12040940 CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE Version 0.3 Crown Copyright 2012 All Rights Reserved
CPA Security Characteristics for Data Sanitisation - Flash Based Storage Document History Version Date Description 0.1 June 2011 First draft 0.2 July 2011 Updated following internal review 0.3 August 2011 Updated following external review This Security Characteristic is derived from the following files File Name Version Data Sanitisation Flash Based Storage v0.3.cxl 0.3 Common Libraries - v1.0.cxl 1.0 Hardware Libraries v1.0.cxl 1.0 Soft copy location DiscoverID 12040940 This document is authorised by: Deputy Technical Director (Assurance), CESG This document is issued by CESG For queries about this document please contact: CPA Administration Team CESG Hubble Road Cheltenham Gloucestershire GL51 0EX United Kingdom Tel: +44 (0)1242 221 491 Email: cpa@cesg.gsi.gov.uk The CPA Authority may review, amend, update, replace or issue new Scheme Documents as may be required from time to time. Page ii
CPA Security Characteristics for Data Sanitisation - Flash Based Storage CONTENTS REFERENCES... iv I. OVERVIEW... 1 A. Product Aims... 1 B. Typical Use Case(s)... 1 C. Expected Operating Environment... 1 D. Compatibility... 1 E. Interoperability... 1 F. Future Enhancements... 1 II. SECURITY CHARACTERISTIC FORMAT... 2 III. REQUIREMENTS... 3 A. Design Mitigations... 3 B. Verification Mitigations... 3 C. Deployment Mitigations... 3 IV. GLOSSARY... 4 Page iii
CPA Security Characteristics for Data Sanitisation - Flash Based Storage REFERENCES [a] The Process for Performing Foundation Grade CPA Evaluations, v1.3, August 2011, CESG [b] HMG IA Standard No. 5 - Secure Sanitisation (April 2011 Issue No: 4.0) Page iv
I. OVERVIEW 1. This document is a CPA Security Characteristic it describes requirements for a particular type of assured product for evaluation and certification under CESG s Commercial Product Assurance (CPA) scheme. A. Product Aims 2. This Security Characteristic covers sanitisation of all Flash-based storage media. Typical examples include solid-state hard drives, USB Thumb drives and SD cards. B. Typical Use Case(s) 3. A certified Foundation grade product may be used to reduce the protective marking of Flash storage media. The product may also be deployed to allow re-use of Flash storage media in the same or an equivalent environment. This is relevant where there is a requirement to limit the availability of data to those with a legitimate need for access. 4. Use of a certified Foundation grade product is a Category B procedure, sufficient to mitigate against a Basic Laboratory attack type as defined in [b]. C. Expected Operating Environment 5. Products for sanitising Flash based storage may operate in any environment where Flash technology is used for data storage. D. Compatibility 6. Flash sanitisation products may exist as software executed on any platform to which the Flash storage is attached. Alternatively, solutions may be integrated as a function within the storage device itself. E. Interoperability 7. Sanitisation functions will not always exist as a product in their own right. It is preferable for other approved products using Flash based storage to include built in sanitisation functions. F. Future Enhancements 8. No enhancements are currently planned for this Security Characteristic. 9. CESG welcomes feedback and suggestions on possible enhancements to this Security Characteristic. Page 1
II. SECURITY CHARACTERISTIC FORMAT 10. All CPA Security Characteristics contain a list of mitigations which are split into three requirement categories: development, verification and deployment requirements. Within each of these sets the mitigations can be grouped based on areas of the product (as illustrated in the High Level Functional Component Diagram above), such as bulk encryption or authentication, or they may be overarching requirements which apply to the whole product. Reference [a] describes how evaluation teams should interpret Security Characteristics. 11. The three types of mitigations are denominated as follows: DEV These are mitigations that are included by the developer during the design or implementation of the product. These are validated via a review of the product s design or implementation during a CPA evaluation. VER Verification mitigations are specific mitigations that the evaluator must test during the assessment of the product. DEP Deployment mitigations are points that must be considered by users or administrators during the deployment of the product. These mitigations are incorporated into the security procedures for the product. 12. Each mitigation includes informational text in italics, describing the threat that it is expected to mitigate. It also lists at least one specific mitigation, which describes what must actually be done to achieve that requirement. In some cases there is additional explanatory text which expands upon these requirements. 13. In the requirements listed below, the following terminology can be used: Must, Mandatory and Required are used to express a mitigation that is essential. All mitigations and detailed mitigations are mandatory unless there is an explicit caveat, such as if supported by the product. Should and Strongly Recommended are used whenever a requirement is highly desirable, but is not essential. These are likely to become mandatory in future iterations of the Security Characteristic. Could and Recommended are used to express a non-mandatory requirement that may enhance security or functionality. 14. For example: DEV.M1: [A mitigation] This mitigation is required to counter [a threat] At Foundation the product must [do something]. This can be achieved by [explanatory comment]. Page 2
III. REQUIREMENTS A. Design Mitigations DEV.M28: Code is signed and verified. This mitigation is required to counter installation of malware on host. At Foundation Grade the product is required to ensure all code is signed and verified prior to installation. The product must have a built-in signature verification mechanism. The digital signature algorithm must be ECDSA-256 or DSA-1536/192 and the hash algorithm must be SHA-256. If there are additional resources as part of the installation package, such as configuration files, then these must also be signed. DEV.M274: Directly address the Flash cells to overwrite all data, including redundant physical blocks normally hidden by the flash translation layer. This mitigation is required to counter reading directly from Flash cells, bypassing the flash translation layer/memory management. At Foundation Grade the product is required to overwrite all physical memory locations with NPM data. Then perform a further 'full erase' in accordance with the Flash manufacturer's instructions. DEV.M275: Verify all sensitive data has been sanitised. This mitigation is required to counter reading non-sanitised data. At Foundation Grade the product is required to carry out a verification step to ensure NPM data has been written to all locations as expected. Any locations which cannot be overwritten must be reported. B. Verification Mitigations VER.M277: Attempt recovery of data from a sanitised Flash storage device. This mitigation is required to counter reading non-sanitised data. At Foundation Grade the evaluator will write a known pattern to all blocks of a Flash memory device before sanitisation. After sanitisation, read back the contents and verify that all blocks (including any hidden or redundant regions) have been overwritten. C. Deployment Mitigations DEP.M30: Detect modification to system. This mitigation is required to counter installation of malware on host. At Foundation Grade the deployment is required to regularly run a commercial malware detection tool on the protected product. DEP.M276: If any Flash cells fail to sanitise, dispose of media in a secure manner. This mitigation is required to counter reading non-sanitised data. At Foundation Grade the deployment is required to consult HMG IA Standard No.5 [b], for the appropriate method of secure disposal. Page 3
IV. GLOSSARY 15. The following definitions are used in this document: Term COTS CPA HMG NPM SD Security Characteristic USB Meaning Commercial Off The Shelf Commercial Product Assurance Her Majesty s Government Non-Protectively Marked Secure Digital A standard which describes necessary mitigations which must be present in a completed product, its evaluation or usage, particular to a type of security product. Universal Serial Bus Page 4