Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2



Similar documents
FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Secure Network Communications FIPS Non Proprietary Security Policy

Pulse Secure, LLC. January 9, 2015

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS Non-Proprietary Security Policy

VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module

FIPS Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)

13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA United States of America

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Symantec Mobility: Suite Server Cryptographic Module

FIPS Security Policy LogRhythm Log Manager

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.

FIPS Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

FIPS Security Policy. for Motorola, Inc. Motorola Wireless Fusion on Windows CE Cryptographic Module

FIPS Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: 0.9

FIPS Security Policy LogRhythm or Windows System Monitor Agent

SecureDoc Disk Encryption Cryptographic Engine

FIPS Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS Security Policy

1C - FIPS Cisco VPN Client Security Policy

FIPS Level 1 Security Policy for Cisco Secure ACS FIPS Module

Security Policy. Trapeze Networks

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

SkyRecon Cryptographic Module (SCM)

FIPS Security Policy

Cisco Telepresence C40, C60, and C90 Codecs (Firmware Version: TC5.0.2) (Hardware Version: v1) FIPS Non-Proprietary Security Policy

Secure Computing Corporation Secure Firewall (Sidewinder) 2150E (Hardware Version: 2150 with SecureOS v )

NitroGuard Intrusion Prevention System Version and Security Policy

FIPS Documentation: Security Policy 05/06/ :21 AM. Windows CE and Windows Mobile Operating System. Abstract

Security Policy for FIPS Validation

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3

FIPS SECURITY POLICY FOR

FIPS Security Policy 3Com Embedded Firewall PCI Cards

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS Non-Proprietary Cryptographic Module Security Policy

MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002

SafeEnterprise TM ATM Encryptor II Model 600 FIPS Level 3 Validation Non-Proprietary Security Policy

OpenSSL FIPS Security Policy Version 1.2.4

SNAPcell Security Policy Document Version 1.7. Snapshield

MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR MODULE OVERVIEW SCOPE OF DOCUMENT. Security Policy REV 1.2, 10/2002

HP LTO-6 Tape Drive Level 1 Security Policy

Network Security Services (NSS) Cryptographic Module Version

Security Policy: Key Management Facility Crypto Card (KMF CC)

OpenSSL FIPS Security Policy Version 1.1.1b

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Security Policy, DLP Cinema, Series 2 Enigma Link Decryptor

TANDBERG MXP Codec (Firmware Version: F6.0) FIPS Non-Proprietary Security Policy

Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)

Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: FIPS Non-Proprietary Security Policy

FIPS Security Policy

McAfee Firewall Enterprise 8.2.1

FIPS Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: Winterson Road Linthicum, MD 21090

HEWLETT PACKARD TIPPINGPOINT. FIPS NON PROPRIETARY SECURITY POLICY HP TippingPoint Security Management System

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Security Policy for Oracle Advanced Security Option Cryptographic Module

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

An Introduction to Cryptography as Applied to the Smart Grid

How To Protect Your Computer From Attack

McAfee Firewall Enterprise 8.3.1

A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS AND FIPS 140-2

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

FIPS Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: 0.7

Archived NIST Technical Series Publication

IronKey Data Encryption Methods

FIPS Security Policy for WatchGuard XTM

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Microsoft Windows Server 2008 R2 Cryptographic Primitives Library (bcryptprimitives.dll) Security Policy Document

Introducing etoken. What is etoken?

I N F O R M A T I O N S E C U R I T Y

DRAFT Standard Statement Encryption

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Guideline for Implementing Cryptography In the Federal Government

The Encryption Technology of Automatic Teller Machine Networks

WebSphere DataPower Release FIPS and NIST SP a support.

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

I N F O R M A T I O N S E C U R I T Y

Non-Proprietary Security Policy for the FIPS Level 1 Validated Fortress Secure Client Software Version 3.1

TrustKey Tool User Manual

Certification Report

How To Encrypt Data With Encryption

FIPS SECURITY POLICY

Sonus Networks, Inc. SBC 5110 and 5210 Session Border Controllers Hardware Version: SBC 5110 and SBC 5210 Firmware Version: 4.0

Secure FTP Server (FIPS) v3.3 User Guide

Computer System Management: Hosting Servers, Miscellaneous

FIPS SECURITY POLICY

OpenSSL FIPS Security Policy Version 1.2.2

The Misuse of RC4 in Microsoft Word and Excel

NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators

OpenSSL FIPS Security Policy Version 1.2.3

Transcription:

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared by: Symantec Corporation 350 Ellis Street Mountain View, CA 94043 United States of America Corsec Security, Inc. 13135 Lee Jackson Memorial Hwy, Suite 220 Fairfax, VA 22033 United States of America Phone: +1 (650) 527-8000 Phone: +1 (703) 267 6050

http://www.symantec.com http://www.corsec.com

Table of Contents 1 INTRODUCTION... 5 1.1 PURPOSE... 5 1.2 REFERENCES... 5 1.3 DOCUMENT ORGANIZATION... 5 2 EV CRYPTOGRAPHIC MODULE... 6 THIS SECTION DESCRIBES THE SYMANTEC ENTERPRISE VAULT CRYPTOGRAPHIC MODULE FROM SYMANTEC CORPORATION.... 6 2.1 OVERVIEW... 6 2.1.1 Symantec Enterprise Vault... 6 2.1.2 Enterprise Vault Cryptographic Module... 8 2.2 MODULE SPECIFICATION... 9 2.2.1 Physical Cryptographic Boundary... 9 2.2.2 Logical Cryptographic Boundary... 10 2.3 MODULE INTERFACES... 11 2.4 ROLES AND SERVICES... 12 2.4.1 Crypto Officer Role... 12 2.4.2 User Role... 13 2.5 PHYSICAL SECURITY... 14 2.6 OPERATIONAL ENVIRONMENT... 14 2.7 CRYPTOGRAPHIC KEY MANAGEMENT... 14 2.7.1 Key Generation... 17 2.7.2 Key Entry and Output... 17 2.7.3 Key/CSP Storage and Zeroization... 17 2.8 EMI/EMC... 17 2.9 SELF TESTS... 18 2.9.1 Power Up Self Tests... 18 2.9.2 Conditional Self Tests... 18 2.10 MITIGATION OF OTHER ATTACKS... 19 3 SECURE OPERATION... 20 3.1 INITIAL SETUP... 20 3.2 CRYPTO OFFICER GUIDANCE... 20 3.3 USER GUIDANCE... 20 4 ACRONYMS... 21 Table of Figures FIGURE 1 SYMANTEC ENTERPRISE VAULT SYSTEM OVERVIEW... 7 FIGURE 2 EV ARCHIVING PROCESS... 7 FIGURE 3 USERS ACCESSING EV ARCHIVES... 8 FIGURE 4 STANDARD GPC BLOCK DIAGRAM... 10 FIGURE 5 LOGICAL BLOCK DIAGRAM AND CRYPTOGRAPHIC BOUNDARY... 11 Symantec Enterprise Vault Cryptographic Module Page 3 of 23

List of Tables TABLE 1 SECURITY LEVEL PER FIPS 140 2 SECTION... 8 TABLE 2 FIPS 140 2 INTERFACE MAPPINGS... 12 TABLE 3 CRYPTO OFFICER SERVICES... 13 TABLE 4 USER SERVICES... 13 TABLE 5 FIPS APPROVED ALGORITHM IMPLEMENTATIONS (WINDOWS SERVER 2003 SP2)... 14 TABLE 6 FIPS APPROVED ALGORITHM IMPLEMENTATIONS (WINDOWS SERVER 2008 R2)... 15 TABLE 7 LIST OF CRYPTOGRAPHIC KEYS, KEY COMPONENTS, AND CSPS... 16 TABLE 8 ACRONYMS... 21 Symantec Enterprise Vault Cryptographic Module Page 4 of 23

1 Introduction 1.1 Purpose This is a non proprietary Cryptographic Module Security Policy for the Symantec Enterprise Vault Cryptographic Module from Symantec Corporation. This Security Policy describes how the Symantec Enterprise Vault Cryptographic Module meets the security requirements of Federal Information Processing Standards (FIPS) Publication 140 2, which details the U.S. and Canadian Government requirements for cryptographic modules. More information about the FIPS 140 2 standard and validation program is available on the National Institute of Standards and Technology (NIST) and the Communications Security Establishment Canada (CSEC) Cryptographic Module Validation Program (CMVP) website at http://csrc.nist.gov/groups/stm/cmvp. The Symantec Enterprise Vault Cryptographic Module is referred to in this document as the Enterprise Vault Cryptographic Module, the cryptographic module, or the module. This policy was prepared as part of the Level 1 FIPS 140 2 validation of the module. 1.2 References This document deals only with operations and capabilities of the module in the technical terms of a FIPS 140 2 cryptographic module security policy. More information is available on the module from the following sources: The Symantec website (http://www.symantec.com) contains information on the full line of products from Symantec. The CMVP website (http://csrc.nist.gov/groups/stm/cmvp/documents/140 1/140val all.htm) contains contact information for individuals to answer technical or sales related questions for the module. 1.3 Document Organization The Security Policy document is one document in a FIPS 140 2 Submission Package. In addition to this document, the Submission Package contains: Vendor Evidence Document Finite State Model Other supporting documentation as additional references This Security Policy and the other validation submission documentation were produced by Corsec Security, Inc. under contract to Symantec. With the exception of this Non Proprietary Security Policy, the FIPS 140 2 Submission Package is proprietary to Symantec and is releasable only under appropriate non disclosure agreements. For access to these documents, please contact Symantec. Symantec Enterprise Vault Cryptographic Module Page 5 of 23

2 EV Cryptographic Module This section describes the Symantec Enterprise Vault Cryptographic Module from Symantec Corporation. 2.1 Overview Symantec provides a broad range of Information Technology (IT) products and services that help organizations to efficiently manage resources, maximize performance, and minimize security risks. Symantec s product offerings are classified into the following product categories: Security; Information Risk and Compliance; Storage; Infrastructure Operations; and Business Continuity. Symantec, one of the largest makers of security and storage management software, has received recognition as a global leader by a number of research organizations including Gartner and Forrester. 2.1.1 Symantec Enterprise Vault Symantec Enterprise Vault is a content archiving platform that enables automatic archival of less frequently accessed information into centrally held archives. Using Enterprise Vault, organizations can archive infrequently accessed data from a wide variety of platforms including Exchange Servers; Domino Mail Servers; SharePoint Servers; Simple Mail Transfer Protocol (SMTP) message Servers; and file systems. Enterprise Vault also provides users with the ability to search and retrieve archived information. The Discovery and Compliance Accelerator components provided with Enterprise Vault enable compliance monitoring and legal discovery activities. 2.1.1.1 Enterprise Vault Core Components Enterprise Vault enables information archival and retrieval through the following core components which are a part of the Enterprise Vault system as shown in Figure 1 below: The Enterprise Vault Server includes services and tasks that perform the tasks of archiving items from target servers, creating indexes of archived items, storing items in the archives, and retrieving archived information. The Enterprise Vault Administration Console configures and manages services, tasks and archives. Active Server Page (ASP) Web Access Components enable users to search and retrieve items in archives. SQL Databases store information related to the Enterprise Vault archives. Services and tasks retrieve information, such as the location of a particular archive, from these databases. The various databases installed as a part of Enterprise Vault include: Enterprise Vault directory database Enterprise Vault holds configuration data and information about the archives in this database. Vault Store database Enterprise Vault organizes archived items in entities called Vault Stores. Each Vault Store has a Vault Store database associated with it. Vault Store Group Fingerprinting database Enterprise Vault creates a fingerprint of parts of an item, referred to as Single Instance Storage (SIS) parts, which are suitable for sharing across Vault Stores. For every SIS part, Enterprise Vault checks the fingerprint database to determine if a fingerprint of the SIS part already exists. If a match is found, Enterprise Vault only references the stored SIS part instead of storing it again, allowing for efficient storage and de duplication of data. Monitoring and Reporting databases Perform Enterprise Vault monitoring and reporting functions. Symantec Enterprise Vault Cryptographic Module Page 6 of 23

Figure 1 Symantec Enterprise Vault System Overview The core Enterprise Vault components can be installed on the same or different computers as required. 2.1.1.2 Enterprise Vault Archiving In order to archive information, Enterprise Vault archiving tasks check target servers at scheduled times. Relevant items are then stored in Enterprise Vault archives. In order to enable fast search and retrieval, Enterprise Vault creates an index of all the archived items. The Enterprise Vault (EV) archiving process is shown in Figure 2 below. Figure 2 EV Archiving Process 2.1.1.3 Accessing Enterprise Vault Archives Any time a user wants to access an archived item, the web access component passes the user request on to the Enterprise Vault services and tasks. Enterprise Vault services and tasks then look up the archives, and return the requested information to the user. Additionally, users may be allowed to restore archived items to their original location. If permitted, users can also delete archived items. The process of accessing Enterprise Vault archives is shown in Figure 3 below. Symantec Enterprise Vault Cryptographic Module Page 7 of 23

Figure 3 Users Accessing EV Archives 2.1.2 Enterprise Vault Cryptographic Module Symantec Enterprise Vault Cryptographic Module is a multi chip standalone physical embodiment. The module consists of a DLL 1 which interfaces with the Microsoft Cryptographic API 2 to provide the required cryptographic functionality. The Enterprise Vault Cryptographic Module may be used for encryption/decryption of Enterprise Vault passwords, hashing of indexes, and random number generation. When running on Windows Server 2003 SP2, the module includes implementations of the following FIPS Approved algorithms: Advanced Encryption Standard (AES) Triple Data Encryption Algorithm (TDEA or Triple DES 3 ) Secure Hash Standard (SHS) (Keyed ) Hash Message Authentication Code (HMAC) RSA 4 signature generation FIPS 186 2 General Purpose Pseudo Random Number Generator (PRNG) When running on Windows Server 2008 R2, the module includes implementations of the following FIPS- Approved algorithms: Advanced Encryption Standard (AES) Triple Data Encryption Algorithm (TDEA or Triple DES 5 ) Secure Hash Algorithm (SHA) (Keyed ) Hash Message Authentication Code (HMAC) RSA 6 signature generation and verification SP 7 800-90 AES-256 based counter mode Deterministic Random Bit Generator (DRBG) The Symantec Enterprise Vault Cryptographic Module is validated at the FIPS 140 2 Section levels shown in Table 1 below: Table 1 Security Level Per FIPS 140 2 Section Section Section Title Level 1 Cryptographic Module Specification I 1 DLL Dynamic Link Library 2 API Application Programming Interface 3 DES Data Encryption Standard 4 RSA Rivest, Shamir, Adleman 5 DES Data Encryption Standard 6 RSA Rivest, Shamir, Adleman 7 SP Special Publication Symantec Enterprise Vault Cryptographic Module Page 8 of 23

Section Section Title Level 2 Cryptographic Module Ports and Interfaces 1 3 Roles, Services, and Authentication 1 4 Finite State Model 1 5 Physical Security N/A 6 Operational Environment 1 7 Cryptographic Key Management 1 8 EMI/EMC 8 1 9 Self tests 1 10 Design Assurance 1 11 Mitigation of Other Attacks N/A 2.2 Module Specification The Symantec Enterprise Vault Cryptographic Module is a software module with a multi chip standalone embodiment. The overall security level of the module is 1. The physical and logical cryptographic boundaries of the Enterprise Vault Cryptographic Module are defined in the following sections. 2.2.1 Physical Cryptographic Boundary As a software cryptographic module, the module must rely on the physical characteristics of the host system. The physical boundary of the cryptographic module is defined by the hard enclosure around the host system on which it runs. The module supports the physical interfaces of the host system, including the integrated circuits of the system board, the CPU, network adapters, RAM, hard disk, device case, power supply, and fans. Other devices may be attached to the General Purpose Computer (GPC), such as a display monitor, keyboard, mouse, printer, or storage media. See Figure 4 below for a standard host system block diagram. 8 EMI/EMC Electromagnetic Interference / Electromagnetic Compatibility Symantec Enterprise Vault Cryptographic Module Page 9 of 23

Figure 4 Standard GPC Block Diagram 2.2.2 Logical Cryptographic Boundary The logical cryptographic boundary of the module executing in memory is shown in Figure 4. The module s services can be called by the Symantec Enterprise Vault components. The module is utilized by every component of Enterprise Vault that uses the encryption/decryption, hashing and random number generation functionality. Symantec Enterprise Vault Cryptographic Module Page 10 of 23

Figure 5 Logical Block Diagram and Cryptographic Boundary The cryptographic module was tested and found compliant on the following platforms: Windows Server 2003 SP2, 32 bit Windows Server 2008 R2, 64-bit Additionally, the vendor affirms that the cryptographic module is also fully supported on the following platforms: Windows Server 2003 SP2, 64 bit Windows Server 2008, 32-bit Windows Server 2008, 64-bit 2.3 Module Interfaces The module s logical interfaces exist in the software as an API. Physically, ports and interfaces are those of the host server. The API and physical interfaces can be categorized into following interfaces defined by FIPS 140 2: Data Input Data Output Control Input Status Output Symantec Enterprise Vault Cryptographic Module Page 11 of 23

Power Input A mapping of the FIPS 140 2 logical interfaces, the physical interfaces, and the module can be found in the following table: Table 2 FIPS 140 2 Interface Mappings FIPS Interface Physical Interface Logical Interface Data Input USB ports, network ports, serial ports, SCSI/SATA ports, DVD/CD drive, audio ports Arguments for API calls that contain data to be used or processed by the module Data Output Display port (e.g. VGA, HDMI, DVI, etc.),, USB ports, network ports, serial ports, SCSI/SATA ports, audio ports, DVD/CD drive Arguments for API calls that contain or point to where the result of the function is stored Control Input Status Output USB ports, network ports, serial ports, power switch Display port (e.g. VGA, HDMI, DVI, etc.), serial ports, network ports API Function calls and parameters that initiate and control the operation of the module Return values from API function calls and error messages Power Input AC Power Ports N/A 2.4 Roles and Services Symantec Enterprise Vault Cryptographic Module is validated at FIPS 140 2 Level 1. Therefore, it does not perform authentication of any operators. The module supports the following two roles for operators, as required by FIPS 140 2: Crypto Officer (CO) role and User role. Both roles are implicitly assumed when the services are utilized. Note 1: Table 3 and Table 4 use the following definitions for CSP 9 access. R Read: The plaintext CSP is read by the service. W Write: The CSP is established, generated, modified, or zeroized by the service. X Execute: The CSP is used within an Approved (or allowed) security function or authentication mechanism. Note 2: Input parameters of an API call that are not specifically a signature, hash, message, plaintext, ciphertext, or a key are NOT itemized in the Input column, since it is assumed that most API calls will have such parameters. Note 3: The Input and Output columns are with respect to the module s logical boundary. 2.4.1 Crypto Officer Role The operator in the Crypto Officer role installs, uninstalls, and administers the module via the host platform s Operating System (OS) interfaces. 9 CSP Critical Security Parameter Symantec Enterprise Vault Cryptographic Module Page 12 of 23

An operator assumes the CO role by invoking one of the following services: Table 3 Crypto Officer Services Service Input Output CSP and Type of Access Initialize module API call parameters Status None Show status None Status None Run self tests on demand None Status None 2.4.2 User Role The operator in the User role is a consumer of the module s security services. The role is assumed by invoking one of the following cryptographic services: Table 4 User Services Service Input Output CSP and Type of Access Generate random number (Windows Server 2003 SP2 FIPS 186 2) API call parameters Status, random bits FIPS 186 2 RNG seed RX FIPS 186 2 seed key RX Generate random number (Windows Server 2008 R2 SP 800-90) API call parameters Status, random bits SP 800-90 RNG seed RX Generate message digest (SHS) API call parameters, message Status, hash None Generate keyed hash (HMAC) API call parameters, key, message Status, hash HMAC key RWX Zeroize key API call parameters Status AES key W TDES key W HMAC key W RSA private/public key W Symmetric encryption API call parameters, key, plaintext Status, ciphertext AES key RWX TDES key RWX Symmetric decryption API call parameters, key, ciphertext Status, plaintext AES key RWX TDES key RWX Symantec Enterprise Vault Cryptographic Module Page 13 of 23

Service Input Output CSP and Type of Access Generate asymmetric key pair API call parameters Status, key pair RSA private/public key W RSA encryption API call parameters, plaintext Status, ciphertext RSA public key RWX RSA decryption API call parameters, ciphertext Status, plaintext RSA private key RWX Signature Generation API call parameters, key, message Status, signature RSA private key WX Signature Verification API call parameters, key, signature, message Status RSA public key WX 2.5 Physical Security The Symantec Enterprise Vault Cryptographic Module is a software module, which FIPS defines as a multi chip standalone cryptographic module. As such, it does not include physical security mechanisms. Thus, the FIPS 140 2 requirements for physical security are not applicable. 2.6 Operational Environment The module was tested and found to be compliant with FIPS 140 2 requirements on the following platforms: GPC with an Intel Celeron processor running Windows Server 2003 SP2, 32 bit GPC with an Intel Core 2 Duo processor running Windows Server 2008 R2, 64-bit Symantec affirms that the module also executes in its FIPS Approved manner (as described in this Security Policy) on the following other Operating Systems: Windows Server 2003 SP2, 64 bit Windows Server 2008, 32-bit Windows Server 2008, 64-bit The Crypto Officer shall ensure that the Operating System (OS) is configured to a Single User mode of operation. All cryptographic keys and CSPs are under the control of the operating system, which protects the CSPs against unauthorized disclosure, modification, and substitution. The module only allows access to CSPs through its well defined API. 2.7 Cryptographic Key Management When running on Windows Server 2003 SP2, the module implements the FIPS Approved algorithms listed in Table 5 below. Table 5 FIPS Approved Algorithm Implementations (Windows Server 2003 SP2) Algorithm Certificate Number Symantec Enterprise Vault Cryptographic Module Page 14 of 23

Algorithm AES in ECB 10, CBC 11 modes with 128, 192, and 256 bit keys Triple DES in ECB, CBC modes with 112 and 168 bit keys RSA (ANSI 12 X9.31, PKCS 13 #1.5, PSS) sign with 1024, 1536, 2048, 3072, 4096 bit keys Certificate Number 818 691 395 SHA 14 1, SHA 256, SHA 384, SHA 512 816 HMAC SHA 1, HMAC SHA 256, HMAC SHA 384, HMAC SHA 512 452 FIPS 186 2 General Purpose PRNG 470 When running on Windows Server 2008 R2, the module implements the FIPS Approved algorithms listed in Table 6 below. Table 6 FIPS Approved Algorithm Implementations (Windows Server 2008 R2) Algorithm AES in ECB, CBC, CFB8 15 modes with 128, 192, and 256 bit keys Triple DES in ECB, CBC, CFB8 modes with 112 and 168 bit keys RSA (ANSI X9.31, PKCS #1.5) sign/verify with 1024, 1536, 2048, 3072, 4096 bit keys RSA (ANSI X9.31) key generation with 1024, 1536, 2048, 3072, 4096 bit keys Certificate Number 1168 846 568 559 SHA 1, SHA 256, SHA 384, SHA 512 1081 HMAC SHA 1, HMAC SHA 256, HMAC SHA 384, HMAC SHA 512 687 SP 16 800-90 AES-256 based counter mode DRBG 23 The module implements the following non-approved algorithm allowed in FIPS mode: 10 ECB Electronic Codebook 11 CBC Cipher Block Chaining 12 ANSI American National Standards Institute 13 PKCS Public Key Cryptography Standards 14 SHA Secure Hash Algorithm 15 CFB8 Cipher Feedback (8-bit) 16 SP Special Publication Symantec Enterprise Vault Cryptographic Module Page 15 of 23

RSA Key Transport (key establishment methodology provides between 80 and 150 bits of encryption strength) When running on Windows Server 2003 SP2, the module supports the following non FIPS approved algorithms which are only available in a non FIPS mode of operation: ANSI X9.31RSA key-pair generation ANSI X9.31 RSA signature verification RC 17 2 RC4 MD 18 5 MD2 MD4 DES When running on Windows Server 2008 R2, the module supports the following non FIPS approved algorithms which are only available in a non FIPS mode of operation: RC2 RC4 MD5 MD2 MD4 DES The CSPs supported by the module are shown in Table 7 below. Please note that the Input and Output columns are in reference to the module s logical boundary. Keys that enter and exit the module via an API call parameter are in plaintext. Table 7 List of Cryptographic Keys, Key Components, and CSPs CSP/Key Input Output Storage Zeroization Use AES key API call parameter Never Plaintext in volatile memory By API call, power cycle Encryption, decryption TDES key API call parameter Never Plaintext in volatile memory By API call, power cycle Encryption, decryption HMAC key API call parameter Never Plaintext in volatile memory By API call, power cycle Message Authentication with SHA 1 and SHA 2s RSA private key API call parameter Never Plaintext in volatile memory By API call, power cycle Signature generation, decryption RSA public key API call parameter Never Plaintext in volatile By API call, power cycle Signature verification, 17 RC Rivest Cipher 18 MD Message Digest Symantec Enterprise Vault Cryptographic Module Page 16 of 23

CSP/Key Input Output Storage Zeroization Use memory encryption FIPS 186 2 PRNG seed (Windows Server 2003 SP2) Internally generated Never Plaintext in volatile memory By API call, power cycle Generate random number FIPS186 2 PRNG seed key (Windows Server 2003 SP2) Internally generated Never Plaintext in volatile memory By API call, power cycle Generate random number SP 800-90 DRBG seed (Windows Server 2008 R2) Internally generated Never Plaintext in volatile memory By API call, power cycle Generate random number 2.7.1 Key Generation When running on Windows Server 2003 SP2, the module uses a FIPS Approved FIPS 186 2 General Purpose PRNG implementation to generate cryptographic keys. When operating on Windows Server 2008 R2, the module uses a FIPS-Approved SP 800-90 AES-256 based counter mode DRBG for the generation of cryptographic keys. 2.7.2 Key Entry and Output The cryptographic module itself does not support key entry or key output from its physical boundary. However, keys are passed to the module as parameters from the applications resident on the host platform via the exposed APIs. Similarly, keys and CSPs exit the module in plaintext via the well defined exported APIs. 2.7.3 Key/CSP Storage and Zeroization The module does not persistently store any keys or CSPs. Symmetric keys are either provided by or delivered to the calling process, and are subsequently destroyed by the module at the completion of the API function call. 2.8 EMI/EMC Enterprise Vault Cryptographic Module is a software module. Therefore, the only electromagnetic interference produced is that of the host platform on which the module resides and executes. FIPS 140 2 requires that the host systems on which FIPS 140 2 testing is performed meet the Federal Communications Commission (FCC) EMI and EMC requirements for business use as defined in Subpart B, Class A of FCC 47 Code of Federal Regulations Part 15. However, all systems sold in the United States must meet these applicable FCC requirements. Symantec Enterprise Vault Cryptographic Module Page 17 of 23

2.9 Self Tests 2.9.1 Power Up Self Tests The Symantec Enterprise Vault Cryptographic Module performs the following self tests at power up when running on Windows Server 2003 SP2: Software integrity test Known Answer Tests (KATs) o Triple DES 168 ECB encrypt/decrypt o Triple DES 168 CBC encrypt/decrypt o Triple DES 112 ECB encrypt/decrypt o Triple DES 112 CBC encrypt/decrypt o AES 128 ECB encrypt/decrypt o AES 192 ECB encrypt/decrypt o AES 256 ECB encrypt/decrypt o AES 128 CBC encrypt/decrypt o AES 192 CBC encrypt/decrypt o AES 256 CBC encrypt/decrypt o SHA 1 o SHA 256 o SHA 384 o SHA 512 o HMAC SHA 1 o HMAC SHA 256 o HMAC SHA 384 o HMAC SHA 512 RSA sign/verify test FIPS 186 2 RNG The Symantec Enterprise Vault Cryptographic Module performs the following self tests at power up when running on Windows Server 2008 R2: Software integrity test Known Answer Tests (KATs) o Triple DES 168 ECB encrypt/decrypt o AES 128 ECB encrypt/decrypt o SHA 384 o SHA 512 o HMAC SHA 1 o HMAC SHA 256 o SP 800-90 CTR 19 _DRBG KAT RSA sign/verify 2.9.2 Conditional Self Tests The Symantec Enterprise Vault Cryptographic Module performs the following conditional self tests: RSA pair-wise consistency test Continuous RNG test 19 CTR Counter mode Symantec Enterprise Vault Cryptographic Module Page 18 of 23

2.10 Mitigation of Other Attacks This section is not applicable. The module does not claim to mitigate any attacks beyond the FIPS 140 2 Level 1 requirements for this validation. Symantec Enterprise Vault Cryptographic Module Page 19 of 23

3 Secure Operation The Symantec Enterprise Vault Cryptographic Module meets Level 1 requirements for FIPS 140 2. The sections below describe how to place and keep the module in FIPS approved mode of operation. 3.1 Initial Setup When the module is loaded by the host Symantec Enterprise Vault software application, the module assumes a FIPS Approved mode if a FIPS Approved algorithm is requested. Immediately after the module is loaded, it performs a self integrity test. If the integrity test succeeds, the module performs all other required FIPS power up self tests. If the module passes all self tests, then the module enters a FIPS Approved mode of operation. The module implicitly assumes a non FIPS mode if a non FIPS approved algorithm is requested. The only way to cause the module to return to a FIPS mode is to reload the module, cycle the power, or reboot the host OS. 3.2 Crypto Officer Guidance FIPS 140 2 mandates that a software cryptographic module at Security Level 1 be restricted to a single operator mode of operation. Prior to installing the module, the Crypto Officer must ensure the host system OS is configured for single user mode. To configure the Windows OS for single user mode, the Crypto Officer must ensure that all remote guest accounts are disabled in order to ensure that only one operator can log into the Windows OS at a time. The services that need to be turned off for Windows are: Fast user switching (irrelevant if server is a domain member) Terminal services Remote registry service Secondary logon service Telnet service Remote desktop and remote assistance service 3.3 User Guidance The Enterprise Vault Cryptographic Module is designed for use by the Symantec Enterprise Vault application. The module does not input, output, or persistently store CSPs with respect to the physical boundary. The user is responsible for providing persistent storage of the cryptographic keys and CSPs, and to ensure that keys are transmitted outside the physical cryptographic boundary in a secure manner. Symantec Enterprise Vault Cryptographic Module Page 20 of 23

4 Acronyms Table 8 Acronyms Acronym AES API ANSI ASP CBC CMVP CPU CSEC CSP CTR DES DLL DRBG ECB EMC EMI EV FCC FIPS GPC HMAC IT KAT LED MD NIST NVLAP Definition Advanced Encryption Standard Application Programming Interface American National Standards Institute Active Server Page Cipher Block Chaining Cryptographic Module Validation Program Central Processing Unit Communications Security Establishment Canada Critical Security Parameter Counter Mode Data Encryption Standard Dynamic Link Library Deterministic Random Bit Generator Electronic Codebook Electromagnetic Compatibility Electromagnetic Interference Enterprise Vault Federal Communications Commission Federal Information Processing Standard General Purpose Computer (Keyed ) Hash Message Authentication Code Information Technology Known Answer Test Light Emitting Diode Message Digest National Institute of Standards and Technology National Voluntary Laboratory Accreditation Program Symantec Enterprise Vault Cryptographic Module Page 21 of 23

Acronym Definition OS PKCS PRNG RAM RC RNG RSA SATA SCSI SHA SHS SIS SMTP SP TDES USB Operating System Public Key Cryptography Standards Pseudo Random Number Generator Random Access Memory Rivest Cipher Random Number Generator Rivest Shamir and Adleman Serial Advanced Technology Attachment Small Computer System Interface Secure Hash Algorithm Secure Hash Standard Single Instance Storage Simple Mail Transfer Protocol Special Publication Triple Data Encryption Standard Universal Serial Bus Symantec Enterprise Vault Cryptographic Module Page 22 of 23

Prepared by: Corsec Security, Inc. 13135 Lee Jackson Memorial Hwy, Suite 220 Fairfax, VA 22033 Phone: +1 (703) 267 6050 Email: info@corsec.com http://www.corsec.com