Non-proprietary security policy. This document may be freely distributed in its entirety without modification. Page 1 of 35 FIPS 140-2 Security Policy SafeZone FIPS Cryptographic Module Rambus Global Inc., Finnish branch Sokerilinnantie 11 C FI-02600 Espoo Finland Phone: +358 50 3560966 Rambus Inc. 1050 Enterprise Way Sunnyvale CA 94089 United States 2020-03-13 Revision C Software Version 1.1.0 Document Number: FIPS-2020-1022 Non-proprietary security policy. This document may be freely distributed in its entirety without modification. Page 2 of 35 1 Introduction.................................................................................................................. 4 1.1 Purpose................................................................................................................ 6 1.2 Security level ...................................................................................................... 6 1.3 Glossary .............................................................................................................. 7 2 Ports and Interfaces...................................................................................................... 8 3 Roles, Services, and Authentication ............................................................................ 9 3.1 Roles and Services............................................................................................ 10 3.1.1 User Role ...................................................................................................... 10 3.1.2 Crypto-officer Role....................................................................................... 10 3.2 Authentication Mechanisms and Strength ........................................................ 11 4 Secure Operation and Security Rules ........................................................................ 12 4.1 Security Rules................................................................................................... 12 4.2 Physical Security Rules..................................................................................... 13 4.3 Secure Operation Initialization Rules............................................................... 13 5 Definition of SRDIs (Security Relevant Data Items) Modes of Access.................... 14 5.1 FIPS Approved and Allowed algorithms.......................................................... 14 5.2 Non-FIPS mode of operation............................................................................ 18 5.3 Cryptographic Keys, CSPs, and SRDIs............................................................ 20 5.4 Access Control Policy....................................................................................... 25 5.5 User Guide ........................................................................................................ 30 5.5.1 NIST SP 800-108: Key Derivation Functions .............................................. 30 5.5.2 NIST SP 800-132: Password-Based Key Derivation Function .................... 30 5.5.3 NIST SP 800-38D: Galois/Counter Mode.................................................... 30 5.5.4 NIST SP 800-90: Deterministic Random Bit Generator............................... 31 5.5.4.1 iOS entropy source................................................................................ 31 5.5.4.2