Module Specification; Table 1 - Security Level Per - Oracle StorageTek T10000D Manual

Non-proprietary security policy
Table of Contents

Advertisement

2.2 Module Specification

The StorageTek T10000D Tape Drive is validated at the FIPS 140-2 section
levels shown in Table 1 for all FIPS-Approved modes of operation.
The StorageTek T10000D Tape Drive is a hardware cryptographic module with a
multi-chip standalone physical embodiment as defined by FIPS 140-2.
primary purpose of this device is to provide FIPS 140-2 Level 1 security to data
being stored on magnetic tape. The cryptographic boundary of the StorageTek
T10000D Tape Drive is defined by the tape drive's commercial-grade, metallic
enclosure.
The module provides several FIPS-Approved modes of operation that each meet
overall Level 1 FIPS 140-2 requirements specified in Table 1 above. The module
also provides one Mixed mode of operation. Each of the Approved modes and
the Mixed mode are described in the sections below. Cryptographic security
functions and services available in each of the defined modes are specified in the
appropriate sections of this Security Policy. Additional information on each
operational mode of the module, including their invocation, is provided in Section
3 (Secure Operation).
2.2.1 Permanent Encryption Approved Mode
The Permanent Encryption Approved Mode or Permanent Encryption Mode is the
first FIPS-Approved mode of operation provided by the StorageTek T10000D
Tape Drive. This mode provides secure encryption and decryption of data stored
on magnetic tape, using the 256-bit AES cryptographic algorithm.
6
EMI/EMC – Electromagnetic Interference / Electromagnetic Compatibility
This document may be freely reproduced and distributed whole and intact including this Copyright notice.
Table 1 – Security Level per FIPS 140-2 Section
Section
Section Title
1
Cryptographic Module Specification
2
Cryptographic Module Ports and Interfaces
3
Roles, Services, and Authentication
4
Finite State Model
5
Physical Security
6
Operational Environment
7
Cryptographic Key Management
6
8
EMI/EMC
9
Self-tests
10
Design Assurance
11
Mitigation of Other Attacks
© Copyright 2017 Oracle Corporation
Level
1
1
1
1
1
N/A
1
1
1
1
N/A
The
While
Page 11 of 51

Advertisement

Table of Contents
loading

Table of Contents