Classification: External © Quadient Quadient Postal Security Device Security Policy This document is non-proprietary. It may be reproduced or transmitted only in its entirety without revision. Valid from: 27/11/2024 Version No.: V 1.2 Classification: External Document Name: Security Policy Page 2/28 Content 1. General ...................................................................................................................................................... 5 2. Cryptographic module specification.......................................................................................................... 6 2.1. Overview .......................................................................................................................................... 6 2.2. Excluded Components ..................................................................................................................... 6 2.3. Modes of operation ......................................................................................................................... 6 2.4. Security industry protocols .............................................................................................................. 7 2.5. Security functions............................................................................................................................. 7 2.5.1. Approved Algorithms.......................................................................................................7 2.5.2. Vendor Affirmed Algorithms ...........................................................................................8 2.5.3. Allowed Algorithms .........................................................................................................8 2.5.4. Non-Approved Algorithms...............................................................................................9 2.5.5. Security Function Implementations (SFI) ........................................................................9 2.5.6. Entropy Sources...............................................................................................................9 2.6. Security Rules................................................................................................................................. 10 3. Cryptographic module interfaces............................................................................................................ 10 4. Roles, services, and authentication......................................................................................................... 11 4.1. Roles............................................................................................................................................... 11 4.2. Authentication ............................................................................................................................... 14 4.3. Services .......................................................................................................................................... 15 4.3.1. Approved services .........................................................................................................15 4.3.2. Non-approved services..................................................................................................19 5. Software/Firmware security.................................................................................................................... 19 6. Operational environment........................................................................................................................ 19 7. Physical security ...................................................................................................................................... 19 8. Non-invasive security .............................................................................................................................. 20 9. Sensitive security parameters management........................................................................................... 21 10. Self-tests.................................................................................................................................................. 25 10.1. Pre-operational self-tests............................................................................................................... 25 10.1.1. Firmware integrity test..................................................................................................25 10.1.2. Critical security functions test .......................................................................................25 10.2. Conditional self-tests ..................................................................................................................... 26 10.2.1. Cryptographic Algorithm Self-Tests...............................................................................26 10.3. Periodic self-tests........................................................................................................................... 26 11. Life-cycle assurance................................................................................................................................. 27 11.1. Installation, Initialization, and Startup Procedures........................................................................ 27 11.2. Administrator Guidance................................................................................................................. 27 11.3. Non-Administrator Guidance......................................................................................................... 27 11.4. Design and rules............................................................................................................................. 27 11.5. End of life ....................................................................................................................................... 27 Classification: External Document Name: Security Policy Page 3/28 12. Mitigation of other attacks...................................................................................................................... 28 13. Glossary ................................................................................................................................................... 28 Classification: External Document Name: Security Policy Page 4/28 Figure list Figure 1 – Quadient Postal Security Device....................................................................................................... 6 Table list Table 1: Security Levels...................................................................................................................................... 5 Table 2: Cryptographic Module Tested Configuration....................................................................................... 6 Table 3: Approved Algorithms ........................................................................................................................... 8 Table 4: Vendor Affirmed Algorithms................................................................................................................ 8 Table 5: Allowed Algorithms.............................................................................................................................. 8 Table 6: Non-Approved Algorithms ................................................................................................................... 9 Table 7: Security Function Implementations ..................................................................................................... 9 Table 8: Entropy Source Implementations......................................................................................................... 9 Table 9: Ports and Interfaces........................................................................................................................... 11 Table 10: Roles, Service Commands, Input and Output................................................................................... 13 Table 11: Roles and Authentication................................................................................................................. 14 Table 12: Approved Services............................................................................................................................ 18 Table 13: Physical Security Inspection Guidelines ........................................................................................... 19 Table 14: EFP/EFT............................................................................................................................................ 20 Table 15: SSPs.................................................................................................................................................. 24 Classification: External Document Name: Security Policy Page 5/28 1. General This document describes the security policy of the Quadient Technologies France (Quadient) Postal Security Device under the terms of FIPS 140-3 validation. This document contains a statement of the security rules under which the Quadient Postal Security Device operates. The Quadient Postal Security Device is designed to meet the overall requirements applicable for FIPS 140-3 Security Level 3. Table 1: Security Levels ISO/IEC 24759 Section 6 FIPS 140-3 Section Title Security Level 1 General 3 2 Cryptographic module specification 3 3 Cryptographic module interfaces 3 4 Roles, services, and authentication 3 5 Software/Firmware security 3 6 Operational environment N/A 7 Physical security 3 8 Non-invasive security N/A 9 Sensitive security parameter management 3 10 Self-tests 3 11 Life-cycle assurance 3 12 Mitigation of other attacks 3 Overall Level 3 Classification: External Document Name: Security Policy Page 6/28 2. Cryptographic module specification 2.1. Overview The Quadient Postal Security Device is a hardware cryptographic module embedded within Quadient postal franking machines. The Quadient Postal Security Device performs all franking machine’s cryptographic and postal security functions and protects the Critical Security Parameters (CSPs) and Postal Relevant Data from unauthorized access. Model Hardware Part Number Firmware Part Number Firmware Version Quadient Postal Security Device A0014227-B and A0014227-C A0156569A a31.05 Table 2: Cryptographic Module Tested Configuration The Quadient Postal Security Device (Figure 1) is a multi-chip standalone cryptographic module enclosed within a hard, opaque, plastic enclosure encapsulating the epoxy potted module which is wrapped in a tamper detection envelope with a tamper response mechanism. This enclosure constitutes the cryptographic module’s physical boundary. Figure 1 – Quadient Postal Security Device 2.2. Excluded Components The module does not exclude any components from the requirements of FIPS 140-3. 2.3. Modes of operation The module only supports an Approved mode of operation that is entered upon powering-on the module. The module does not support a degraded mode of operation. Classification: External Document Name: Security Policy Page 7/28 2.4. Security industry protocols The cryptographic module implements the TLS v1.2 protocol and uses only one cipher suite (TLS-DHE-RSA- WITH-AES-128-CBC-SHA256). The TLS protocol is composed of TLS Handshake protocol (used for mutual authentication and TLS pre-master secret establishment) and TLS Record protocol (used for application data confidentiality and integrity). 2.5. Security functions 2.5.1. Approved Algorithms The Quadient Postal Security Device supports the following approved security functions: CAVP Cert. Algorithm and Standard Modes/ Methods Description/ Key Size(s)/ Key Strength(s) Use/Function Cert. #A728 AES CBC FIPS 197 SP 800-38A CBC 128 Encryption/Decryption of: • CSPs for storage within the module • Data exchanged using TLS v1.2 Cert. #A760 AES CMAC FIPS 197 SP 800-38B AES 128 Indicia Authentication Cert. #A3803 Conditioning Component Block Cipher SP 800-90B N/A N/A Conditioning component of module’s entropy source. Cert. #A2930 CTR-DRBG SP 800-90A AES 128 Key generation Cert. #A761 CVL (KDF TLS) SP 800-135 SHA-256 TLS 1.2 KDF Cert. #A767 DSA FIPS 186-4 KeyGen (2048, 224) Used for KAS-SSC Cert. #A2931 ECDSA FIPS 186-4 SHA-256 P-224, P-256 Key Generation, Digital Signature Generation (Indicia Authentication)1 Cert. #A729 HMAC-SHA-1, HMAC-SHA-256 FIPS 198-1 (Key Sizes Ranges Tested: KS