
Page 3 of 51
© Copyright 2017 Oracle Corporation
This document may be freely reproduced and distributed whole and intact including this Copyright notice.
Table of Contents
INTRODUCTION............................................................................................................................... 6
1.1 PURPOSE............................................................................................................................. 6
1.2 REFERENCES....................................................................................................................... 6
1.3 DOCUMENT ORGANIZATION ............................................................................................... 6
2STORAGETEK T10000D TAPE DRIVE..................................................................................... 8
2.1 MODULE OVERVIEW........................................................................................................... 8
2.1.1 ORACLE KEY MANAGER................................................................................................. 9
2.1.2 VIRTUAL OPERATOR PANEL ........................................................................................... 9
2.1.3 STORAGETEK T10000D TAPE DRIVE DEPLOYMENT ....................................................... 9
2.2 MODULE SPECIFICATION .................................................................................................. 11
2.2.1 PERMANENT ENCRYPTION APPROVED MODE ............................................................... 11
2.2.2 ENCRYPTION ENABLED APPROVED MODE.................................................................... 12
2.2.3 ENCRYPTION DISABLED APPROVED MODE................................................................... 12
2.2.4 MIXED MODE ............................................................................................................. 13
2.3 MODULE INTERFACES....................................................................................................... 13
2.3.1 FIPS 140-2 LOGICAL INTERFACE MAPPING................................................................. 14
2.3.2 STORAGETEK T10000D TAPE DRIVE VOP STATUS INFORMATION ................................ 19
2.4 ROLES AND SERVICES....................................................................................................... 20
2.4.1 CRYPTO-OFFICER ROLE.............................................................................................. 20
2.4.2 NON-APPROVED SERVICES .......................................................................................... 23
2.4.3 USER ROLE ................................................................................................................. 23
2.4.4 ADDITIONAL OPERATOR SERVICES ............................................................................... 24
2.4.5 ADDITIONAL STORAGETEK T10000D TAPE DRIVE SERVICES........................................ 25
2.5 PHYSICAL SECURITY......................................................................................................... 25
2.6 OPERATIONAL ENVIRONMENT.......................................................................................... 26
2.7 CRYPTOGRAPHIC KEY MANAGEMENT.............................................................................. 26
2.7.1 ENCRYPTION ENABLED CRYPTOGRAPHIC ALGORITHM IMPLEMENTATIONS .................... 26
2.7.2 ENCRYPTION DISABLED CRYPTOGRAPHIC ALGORITHM IMPLEMENTATIONS ................... 28
2.7.3 MIXED MODE ALGORITHM IMPLEMENTATIONS............................................................. 30
2.7.4 ENCRYPTION ENABLED CRYPTOGRAPHIC KEYS AND CRITICAL SECURITY PARAMETERS.. 33
2.7.5 ENCRYPTION DISABLED CRYPTOGRAPHIC KEYS AND CRITICAL SECURITY PARAMETERS. 36
2.7.6 MIXED MODE CRYPTOGRAPHIC KEYS AND CRITICAL SECURITY PARAMETERS ............... 38
2.8 EMI/EMC........................................................................................................................ 41
2.9 SELF-TESTS ...................................................................................................................... 41
2.9.1 INTEGRITY TESTS......................................................................................................... 41
2.9.2 POWER-ON SELF-TESTS .............................................................................................. 41
2.9.3 CONDITIONAL SELF-TESTS .......................................................................................... 42
2.9.4 CRITICAL FUNCTIONS TESTS........................................................................................ 43
2.10 MITIGATION OF OTHER ATTACKS..................................................................................... 43