7
While QDI worked to achieve FIPS 140-2, CC, and CSfC certification for
the BGA device, the UAV design team moved ahead with the effort to
create the final two-layer CSfC End User Device (EUD) solution. The UAV
design team selected a Trusted Integrator and together the two teams
planned a robust CSfC security solution implemented using the BGA de-
vice as the HWFDE component and a SWFDE component as the second
security layer. Careful consideration is given by the Trusted Integrator to
properly select the correct second security layer for this specific mission.
Together the two layer solution provides protection for the boot code,
sensor processing, and EW algorithms used by the UAV mission com-
puting system. To simplify the implementation, the Trusted Integrator
team suggested an identical HWFDE and SWFDE solution to protect the
sensor data collected during missions. Of course, the encryption keys for
each layer are randomly generated and distinct from each other.
Mission Success
Working together at an accelerated pace, the UAV team, QDI, and the
Trusted Integrator complete the security implementation and perform a
final review the NSA Data at Rest Capability Package, make some final
adjustments, some improvements, and conduct final system testing. Af-
ter months of effort, the system is ready for EUD registration and review
by the NSA. Approval is achieved, and two of the UAVs used during
prototype security testing are configured and prepared for trial missions.
In a few days, the first of the sophisticated UAVs successfully launches
and guides itself toward the remote mining facility. Hours later, the ve-
hicle returns loaded with Giga-Bytes of sensor data that analysts eagerly
review. There are no indications that the UAV had been detected dur-
ing the mission. A second, then a third mission is completed. In a few
weeks, missions are running around the clock. Construction at the min-
ing facility is complete and large amounts of raw ore move every night
to a hereto unknown processing facility located near a large rural power
plant. As expected, the sensors on the UAV detect minute amounts of
a radio-active mineral but surprisingly dust collectors in the UAV also
capture large amounts of highly toxic beryllium metal in dust emanating
from the mining facility. While Beryllium has some justifiable commer-
cial uses, the element's high melting point, light weight, and strength
find numerous uses in defense applications such as missiles, aircraft,
spacecraft, and nuclear reactors.
With the mission declared a success the UAV team moves to their next
project -- a covert underwater drone. Like the airborne UAV, the under-
water drone needs superior protection for data at rest. The lessons
learned during the UAV project will easily transfer to the underwater
drone application.
Implementing a Secure SSD
The integration of security into a military data storage device is not a
trivial task. Mercury's Application Engineering Team assists customers
with the design and implementation of custom security solutions.
Mercury has a wide breadth of product offerings for applications requir-
ing various levels of security. Our TRRUST-Stor® portfolio of Secure SSDs
is available in multiple form factors, including the industry-standard
2.5", mSATA, XMC, and ultra-compact BGA. The most recent addition to
Mercury's SSD portfolio is the ASURRE-Storâ„¢ SSD, available with FIPS
140-2 certification and eligibility to be used as a HWFDE component in a
properly configured and deployed 2-layer CSfC registered solution.
Please note that Mercury Systems is not a Trusted Integrator. Contact
Mercury's Secure SSD team at secure.ssd@mrcy.com.
1
https://www.nsa.gov/resources/everyone/csfc/
2
https://www.nsa.gov/resources/everyone/csfc/assets/files/faqs-non-technical.pdf
3
For more information, please refer to https://www.niap-ccevs.org/Profile/PP.cfm
4
R. Micheloni (ed.), 3D Flash Memories, Springer Science + Business Media, 2016,
retrieved from https://goo.gl/BdLwcR
Reference Websites
CSfC Website:
https://www.nsa.gov/resources/everyone/csfc/
CSfC Capability Packages:
https://www.nsa.gov/resources/everyone/csfc/capability-packages/
CSfC Data At Rest Capability Package:
https://www.nsa.gov/resources/everyone/csfc/capability-packages/#data-at-rest
CSfC Components List:
https://www.nsa.gov/resources/everyone/csfc/components-list/
CSfC Trusted Integrators List:
https://www.nsa.gov/resources/everyone/csfc/trusted-integrator-list.shtml
CSfC Frequently Asked Questions:
https://www.nsa.gov/resources/everyone/csfc/faq.shtml
National Information Assurance Partnership:
https://www.niap-ccevs.org/Product/
Mercury Systems ASURRE-Stor SSD:
http://www.mrcy.com/CSfC
Mercury Systems Secure SSD Portfolio:
https://www.mrcy.com/military-grade-secure-solid-state-drives/
Acronyms
Acronym Definition
3D-NAND Three-Dimensional NAND flash
AES Advanced Encryption Standard
BGA Ball Grid Array
CBC Cipher Block Chaining
COTS Commercial Off-The-Shelf
CP Capability Package
CSfC Commercial Solutions for Classified
CSS Central Security Service
DAR Data At Rest
ECC Error Correction Code
FDE Full Disk Encryption
FE File Encryption
FIPS Federal Information Processing Standard
GCM Galois/Counter Mode
GOTS Government Off-The-Shelf
HDD Hard Disk Drive
HF DAR solution designation for HWFDE and FE
HS DAR solution designation for HWFDE and SWFDE
HWFDE Hardware Full Disk Encryption
MLC Multi-Level Cell NAND flash
mSATA Mobile SATA
NIAP National Information Assurance Partnership
NSA National Security Agency
PE Platform Encryption
PF DAR solution designation for PE and FE
SF DAR solution designation for SWFDE and FE
SLC Single-Level Cell NAND flash
SSD Solid State Drive
SWFDE Software Full Disk Encryption
TLC Triple-Level Cell NAND flash
WLAN Wireless Local Area Network
XEX Xor-encrypt-xor
XMC Switched Mezzanine Card
XTS XEX with ciphertext stealing