Certification Report Version 2.0 1 February 2019 CSA_CC_17002 for DiskCrypt M100 (Enterprise) ID: 9910-8000-1239 Version: M253P15AO206 From ST Electronics (Info-Security) Pte Ltd Ce ifica ion Repo Ve ion 2.0 Page 2 Thi page i lef blank in en ionall Ce ifica ion Repo Ve ion 2.0 Page 3 F Singapo e i a Common C i e ia Ce ifica e A ho i ing Na ion, nde he Common C i e ia Recogni ion A angemen (CCRA). The c en li of igna o na ion and app o ed ce ifica ion cheme can be fo nd a he CCRA po al: h p :// .commonc i e iapo al.o g The Singapo e Common C i e ia Scheme (SCCS) i e abli hed o p o ide a co effec i e egime fo he info-comm nica ion echnolog (ICT) ind o e al a e and ce if hei IT p od c again he eq i emen of he Common C i e ia fo Info ma ion Technolog Sec i E al a ion (CC), Ve ion 3.1 (ISO/IEC 15408) and Common Me hodolog fo Info ma ion Technolog Sec i E al a ion (CEM) Ve ion 3.1 (ISO/IEC 18045) in Singapo e. The SCCS i o ned and managed b he Ce ifica ion Bod (CB) nde he ambi of C be Sec i Agenc of Singapo e (CSA). The SCCS ce ifica ion ignifie ha he a ge of e al a ion (TOE) nde e al a ion ha been a e ed and fo nd o p o ide he pecified IT ec i a ance. Ho e e , ce ifica ion doe no g a an ee ab ol e ec i and ho ld al a be ead i h he pa ic la e of h ea o gh o be add e ed and a mp ion made in he p oce of e al a ion. Thi ce ifica ion i no an endo emen of he p od c . Ce ifica ion Repo Ve ion 2.0 Page 4 Amendment Record V D C 1.0 23 J l 2018 Relea ed 2.0 1 Feb a 2019 Co e ed nde CCRA NOTICE The C be Sec i Agenc of Singapo e make no a an of an kind i h ega d o hi ma e ial and hall no be liable fo e o con ained he ein o fo inciden al o con eq en ial damage in connec ion i h he e of hi ma e ial. Ce ifica ion Repo Ve ion 2.0 Page 5 Executive Summary Thi epo i in ended o a i he end- e of he p od c in de e mining he i abili of he p od c in hei deplo ed en i onmen . The Ta ge of E al a ion (TOE) i Di kC p M100 (En e p i e) ID: 9910-8000- 1239, Ve ion: M253P15AO206. I i a po able USB enc p ed o age de ice and ha nde gone he CC ce ifica ion p oced e a he Singapo e Common C i e ia Scheme (SCCS). The TOE comp i e he follo ing componen : o Di kC p M100 (En e p i e) o Di kC p M100 Admini a o G ide, Ve ion 1.0.0 (p o ided in PDF fo ma in CD deli e ed i h TOE) o Di kC p M100 U e Man al, I e A (p o ided in ha dcop deli e ed i h TOE) o 2.5 inch SATA ha d di k The TOE i a po able USB enc p ed o age de ice ha p o ide a f ll di k enc p ion/dec p ion f nc ion fo e da a e iding in he 2.5 SATA ha d di k i hin he TOE. The TOE in e ope a e i h an a ho i ed pai ed ma ca d ( ha o e he inp ke ing ma e ial o he ke de i a ion f nc ion fo he Da a Enc p ion Ke DEK). U e m p o ide he pai ed ma ca d and he pin o he ma ca d befo e acce o he e da a i g an ed. The e al a ion of he TOE ha been ca ied o b An Sec i P e L d, a p o i ionall app o ed CC e labo a o , a he a ance le el CC EAL2 and comple ed on 23 J l 2018. The ce ifica ion bod moni o ed each e al a ion o en e a ha moni ed p oced e and in e p e a ion of he c i e ia ha been applied. The Sec i Ta ge [1] i he ba i fo hi ce ifica ion. I i no ba ed on a ce ified P o ec ion P ofile. The Sec i A ance Req i emen (SAR ) a e ba ed en i el on he a ance componen defined in Pa 3 of he Common C i e ia [2]. The TOE mee he a ance eq i emen of EAL 2. The Sec i F nc ional Req i emen (SFR ) ele an fo he TOE a e o lined in chap e 6.2 of he Sec i Ta ge [1].The Sec i Ta ge claim confo mance o CC Pa 2 [3]. The SFR a e implemen ed b he follo ing TOE Sec i F nc ionali : TOE Sec i F nc ionali Iden ifica ion and A hen ica ion Iden ifica ion Each ma ca d i pai ed o a TOE b a Ma chID . The Ma chID i eq i ed fo bo h U e and Admini a o acce . The Ma chID of he ma ca d i e ified again he Ma chID o ed in he TOE. Ce ifica ion Repo Ve ion 2.0 Page 6 U e a e fi eq i ed o in e a pai ed ma ca d con aining he co ec SKM. Upon cce f l iden ifica ion of he ma ca d (Ma chID), he SKM ill be allo ed o be impo ed b he TOE allo ing dec p ion of he da a (Ma e Boo Reco d, file alloca ion able, e c) o enable acce o he e da a in he enc p ed ha d di k. In he e en ha an npai ed ma ca d i in e ed, no acce o he dec p ion/enc p ion f nc ion i allo ed. A hen ica ion Admini a o , imila l , i eq i ed o in e a pai ed ma ca d and a hen ica e cce f ll o he TOE o cce f ll in oke an Admin f nc ion (modifica ion of: Admin PIN, locko mode, DKM, Ma chID) of he TOE. The admini a o i eq i ed o en e a 8-digi PIN o a hen ica e o he TOE. The TOE main ain a co n e of he n mbe of failed con ec i e Admin a hen ica ion a emp . All acce o admini a i e f nc ion ill be blocked af e 8 con ec i e ong PIN en ie . In he e en , ha an npai ed ma ca d i in e ed, onl acce o he Admin f nc ion : ini iali e ma ca d hall be allo ed pon cce f l a hen ica ion. The TOE i al o de igned i h a locko mode fea e. If locko mode i enabled, he TOE a oma icall en e in o an na hen ica ed a e hene e he ma ca d i emo ed. Thi o ld eq i e e o e-pe fo m he a hen ica ion p oce o gain e acce . Thi i enabled b defa l . C p og aphic S ppo The TOE p o ide c p og aphic f nc ion ch a mme ic da a enc p ion/dec p ion and in eg i e ifica ion ing ha h f nc ion . The SKM e ie ed f om he in e ed ma ca d and he DKM ha i o ed in he TOE a e ed a inp o a ke de i a ion f nc ion o gene a e he DEK. The DEK i hen loaded in o he c p og aphic mod le of Ce ifica ion Repo Ve ion 2.0 Page 7 he TOE he e he MBR o file alloca ion able ill be dec p ed and en o he ho PC; he eaf e e ma acce he enc p ed ha d di k of he TOE. The TOE c p og aphic mod le ili e he DEK o pe fo m eal ime da a enc p ion and dec p ion hen da a i an fe ed f om ho machine o enc p ed ha d di k and ice e a. Enc p ion and dec p ion of e da a i pe fo med in acco dance o he c p og aphic algo i hm AES-256 XTS mode. Sec i Managemen The TOE p o ide he follo ing admini a i e f nc ion o he Admini a o : 1) Pai ing of legi ima e ma ca d o TOE 2) Enable/di able he ma ca d locko mode. 3) Change of Admin PIN. 4) DKM injec ion (de ice e p) Op ion 1 enable he Admini a o o pai a ma ca d i h a TOE ing he ma ca d Ma chID a ib e. The ma ca d Ma chID i o ed in he TOE. Op ion 2 enable he Admini a o o enable/di able he locko mode (enabled b defa l ). When locko mode i enabled, he TOE ill en e in o an na hen ica ed a e hene e he ma ca d i emo ed f om he TOE. Op ion 3 enable he Admini a o o change he Admin PIN. The Admin PIN m be 8 digi in leng h and ill be o ed a a ha h (SHA1) i hin he TOE. Op ion 4 enable he Admini a o o injec he DKM (f om he Admini a o ma ca d) in o he TOE d ing de ice e p. The TOE en e in o a hal a e pon he cce f l in oca ion of each of he fo admini a i e f nc ion . The Admini a o i eq i ed o a hen ica e again ho ld he an o in oke an of he admini a i e f nc ion again. Ce ifica ion Repo Ve ion 2.0 Page 8 P o ec ion of he TSF The TOE pe fo m a POST pon e e po e p o pe fo m in eg i check on he MCU, a c i ical b em of he TOE. In he e en of an POST fail e, he TOE ill en e a hal a e. POST incl de he follo ing e : 1) LED Di pla Te 2) Memo Read/W i e Te (incl de MCU in e nal RAM) 3) ROM (EEPROM) In eg i Check 4) SHA-1 Ha h Check The c p og aphic mod le pe fo m a Kno n An e Te (KAT) hene e i i enabled. The TOE pe fo m e oi a ion of all pa ame e (e.g. DEK) pon fail e of he KAT. In he e en of fail e of an of he abo e elf- e , he TOE en e in o a hal and ec e a e, and he ERROR LED ill be ligh ed p. In hi a e, he TOE i non- ope a ional. The TOE i al o ho ed in a ampe e iden ca ing he e an ph ical ampe ing o he TOE can be i all de ec ed. Table 1: TOE Sec i F nc ionali ie Plea e efe o he Sec i Ta ge [1] fo mo e info ma ion. The a e o be p o ec ed b he TOE ha been defined. Ba ed on he e a e , he TOE Sec i P oblem Defini ion ha been defined in e m of A mp ion , Th ea and O gani a ion Policie . The e a e o lined in Chap e 3 of he Sec i Ta ge [1]. Thi Ce ifica ion co e he config a ion of he TOE a o lined in chap e 5.3 of he epo . The ce ifica ion e l onl appl o he e ion of he p od c indica ed in he ce ifica e and on he condi ion ha all he ip la ion a e kep a de ailed in hi Ce ifica ion Repo . Thi ce ifica e applie onl o he pecific e ion and elea e of he IT p od c in i e al a ed config a ion. Thi ce ifica e i no an endo emen of he IT p od c b SCCS, and no a an of he IT p od c b SCCS, i ei he e p e ed o implied. Ce ifica ion Repo Ve ion 2.0 Page 9 Contents 1 CE CA ................................................................................................................10 1.1 PROCEDURE .....................................................................................................................10 1.2 RECOGNITION AGREEMENTS ...........................................................................................10 2 A D E CE CA E ............................................................11 3 DE CA ...............................................................................................................12 4 EC C ............................................................................................................14 5 A A D C E E A A ...........................................................14 5.1 ASSUMPTIONS..................................................................................................................14 5.2 CLARIFICATION OF SCOPE................................................................................................15 5.3 EVALUATED CONFIGURATION..........................................................................................15 5.4 NON-EVALUATED FUNCTIONALITIES...............................................................................15 5.5 NON-TOE COMPONENTS .................................................................................................16 6 A C EC E DE A .................................................................17 7 D C E A ............................................................................................................18 8 D C E .....................................................................................................19 8.1 DEVELOPER TESTING.......................................................................................................19 8.1.1 T A ac , c a a .........................................................................19 8.1.2 T C a ...................................................................................................19 8.1.3 T R ..............................................................................................................20 8.2 EVALUATOR TESTING (ATE_IND)...................................................................................20 8.2.1 T A ac a D ........................................................................................20 8.2.2 T C a ...................................................................................................21 8.2.3 T R ..............................................................................................................21 8.3 PENETRATION TESTING (AVA_VAN)...............................................................................21 9 E E E A A ....................................................................................22 10 B A A D EC E DA E A E E E .....22 11 AC .........................................................................................................................23 12 B B A .................................................................................................................23 Ce ifica ion Repo Ve ion 2.0 Page 10 1 C 1.1 P The ce ifica ion bod cond c he ce ifica ion p oced e acco ding o he follo ing c i e ia: ƒ Common C i e ia fo Info ma ion Technolog Sec i E al a ion, Ve ion 3.1 Re i ion 5 [4] [3] [2]; ƒ Common Me hodolog fo IT Sec i E al a ion (CEM), Ve ion 3.1 Re i ion 5 [5]; and ƒ SCCS cheme p blica ion [6] [7] [8] 1.2 R A The in e na ional a angemen on he m al ecogni ion of ce ifica e ba ed on he Common C i e ia Recogni ion A angemen had been a ified on 2 J l 2014. The a angemen co e ce ifica e i h claim of compliance again collabo a i e p o ec ion p ofile (cPP ) o e al a ion a ance le el (EAL ) 1 h o gh 2 and ALC_FLR. The Common C i e ia Recogni ion A angemen ma k p in ed on he ce ifica e indica e ha hi ce ifica ion i ecogni ed nde he e m of hi ag eemen b all igna o na ion li ed on he CC eb po al (h p:// .commonc i e iapo al.o g). Ce ifica ion Repo Ve ion 2.0 Page 11 2 V C R Thi Ce ifica ion Repo onl applie o he e ion of he TOE a indica ed. The Ce ifica e i alid ill 22 J 20231. In ca e of change o he ce ified e ion of he TOE, he alidi ma be e ended o ne e ion and elea e p o ided he TOE pon o applie fo A ance Con in i (i.e. e-ce ifica ion o main enance) of he e i ed TOE, in acco dance i h he eq i emen of he Singapo e Common C i e ia Scheme (SCCS). The o ne of he Ce ifica e i obliged: ƒ When ad e i ing he Ce ifica e o he fac of he p od c ce ifica ion, o efe o and p o ide he Ce ifica ion Repo , he Sec i Ta ge and e g idance doc men a ion he ein o an c ome of he p od c fo he applica ion and age of he ce ified p od c ; ƒ To info m he SCCS immedia el abo lne abili ie of he p od c ha ha e been iden ified b he de elope o an hi d pa ; and ƒ To info m he SCCS immedia el in he ca e ha ele an ec i change in he e al a ed life c cle ha occ ed o he confiden iali of doc men a ion and info ma ion ela ed o he TOE o e l ing f om he e al a ion and ce ifica ion p oced e he e he ce ifica ion of he p od c ha a med hi confiden iali being main ained, i no longe alid. 1 Certificate validity could be extended by means of assurance continuity. Certificate could also be revoked under the conditions specified in SCCS Publication 3 [8]. Potential users should check the SCCS website (www.csa.gov.sg/programmes/csa-cc-product-list) for the up-to-date status regarding the certificate s validity. Ce ifica ion Repo Ve ion 2.0 Page 12 3 I The Ta ge of E al a ion (TOE) i : D C M100 (E ), ID: 9910-8000-1239, V : M253P15AO206. The follo ing able iden ifie he TOE deli e able : T pe Name Ve ion Fo m of Deli e HW Di kC p M100 ID: 9910-8000- 1239 Ve ion: M253P15AO206 In-ho e co ie fo local deli e i hin Singapo e. T ed co ie deli e fo o e ea deli e DOC Di kC p M100 U e Man al Ha dcop Doc men I e A, Ve ion 2.0 In-ho e co ie fo local deli e i hin Singapo e. T ed co ie deli e fo o e ea deli e HW 2.5 inch SATA ha d di k - In-ho e co ie fo local deli e i hin Singapo e. T ed co ie deli e fo o e ea deli e DOC Di kC p M100 Admini a o G ide Ve ion 1.0.0 PDF fo ma o ed i hin CD o be deli e ed oge he i h TOE. Table 2: Deli e able of he TOE The follo ing Non-TOE componen a e deli e ed oge he i h he TOE: T pe Name Ve ion Fo m of Deli e HW USB 3.0 cable - In-ho e co ie fo local deli e i hin Singapo e. T ed co ie deli e fo o e ea deli e Ce ifica ion Repo Ve ion 2.0 Page 13 SW DMS Sof a e Ve ion 2.4 B n in o a CD and deli e ed oge he i h he TOE. SW AWP Manage Sof a e Ve ion 4.6 B n in o a CD and deli e ed oge he i h he TOE. DOC Di kC p Ke Managemen Sof a e G ide Ve ion 1.0.0 PDF fo ma o ed i hin CD o be deli e ed oge he i h TOE. DOC AWP Manage G ide Ve ion 1.0.0 PDF fo ma o ed i hin CD o be deli e ed oge he i h TOE. Table 3: Non-TOE componen deli e able oge he i h he TOE The g ide fo eceip and accep ance of he abo e men ioned TOE a e de c ibed in chap e 3 of he Admini a i e G idance [9]. Addi ional iden ifica ion info ma ion ele an o hi Ce ifica ion p oced e a follo : TOE Di kC p M100 (En e p i e) ID: 9910-8000-1239 Ve ion: M253P15AO206 Sec i Ta ge Di kC p M100 (En e p i e) Sec i Ta ge V2.0, 6 J l 2018 CC Scheme Singapo e Common C i e ia Scheme (SCCS) Me hodolog Common C i e ia fo Info ma ion Technolog Sec i E al a ion, Ve ion 3.1 Re i ion 5 A ance Le el/cPP EAL 2 De elope ST Elec onic (Info-Sec i ) P e. L d Spon o ST Elec onic (Info-Sec i ) P e. L d E al a ion Facili An Sec i P e. L d Ce ifica ion Bod C be Sec i Agenc of Singapo e (CSA) Ce ifica ion ID CSA_CC_17002 Ce ifica e Validi 23 J 2018 ill 22 J 2023 Ce ifica ion Repo Ve ion 2.0 Page 14 Table 4: Addi ional Iden ifica ion Info ma ion 4 S P The TOE Sec i Polic i e p e ed b he elec ed e of SFR and implemen ed b he TOE. The TOE implemen policie pe aining o he follo ing ec i f nc ional cla e : ƒ Iden ifica ion and A hen ica ion ƒ C p og aphic S ppo ƒ Sec i Managemen ƒ P o ec ion of he TSF Specific de ail conce ning he abo e men ioned ec i policie can be fo nd in chap e 6 of he Sec i Ta ge [1]. 5 A S E 5.1 A The a mp ion defined in he Sec i Ta ge [1] and ome a pec of Th ea and O gani a ional Sec i Policie a e no co e ed b he TOE i elf. The e a pec lead o pecific ec i objec i e o be f lfilled b he TOE en i onmen and a e li ed in he able belo : U age A mp ion De c ip ion OE. ADMIN The TOE e m ope a e he TOE in acco dance o he e g idance doc men a ion. OE.TRUSTED_USER The TOE e m ope a e he TOE in acco dance o he e g idance doc men a ion. Table 5: U age A mp ion En i onmen al A mp ion De c ip ion OE.SMARTCARD The c p og aphic ma ca d ed oge he i h he TOE m confo m o he follo ing: x Sec e Signa e C ea ion De ice P o ec ion P ofile T pe 2 1.04, EAL 4+ x Sec e Signa e C ea ion De ice P o ec ion P ofile T pe 3 Ce ifica ion Repo Ve ion 2.0 Page 15 1.05, EAL 4+ Table 6: En i onmen al A mp ion De ail can be fo nd in ec ion 4.2 of he Sec i Ta ge [1]. 5.2 C S The cope of e al a ion i limi ed o ho e claim made in he Sec i Ta ge [1]. 5.3 E C The e al a ed config a ion i a po able USB enc p ed o age de ice ha p o ide f ll di k enc p ion/dec p ion f nc ion on e da a e iding in he 2.5 SATA ha d di k i hin he TOE. The TOE in e ope a e i h an a ho i ed pai ed e e nal ma ca d ha o e he inp ke ing ma e ial o he ke de i a ion f nc ion fo he Da a Enc p ion Ke (DEK). Al ho gh he SATA ha d di k i con ide ed pa of he TOE, b i elf, i doe no implemen an ec i f nc ion . Sma ca d locko mode i enabled b defa l . Figure 1: Evaluated configuration 5.4 N -E F Po en ial e of he TOE a e ad i ed ha ome f nc ional and e ice ha e no been e al a ed a pa of he e al a ion. Po en ial e of he TOE hall ca ef ll con ide hei eq i emen fo ing f nc ion and e ice o ide of he e al a ed config a ion. The e non-e al a ed f nc ionali ie incl de: ƒ A la e of epo i applied o e he en i e PCB. While i a e ed ha ba ic ampe ing me hod ch a c apping o ld e l in ca ing SKM Ce ifica ion Repo Ve ion 2.0 Page 16 i ible ma k o he epo , no a ance claim e e made. Thi fea e i no mapped o he FPT_PHP.1 defined in he Sec i Ta ge [1]. 5.5 N -TOE The TOE eq i e addi ional componen (i.e. ha d a e/ of a e/fi m a e) fo i ope a ion. The e non-TOE componen incl de: ƒ DCM Sma ca d ƒ Di kC p Ke Managemen Sof a e ƒ AWP Manage Sof a e ƒ Ho Wo k a ion Mo e info ma ion i a ailable in ec ion 1.3.2 of he Sec i Ta ge [1]. Ce ifica ion Repo Ve ion 2.0 Page 17 6 A D I The gene al a chi ec e con i of 4 b em . Figure 2: Subsystems of TOE S D Ke pad The Ke pad b em comp i e he ke pad and CapSen e con olle mod le ha p o ide e he in e face fo inp and a pda e of he TOE. The ke pad b em e en iall p o ide he mean fo e o a hen ica e he ma ca d in e ed b cap ing he e inp PIN and an fe ing i o he ma ca d ia he MCU b em. Admini a o al o in oke admini a i e f nc ion and a hen ica e o he TOE ia he ke pad b em. (SFR- ppo ing b em) MCU The MCU S b em ecei e inp f om he Ke pad S b em and p o ide o p ( a ) h o gh he Ke pad. The MCU b em o ld ecei e and p e en he e inp PIN o he ma ca d o be e ified. Upon cce f l e login, he DEK i fe ched f om he ma ca d and o ed on he MCU RAM mod le befo e being an fe ed o he c p og aphic mod le. The MCU S b em implemen he Ce ifica ion Repo Ve ion 2.0 Page 18 Iden ifica ion and a hen ica ion of e , c p og aphic f nc ion ch a ha hing, elf- e and all of he admini a i e f nc ion . (SFR-Enfo cing b em) Sma ca d The Sma ca d b em ope a e i h a ma ca d ha o e he DEK and Ma chID. Thi b em con i of he ma ca d holde mod le fo bo h e and admini a o o in e hei ma ca d in o he TOE fo login. The ma ca d holde i he in e face h o gh hich TSF da a (DEK, ma chID) i fe ched f om he in e ed ( agged) ma ca d. The fe ched TSF da a i en o he MCU b em fo p oce ing. D ing e login, he MCU e ie e he e PIN f om he ke pad b em and end i o he ma ca d ia he ma ca d holde in e face. The MCU comm nica e i h he ma ca d ia APDU command . (SFR-S ppo ing b em) C p o The C p og aphic b em con i of he c p og aphic mod le, a fla h mod le and he USB o SATA con olle mod le. Upon cce f l e login, he c p o b em i enabled and he c p og aphic mod le ill pe fo m a Kno n An e Te (KAT) o en e co ec f nc ionali . Af e cce f l KAT, he c p og aphic mod le ma p oceed o pe fo m on- he-fl da a enc p ion and dec p ion ope a ion ing AES XTS algo i hm. The DEK i o ed in he in e nal RAM of he c p og aphic mod le. I al o con ain he USB o SATA con olle (B idge) mod le ha i in-b il i hin he c p o Mod le. I p o ide he connec ion be een he Ho PC o he ha d di k d i e (SATA II) ia he c p og aphic mod le. Thi mod le p o ide a comm nica ion link. (SFR-Enfo cing b em) Table 7: S b em of TOE 7 D The e al a ed doc men a ion a e li ed in Table 2: Deli e able of he TOE and i being p o ided i h he p od c o he c ome . The e doc men a ion con ain he eq i ed info ma ion fo ec e age of he TOE in acco dance i h he Sec i Ta ge . The doc men a ion i hipped ec el oge he i h he TOE. Ce ifica ion Repo Ve ion 2.0 Page 19 8 IT P T 8.1 D T 8.1.1 T A , The de elope pe fo med e ing on all SFR ba ed on he e al a ed config a ion. Fo pecific f nc ionali ie i ho TSFI, he de elope ed a e ion of he TOE i ho he epo and connec di ec l o he c p og aphic b em. B le e aging on he Mi cochip IDE and deb gge , he de elope i able o ep h o gh he li e e ec ion of he code . Thi app oach allo ed he de elope o e if he co ec ne of implemen a ion fo e e al f nc ionali ie ch a e oi a ion of pin and ke and en e ing of hal a e hen elf- e ha e failed. The f nc ional pecifica ion ha iden ified he follo ing in e face ke pad, USB (USB Ma S o age Cla B lk-Onl T an po ) and ma ca d (ISO/IEC 7816). The e mapping p o ided b he de elope ho ha he e co e all indi id al TSFI iden ified fo he TOE. An e en ion o hi mapping b he e al a o al o ho ha he TSFI ha e been co e ed i h he de elope e i e. 8.1.2 T C The ba e e p a ed b bo h de elope and e al a o fo he e ing i Figure 3: Basic test configuration A men ioned in he app oach abo e, e ing of ce ain f nc ionali ie i ho an e e nall i ible in e face e e pe fo med ing o he e p . Ce ifica ion Repo Ve ion 2.0 Page 20 Figure 4: Test configuration to test functionalities without externally visible interfaces The TOE ed fo e ing i config ed acco ding o he Di kC p M100 Admini a o G ide Chap e 4 & 5 [9]. 8.1.3 T R The e al a o a able o follo and f ll nde and he de elope e ing app oach b ing he info ma ion p o ided b he de elope . The e al a o anal ed he de elope e ing co e age and he dep h of he e ing b e ie ing all e ca e . The e al a o fo nd he e ing of he TSF o be e en i e and co e ing he TSFI a iden ified in he f nc ional pecifica ion a ell a he b em in e face iden ified in he de ign doc men a ion. The e e l p o ided b he de elope co e ed all ope a ional f nc ion a de c ibed in he Sec i Ta ge [1]. All e e l f om all e ed en i onmen ho ed ha he e pec ed e e l a e iden ical o he ac al e e l . 8.2 E T (ATE_IND) 8.2.1 T A D To gain confidence ha he de elope e ing a fficien o en e he co ec ope a ion of he TOE, he e al a o anal ed he de elope e co e age, e plan and p oced e , e pec ed and ac al e e l . The e al a o epea ed all of he de elope e and e ified he acc ac of he de elope e e l . The e al a o f he de i ed addi ional e ca e fo he TOE: ƒ Ve ifica ion of i ible ign of ampe ing hen an a emp i made o emo e he epo applied o e he PCBA of he TOE ing hea and calpel. ƒ Ve ifica ion of i ible ign of ampe ing hen an a emp i made o emo e he epo applied o e he PCBA of he TOE ing ace one and Ce ifica ion Repo Ve ion 2.0 Page 21 calpel. ƒ Ve ifica ion of i ible ign of ampe ing hen an a emp i made o emo e he ac lic f on panel f om he me al pa of he enclo e. ƒ Ve ifica ion of i ible ign of ampe ing hen an a emp i made o emo e he pla ic ece (fo holding in e nal HDD) i hin he TOE enclo e o e po e he in e nal PCBA. ƒ Ve ifica ion of he co ec implemen a ion of AES-XTS 8.2.2 T C The ame e config a ion a de c ibed in ec ion 8.1.2. 8.2.3 T R The e e e pe fo med p ima il a e al a o i e. None hele , fo a b e of e ca e hich eq i e acce o o ce code, he e e e pe fo med a de elope i e. All of he de elope e e e e ified b he e al a o o confo m o he e pec ed e l f om he e plan. 8.3 P T (AVA_VAN) A lne abili anal i of he TOE a cond c ed in o de o iden if an ob io lne abili in he TOE and o demon a e ha he lne abili ie e e no e ploi able in he in ended en i onmen of he TOE. The gene al app oach fo he lne abili anal i i ba ed on he follo ing: ƒ P blic domain lne abili anal i of he TOE pecific lne abili (bo h ha d a e and of a e); ƒ P blic domain lne abili anal i of he TOE- pe lne abili ie (i.e. lne abili ie ha a e gene ic fo USB enc p ed o age o F ll Di k Enc p ion). ƒ Anal i of he TOE deli e able (ARC, TDS, FSP, AGD e c). The app oach cho en b he e al a o i commen a e i h he a ance componen cho en (AVA_VAN.2) ea ing he e i ance of he TOE o an a ack i h he Ba ic a ack po en ial. The e al a o hen de i ed a ack cena io he e po en ial lne abili ie co ld be e ploi ed. Fo each ch a ack cena io, he fi l pe fo med a heo e ical anal i on he ela ed a ack po en ial. Whe e he a ack po en ial a Ba ic o nea o Ba ic, he e al a o cond c ed pene a ion e fo ch a ack cena io . The eaf e he e al a o anal ed he e l of he e e i h he aim o de e mine, he he a lea one of he a ack cena io i h he a ack po en ial Ba ic a ac all cce f l. A EAL2, he e al a o fo nd no e ploi able lne abili in he TOE hen ope a ed in he e al a ed config a ion. The follo ing co ld be po ible a highe a ack po en ial: ƒ Tampe ing he TOE and/o TOE e ec ing pla fo m in he ab ence of TOE e . Ce ifica ion Repo Ve ion 2.0 Page 22 ƒ S b i ion of legi TOE i h a malicio one. 9 R E The E al a ion Technical Repo (ETR) a p o ided b he CCTL in acco dance i h he CC, CEM and eq i emen of he SCCS. A a e l of he e al a ion, he e dic PASS i confi med fo he follo ing a ance componen : ƒ All componen of he EAL 2 a ance package Thi implie ha he TOE a i fie he ec i eq i emen pecified in he Sec i Ta ge [1]. 10 O TOE The doc men a o lined in able 2 con ain nece a info ma ion abo he age of he TOE and all ec i hin he ein ha e o be con ide ed. In addi ion, all a pec of A mp ion , Th ea and OSP a o lined in he Sec i Ta ge [1] ha no co e ed b he TOE hall be f lfilled b he ope a ional en i onmen of he TOE. Po en ial e of he p od c hall con ide he e l of he ce ifica ion i hin hi /he em i k managemen p oce . A a ack me hod and echniq e e ol e o e ime, he/ he ho ld define he pe iod of ime he eb a e- a e men of he TOE i eq i ed and con e ch eq e o he pon o of he ce ifica e. Thi i e peciall o a he fi m a e of he TOE co ld no be pda ed. The po en ial e i eminded ha he admini a i e fea e ill be blocked pe pe all in he e en he e i 8 con ec i e failed admini a i e login a emp . Thi acce canno be e o ed once blocked. In addi ion, he po en ial e ho ld no e he f nc ionali ie li ed in ec ion 5.4 ha a e no e al a ed and de e mine ha he e e cl ion a e accep able fo hi /he age. Ce ifica ion Repo Ve ion 2.0 Page 23 11 A CCRA Common C i e ia Recogni ion A angemen CC Common C i e ia fo IT Sec i E al a ion CCTL Common C i e ia Te ing Labo a o CSA C be Sec i Agenc of Singapo e CEM Common Me hodolog fo Info ma ion Technolog Sec i E al a ion cPP Collabo a i e P o ec ion P ofile EAL E al a ion A ance Le el ETR E al a ion Technical Repo IKE In e ne Ke E change IT Info ma ion Technolog PP P o ec ion P ofile SAR Sec i A ance Req i emen SCCS Singapo e Common C i e ia Scheme SFP Sec i F nc ion Polic SFR Sec i F nc ional Req i emen ST Sec i Ta ge TOE Ta ge of E al a ion TSF TOE Sec i F nc ionali 12 B [1] ST Electronics (Info-Security), “DiskCrypt M100 (Enterprise) Security Target, Version 2.0, 2018. [2] Common Criteria Maintenance Board (CCMB), “Common Criteria for Information Technology Security Evaluation - Part 3: Security assurance components [Document Number CCMB-2017-04-003], Version 3.1 Revision 5, 2017. [3] Common Criteria Maintenance Board (CCMB), “Common Criteria for Information Technology Security Evaluation - Part 2: Security functional components [Document Numnber CCMB-2017-04-002], Version 3.1 Revision 5, 2017. [4] Common Criteria Maintenance Board (CCMB), “Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and General Model [Document Number CCMB-2017-04-001], Version 3.1 Revision 5, 2017. [5] Common Criteria Maintenance Board (CCMB), “Common Criteria for Information Technology Security Evaluation - Evaluation Methodology [Document Number CCMB- 2017-04-004], Version 3.1 Revision 5, 2017. [6] Cyber Security Agency of Singapore (CSA), “SCCS Publication 1 - Overview of SCCS, Version 5.0, 2018. [7] Cyber Security Agency of Singapore (CSA), “SCCS Publication 2 - Requirements for CCTL, Version 5.0, 2018. [8] Cyber Security Agency of Singapore (CSA), “SCCS Publication 3 - Evaluation and Ce ifica ion Repo Ve ion 2.0 Page 24 Certification, Version 5.0, 2018. [9] ST Electronics (Info-Security), “DiskCrypt M100 Administrator's Guide, Version 1.0.0, 2018. [10] Common Criteria Recognition Arrangement Management Committee, “Operating Procedures - Conducting Shadow Certifications [Document number 2004-07-01], 2017. [11] ST Electronics (Info-Security), “DiskCrypt M100 User Manual, Issue A, Version 2.0, 2018. --------------------------------------------------End of Repo -------------------------------------------------------