IBM System Storage TS1130 Tape Drive - Machine Type 3592, Model E06 Security Policy
IBM System Storage TS1130 Tape Drive - Machine Type 3592, Model E06 Security Policy
-i-
Security Policy
2 Introduction ............................................................................................................................................................ 2
2.1 References ............................................................................................................................................... 3
1 Document History
Date Author Change
02/25/2009 Christine Knibloe V0.0
Initial Creation
10/05/2009 Said Ahmad V1.0
Updated Figure 1 and Table 3
removing references to misc. port
10/20/2009 Said Ahmad V2.0
Updated cryptographic boundary
from the canister to drive brick
10/21/2009 Said Ahmad V3.0
Updated Figure 1 with duplicate
Ethernet port
10/29/2009 Said Ahmad V4.0
Updates per the Lab Comments
1/28/2009 Said Ahmad V5.0
Updated per the Lab Comments
6/2/2010 Said Ahmad V6.0
Updated per CMVP comments
6/3/2010 Said Ahmad V7.0
Updated per CMVP comments
6/8/2010 Said Ahmad V7.1
Updated per CMVP comments
7/16/2010 Said Ahmad V7.2
Updated per CMVP Comments
2 Version 7 Revision 3
2 Introduction
This non-proprietary security policy describes the IBM System Storage TS1130 Tape Drive - Machine
Type 3592, Model E06 cryptographic module and the approved mode of operation for FIPS 140-2,
meeting the security level 1 requirements for each section of the requirements. This policy was prepared
as part of FIPS 140-2 validation of the TS1130. The IBM System Storage TS1130 Tape Drive -
Machine Type 3592, Model E06 is referred to in this document as the “TS1130 Encrypting Tape Drive,”
the “TS1130,” and the encrypting tapedrive.
FIPS 140-2 (Federal Information Processing Standards Publication 140-2—Security Requirements for
Cryptographic Modules) details the U.S. Government requirements for cryptographic modules. More
information about the FIPS 140-2 standard and validation program is available on the NIST web site at:
http://csrc.nist.gov/groups/STM/cmvp/
The security policy document is organized in the following sections:
• Introduction
• References
• Document Organization
• Secure Configuration
• Physical Security
• Self-Tests
• Design Assurance
2.1 References
This document describes only the cryptographic operations and capabilities of the TS1130 Encrypting Tape
Drive. More information is available on the general function of the TS1130 Encrypting Tape Drive at the
IBM web site:
http://www.ibm.com/storage/tape/
The tape drive meets the T10 SCSI-3 Stream Commands (SSC) standard for the behavior of sequential
access devices. In addition, the tape drive primary host interfaces are physical fibre channel ports. The
physical and protocol behavior of these ports conforms to Fibre Channel Protocol (FCP) specification.
These specifications are available at the INCITS T10 standards web site:
http://www.T10.org /
A Redbook describing tape encryption and user configuration of the drive in various environments can be
found at:
http://www.redbooks.ibm.com/abstracts/sg247320.html?Open
The TS1130 drive format on the tape media is designed to conform to the IEEE P1619.1 committee draft
proposal for recommendations for protecting data at rest on tape media. Details on P1619.1 may be found
at:
http://ieee-p1619.wetpaint.com/
4 Version 7 Revision 3
3.1 Overview
The TS1130 Encrypting Tape Drive is a set of hardware, firmware, and interfaces allowing the optional
storage and retrieval of encrypted data to magnetic tape cartridges. The TS1130 tape drive is FIPS
validated as a multi-chip, embedded cryptographic module (Hardware Version: 45E8855 EC Level
L31095 and Firmware Version: 46X1651 EC Level L31096). In customer operation the “brick” unit is
embedded in a canister package for operation in a library. Some components of the TS1130 tape drive,
such as mechanical components used for tape loading/unloading and actuating the tape cartridge, labels,
cables, connectors, terminals and sensor components, do not have an effect on the security of the
cryptographic module.
A block diagram of the TS1130 Encrypting Tape Drive is shown below:
Message Display
SDRAM SDRAM (U20,U21,U22,
(U52,U54) U34,U49,U51,U67,U58)
Port 0 Port 1 422 232 Panel net
(J4)
FC
FAS600
(U71)
FC
(J12)
Yuri
(U24)
Cartridge Mem
RS- RS- Service Ether-
UPIF Other
(J10)
(internal PPC)
(U23) Card
Functions Deck
(U14,U9,U13,
(J32)
SH7780
(U16)
Head
ACF I2C net
Tape
(J6)
SDRAM (U86,U87) SDRAM (U10,U11) Main Card
Ether-
(J42)
Drive
The TS1130 Encrypting Tape Drive has two major cryptographic functions:
Data Block Cipher Facility: The tape drive provides functions which provide the ability for
standard tape data blocks as received during SCSI-type write commands to be encrypted
before being recorded to media using AES-GCM block cipher using a provided key, and
decrypted during reads from tape using a provided key.
o Note the AES-GCM block cipher operation is performed after compression of the
host data therefore not impacting capacity and data rate performance of the
compression function
o The TS1130 drive automatically performs a complete and separate decryption and
decompression check of host data blocks after the compression/encryption process
to validate there were no errors in the encoding process
Secure Key Interface Facility: The tape drive provides functions which allow authentication
of the tape drive to an external IBM key manager, such as the IBM Encryption Key
Manager (EKM) or the Tivoli Key Lifecycle Manager (TKLM), and allow transfer of
protected key material between the key manager and the tape drive.
There are two configurations for the TS1130 in the approved mode of operation. They are:
System-Managed Encryption (SME)
Library-Managed Encryption (LME)
In order to be in an approved mode of operation, the values of the fields Key Path (manager Type) (from
VPD), In-band Key Path (Manager Type) Override, Indirect Key Mode Default, Key Scope, and
Encryption Method must be set according to the table below. More details can be found in the TS1130
SCSI Reference.
A user can determine if the TS1130 is in the approved mode of operation by issuing a SCSI Mode Sense
command to Mode Page X’25’ and evaluating the values returned.
Certain commands are prohibited while in the approved mode of operation. The commands vary based on
which configuration is used in the approved mode. In the LME configuration, all Mode Select commands
to subpages of Mode Page X’25’ are prohibited. In the SME configuration, Mode Select commands to the
following subpages of Mode Page X’25’ are prohibited.
6 Version 7 Revision 3
Loading a FIPS 140-2 validated drive microcode level and configuring the drive for SME or LME
operation initializes the TS1130 into the approved mode of operation. The FIPS 140-2 validated drive
microcode level should be loaded twice to ensure the firmware occupies both the main and reserved
firmware locations.
The TS1130 supports multi-initiator environments, but only one initiator may access cryptographic
functions at any given time. Therefore the TS1130 does not support multiple concurrent operators.
The TS1130 implements a non-modifiable operational environment which consists of a firmware image
stored in FLASH. The firmware image is copied to, and executed from, RAM. The firmware image can
only be updated via FIPS-approved methods that verify the validity of the image.
The TS1130 drive operates as a stand-alone tape drive and has no direct dependency on any specific
operating system or platform for FIPS approved operating mode, but does have requirements for:
• The key manager/key store must be able to use the EEDK it supplies
the drive to determine the Data Key.
Drive Configuration requirements
o The TS1130 drive must be configured in SME or LME encryption mode.
o The TS1130 drive must have the FIPS 140-2 validated drive firmware level loaded and
operational.
o Drive must be configured in the approved mode of operation.
o In LME mode, the TS1130 drive must be operated in an automation device which
operates to the LDI or ADI interface specifications provided.
8 Version 7 Revision 3
• Encryption or decryption of tape data blocks using the Data Block Cipher Facility.
• Establishment and use of a secure key channel for key material passing by the Secure Key Interface
Facility.
It is important to note that the Secure Key Interface Facility may be an automatically invoked service when
a user issues Write or Read commands with encryption enabled that require key acquisition by the TS1130
drive. Under these circumstances the TS1130 drive automatically establishes a secure communication
channel with a key manager and performs secure key transfer before the underlying write or read
command may be processed.
The TS1130 drive enforces a requirement that only one host interface initiator may have access to
cryptographic services at any given time.
10 Version 7 Revision 3
“Show Status”
12 Version 7 Revision 3
1
Allowed for generation of keys used by the RSA Key Transport mechanism
2
Allowed in FIPS mode for seeding approved RNG
17 Version 7 Revision 3
• Secret and private keys are never output from the TS1130 drive in plaintext form.
• Secret keys may only be imported to the TS1130 drive in encrypted form.
Data Key
(dCert)
(dSK’)
(dSK)
(DK)
General SCSI commands
General Library Interface commands R R W
Service Panel Configuration , X X X X
Diagnostic and Status services
Service Panel Configuration
Service Panel Diagnostics X X X X
Service Panel Status Display
Front Panel Interface Status
Front Panel Interface Unload Z Z Z Z
Front Panel Interface Reset Z Z Z Z Z Z
Encrypting Write-type Command X
Decrypting Read-type Command X
Set Encryption Control Parameters
(including Bypass Mode)
Query Encryption Control Parameters
(including Bypass Mode)
“Show Status”
Drive Challenge/Response X X X X
Query Drive Certificate R
Query dSK X R
Setup an SEDK and EEDK structure X W W
(a protected key structure)
Query EEDK(s) – active, needed,
pending , entire (all)
Request EEDK(s) Translate R
Request EEDK(s) Generate W
Alter EEDK(s) X RW
Drive Error Notify and Drive Error
Notify Query
Power-Up Self-Tests X X X X
Configure Drive Vital Product Data W W
(VPD) settings
Firmware Load Test
Key Path Check diagnostic X X RX X R
Key Zeroization Z Z Z Z Z Z
19 Version 7 Revision 3
3.6.3 Self-Test
The TS1130 drive performs both Power On Self Tests and Conditional Self tests as follows. The operator
shall power cycle the device to invoke the Power On Self tests.
Table 8: Self-Tests
Function Self-Test Type Implementation Failure Behavior
Tested
AES-GCM Power-Up KAT performed for Encrypt and Decrypt (256- FSC3 D12D posted
(256-bit keys) bit)
RNG Power-Up KAT performed FSC D12D posted
SHA-1 Power-Up KAT performed FSC D12D posted
SHA-256 Power-Up KAT performed FSC D12D posted
RSA PKCS #1 Power-Up KAT performed FSC D12D posted
Sign/Verify
3
Fault Symptom Code
20 Version 7 Revision 3
Bypass entry, exit, and status features are provided to meet approved methods for use of bypass states.