As the world’s largest hard drive supplier, Seagate
can deliver a broad range of Seagate Secure
security solutions through original equipment
manufacturers (OEMs), system builders,
integrators and software partners.
Today, Seagate offers two product lines that
feature Seagate Secure technology: the Momentus
5400 FDE drive for notebook computers, the first
hard drive with full disk encryption, and the DB35
Series drive for digital video recorders (see Figure
Seagate Secure
Technology Enables
Robust Security Within the Hard Drive
4