Rohde&Schwarz R&S®SMCV100B Instrument Security Procedures User Manual

R&S®SMCV100B Vector Signal Generator Instrument Security Procedures
1179255402 Version 01
This document describes the types of memory and their usage in the R&S®SMCV100B Vector Signal Generator.
© 2020 Rohde & Schwarz GmbH & Co. KG
Mühldorfstr. 15, 81671 München, Germany
Phone: +49 89 41 29 - 0
Email: info@rohde-schwarz.com
Internet: www.rohde-schwarz.com
Subject to change – data without tolerance limits is not binding.
R&S® is a registered trademark of Rohde & Schwarz GmbH & Co. KG.
Trade names are trademarks of the owners.
1179.2554.02 | Version 01 | R&S®SMCV100B
Throughout this document, products from Rohde & Schwarz are indicated without the ® symbol , e.g. R&S®SMCV100B is indicated
as R&S SMCV100B.
R&S®SMCV100B

1 Overview

Overview
Securing important information is crucial in many applications.
In many cases, it is imperative that the R&S SMCV100B instruments are used in a secured environment. Generally, highly secured environments do not allow any test equipment to leave the area unless it can be proven that no user information leaves with the test equipment, e.g. to be calibrated.
"Regarding sanitization, the principal concern is ensuring that data is not unintention­ally released" [1].
This document provides a statement regarding the volatility of the memory types used and specifies the steps required to sanitize an instrument.
The procedures in this document follow "NIST Special Publication 800-88: Guidelines for Media Sanitization" [1].
In addition, recommendations are provided to safeguard information on the R&S SMCV100B.
References
See the following literature for further information.
[1] Kissel Richard L. [et al.] Guidelines for Media Sanitization = Special Publication (NIST SP) =
NIST SP - 800-88 Rev 1. - Gaithersburg : [s.n.], December 17, 2014.
[2] National Industrial Security Program Authorization Office Defense Security Service (DSS)
Assessment and Authorization Process Manual (DAAPM). - May 6, 2019.
3Instrument Security Procedures 1179.2554.02 ─ 01
R&S®SMCV100B

2 Instrument Models Covered

Instrument Models Covered
Table 2-1: R&S SMCV100B models
Product name Order number
R&S SMCV100B 1432.7000K02
4Instrument Security Procedures 1179.2554.02 ─ 01
R&S®SMCV100B

3 Security Terms and Definitions

Security Terms and Definitions
Terms defined in Guidelines for Media Sanitization
NIST Special Publication 800-88 [1]
Sanitization
"Media sanitization refers to a process that renders access to target data on the media infeasible for a given level of effort."
Clear
"Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques; typi­cally applied through the standard Read and Write commands to the storage device, such as by rewriting with a new value or using a menu option to reset the device to the factory state (where rewriting is not supported)."
Purge
"Purge applies physical or logical techniques that render Target Data recovery infeasible using state of the art laboratory techniques."
Destroy
"Destroy renders Target Data recovery infeasible using state of the art laboratory techniques and results in the subsequent inability to use the media for storage of data."
Control of media
Another option is to keep physical media holding sensitive information within the classi­fied area, see [1], paragraph 4.4.
Volatile memory
"Memory components that do not retain data after removal of all electrical power sour­ces, and when reinserted into a similarly configured system, are considered volatile memory components." [2]
The volatile memory in the instrument does not have battery backup. It loses its con­tents when power is removed from the instrument. The volatile memory is not a secur­ity concern.
Typical examples are RAM, e.g. SDRAM.
Non-volatile memory
"Components that retain data when all power sources are discontinued are non-volatile memory components." [2].
In the context of this document, non-volatile memory components are non-user acces­sible internal memory types, e.g. EEPROM, Flash, etc.
5Instrument Security Procedures 1179.2554.02 ─ 01
R&S®SMCV100B
Security Terms and Definitions
Media
Media are types of non-volatile memory components. Media are user-accessible and retain data when you turn off power.
In the context of this document, media types are Hard Disk Drives (HDD), Solid State Drives (SSD), Memory Cards, e.g. SD, microSD, CFast, etc., USB removable media, e.g. Pen Drives, Memory Sticks, Thumb Drives, etc.) and similar technologies.
6Instrument Security Procedures 1179.2554.02 ─ 01
Loading...
+ 11 hidden pages