Jump to content

Opal Storage Specification

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Grumpycraig (talk | contribs) at 19:14, 6 December 2018 (Security: Capitalized November and University). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

The Opal Storage Specification is a set of specifications for features of data storage devices (such as disk drives) that enhance their security. For example, it defines a way of encrypting the stored data so that an unauthorized person who gains possession of the device cannot see the data. That is, it is a specification for self-encrypting drives (SED).

The specification is published by the Trusted Computing Group Storage Workgroup.

SSC Overview

The Opal SSC (Security Subsystem Class) is an implementation profile for Storage Devices built to:

  • Protect the confidentiality of stored user data against unauthorized access once it leaves the owner's control (involving a power cycle and subsequent deauthentication).
  • Enable interoperability between multiple SD vendors.

Functions

The Opal SSC encompasses these functions:

  • Security provider support
  • Interface communication protocol
  • Cryptographic features
  • Authentication
  • Table management
  • Access control and personalization
  • Issuance
  • SSC discovery

Features

  • Security Protocol 1 support
  • Security Protocol 2 support
  • Communications
  • Protocol stack reset commands

Security

Most of OPAL hardware securities weakness relies in firmware implementation. Radboud University researchers[1] proved in November 2018, how it was easy to hack some SSD devices (Samsung EVO 840 & 850, Crucial MX100 MX200 & MX300) with US$100 of computer & electronics parts.

Implementers of SCC

Device Companies

Storage Controller Companies

Software companies

Computer OEMs

References

  1. ^ Meijer, Carlo; van Gastel, Bernard. "Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)" (PDF). Radboud University. Radboud University. Retrieved November 5, 2018.
  2. ^ "Intel® SSD Pro 1500 Series (M.2): Specs". Intel.com. Retrieved 2017-05-03.
  3. ^ "Solid State Hard Drives for Business". Kingston.com. 2017-03-05. Retrieved 2017-05-03.
  4. ^ Clain Anderson (2011-02-16). "Opal – More than a Semi-Precious Stone | Lenovo". Blog.lenovo.com. Retrieved 2017-05-03.
  5. ^ "Micron Technology, Inc. - Full SSD Part Catalog". Micron.com. Retrieved 2017-05-03.
  6. ^ "Samsung V-NAND SSD". Samsung.com. Retrieved 2017-05-03.
  7. ^ "Archived copy". Archived from the original on 2014-08-03. Retrieved 2014-08-02. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)CS1 maint: archived copy as title (link)
  8. ^ "News". Seagate. Retrieved 2017-05-03.
  9. ^ "Full Disk Encryption Software, Hard Drives, SSDs & Whole Disk". WinMagic. Retrieved 2017-05-03.
  10. ^ "Fujitsu Develops HDD Security Technology based on Opal SSC Standards - Fujitsu Global". Fujitsu.com. Retrieved 2017-05-03.
  11. ^ "Specialty | TOSHIBA Storage & Electronic Devices Solutions Company | Americas". Storage.toshiba.com. Retrieved 2017-05-03.
  12. ^ "Specialty | TOSHIBA Storage & Electronic Devices Solutions Company | Americas". Storage.toshiba.com. Retrieved 2017-05-03.
  13. ^ "Marvell Technology Group Ltd". Marvell.com. Retrieved 2017-05-03.
  14. ^ "Archived copy". Archived from the original on 2013-08-08. Retrieved 2013-08-01. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)CS1 maint: archived copy as title (link)
  15. ^ "Self-Healing Endpoint Security". Absolute. Retrieved 2017-05-03.
  16. ^ "Industry-Leading Cyber Security Keeps Networks, Data Centers, Mobile Devices & Endpoints One Step Ahead | Check Point Software". Checkpoint.com. Retrieved 2017-05-03.
  17. ^ "Data Security | Dell United States". Dell.com. 2017-04-26. Retrieved 2017-05-03.
  18. ^ "Archived copy". Archived from the original on 2012-02-09. Retrieved 2012-01-14. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)CS1 maint: archived copy as title (link)
  19. ^ "McAfee Corporate KB - KB75045". Kc.mcafee.com. Retrieved 2017-05-03.
  20. ^ "Archived copy". Archived from the original on 2012-01-26. Retrieved 2012-01-14. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)CS1 maint: archived copy as title (link)
  21. ^ "Comprehensive Data Encryption and Protection Solutions - SecureDrive". Softexinc.com. 2014-06-20. Retrieved 2017-05-03.
  22. ^ "Full Disk Encryption | Always-On, Multi-Platform Enterprise Encryption Synchronizes Devices, Hard Drives, Removable Media, BitLocker, and Cloud Storage Protection in Real-Time". Sophos.com. Retrieved 2017-05-03.
  23. ^ "Endpoint Encryption Powered by PGP Technology". Symantec.com. Retrieved 2017-05-03.
  24. ^ "Archived copy". Archived from the original on 2017-09-25. Retrieved 2016-02-03. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)CS1 maint: archived copy as title (link)
  25. ^ "Data Protection – Endpoint and Gateway Suites | Trend Micro". Us.trendmicro.com. Retrieved 2017-05-03.
  26. ^ "Full Disk Encryption Software, Hard Drives, SSDs & Whole Disk". WinMagic. Retrieved 2017-05-03.
  27. ^ "Dell Official Site | Dell United States". Dell.com. 2017-04-26. Retrieved 2017-05-03.
  28. ^ "Laptop Computers, Desktops, Printers and more | HP® Official Site". Hp.com. Retrieved 2017-05-03.
  29. ^ [1] Archived 2008-08-28 at the Wayback Machine
  30. ^ "Fujitsu News Updates - Fujitsu UK". Fujitsu.com. Retrieved 2017-05-03.
  31. ^ "Panasonic Toughpad | Rugged Tablet | Toughpad". Panasonic.com. 2015-10-27. Retrieved 2017-05-03.
  32. ^ "Rugged Notebooks, Tablets, Handhelds and Laptops from". Getac.com. Retrieved 2017-05-03.