12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 9: Compliance and StorageEach organization has different security requirements and requires differentdegrees of security, hence FIPS 140-2 defines four securitylevels (see below). The lowest security level begins at 1 and each subsequentlevel builds upon the previous ones.The actual certification of the cryptographic module is performed byan independent lab, which validates the product to ensure it meets thecriteria required for the Security Level being sought by the vendor.Once the tests are completed, the results are submitted to NIST andupon their approval the product is officially posted on the NIST websiteat http://csrc.nist.gov/groups/STM/cmvp/validation.html.Security Level 1Security Level 1 provides the lowest level of security and it basicallydefines production-grade equipment with no physical security. Prettymuch any product using a cryptographic module would qualify for thislevel of certification. An example of a Security Level 1 certified productis an ordinary laptop with a software-based encryption module.Security Level 2Security Level 2 enhances Security Level 1 with the tamper evidencerequirement. Tamper evidence is implemented using special coatingsor seals or pick-resistant locks for removable covers and doors. If a protectivecover or door is tampered with to allow physical access tocritical security parameters or keys stored in the cryptographic module,the coatings or seals will be broken and permanently modified.Additionally, role-based authentication must be used to authenticatean operator with a specific role that allows them to perform certaintasks, such as deleting keys.Security Level 3Security Level 3 builds upon Security Level 2 with the addition of tamper-resistantmechanisms to prevent someone from gaining access tothe critical security parameters (CSP) stored in the cryptographic module.This may include tamper detection and response systems, whichcould, for example, zeroize the keys stored in the local cache when thecover or door is opened.Security Level 3 must also include identity-based authentication mechanismsto authenticate a specific individual and verify that they areauthorized to perform the specified task.Security Level 3 also requires that plaintext CSPs be exchanged usingdifferent ports than those used for other purposes (such as managementinterfaces). This enforces the principle of separation of duties to164 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!