Securing important information is crucial in many applications.
Generally, highly secured environments do not allow any test equipment to leave the
area unless it can be proven that no user information leaves with the test equipment,
e.g. to be calibrated.
"Regarding sanitization, the principal concern is ensuring that data is not unintentionally released" [1].
This document provides a statement regarding the volatility of the memory types used
and specifies the steps required to sanitize an instrument.
The procedures in this document follow "NIST Special Publication 800-88: Guidelines
for Media Sanitization" [1].
In addition, recommendations are provided to safeguard information on the R&S ZPH.
References
See the following literature for further information.
[1]Kissel Richard L. [et al.] Guidelines for Media Sanitization = Special Publication (NIST SP) =
[2]National Industrial Security Program Authorization Office Defense Security Service (DSS)
Assessment and Authorization Process Manual (DAAPM). - May 6, 2019.
[3]ACSC Australian Cyber Security Centre Australian Government Information Security Manual,
January 2020.
3Instrument Security Procedures 1178.9390.02 ─ 02
R&S®ZPH
Instrument Models Covered
2Instrument Models Covered
Table 2-1: R&S ZPH models
Product nameOrder number
R&S ZPH1321.1211.02
R&S ZPH1321.1211.12
R&S ZPH1321.1211.52, equivalent to 1321.1211.02
3Security Terms and Definitions
Terms defined in Guidelines for Media Sanitization
NIST Special Publication 800-88 [1]
●
Sanitization
"Media sanitization refers to a process that renders access to target data on the
media infeasible for a given level of effort."
●
Clear
"Clear applies logical techniques to sanitize data in all user-addressable storage
locations for protection against simple non-invasive data recovery techniques; typically applied through the standard Read and Write commands to the storage
device, such as by rewriting with a new value or using a menu option to reset the
device to the factory state (where rewriting is not supported)."
●
Purge
"Purge applies physical or logical techniques that render Target Data recovery
infeasible using state of the art laboratory techniques."
●
Destroy
"Destroy renders Target Data recovery infeasible using state of the art laboratory
techniques and results in the subsequent inability to use the media for storage of
data."
Control of media
Another option is to keep physical media holding sensitive information within the classified area, see [1], paragraph 4.4.
Volatile memory
"Memory components that do not retain data after removal of all electrical power sources, and when reinserted into a similarly configured system, are considered volatile
memory components." [2]
The volatile memory in the instrument does not have battery backup. It loses its contents when power is removed from the instrument.
4Instrument Security Procedures 1178.9390.02 ─ 02
R&S®ZPH
Statement of Volatility
Volatile Memory
If the instrument is battery operated, e.g. handhelds, it retains data in the volatile memory as long as the battery is installed.
Typical examples are RAM, e.g. SDRAM.
Non-volatile memory
"Components that retain data when all power sources are discontinued are non-volatile
memory components." [2].
In the context of this document, non-volatile memory components are non-user accessible internal memory types, e.g. EEPROM, Flash, etc.
Media
Media are types of non-volatile memory components. Media are user-accessible and
retain data when you turn off power.
In the context of this document, media types are Hard Disk Drives (HDD), Solid State
Drives (SSD), Memory Cards, e.g. SD, microSD, CFast, etc., USB removable media,
e.g. Pen Drives, Memory Sticks, Thumb Drives, etc. and similar technologies.
4Statement of Volatility
The R&S ZPH Cable and Antenna Analyzer contains various memory components.
See the subsequent sections for a detailed description regarding type, size, usage and
location.
Notes on memory sizes
Due to the continuous development of memory components, the listed values of memory sizes may not represent the current, but the minimal configuration.
4.1Volatile Memory
Volatile memory modules are considered as non-accessible internal memory devices,
as described in Security Terms and Definitions > Volatile Memory. It requires power to
retain data and when the power is turned off, all data is erased.
5Instrument Security Procedures 1178.9390.02 ─ 02
R&S®ZPH
Table 4-1: Types of volatile memory
Statement of Volatility
Media
Memory
type
SDRAMMainboard512 MbyteTemporary information storage for
SRAMFrontboard
LocationSizeContentUser
operating system and instrument
firmware
4 kbyteTemporary information storage for
(µController internal)
Power-up / Power-down firmware
4.2Non-Volatile Memory
Non-volatile memory modules are considered as non-accessible internal memory devices, as described in Security Terms and Definitions > Non-volatile Memory. It does not
require power to maintain the stored data.
Table 4-2: Types of non-volatile memory
Memory
type
FlashFrontboard
FlashMainboard128 Mbyte
LocationSizeContentUser
32 kbytePower-up / Power-down firmwareNoNone required (no user data
(µController internal)
●
Operating system
●
Instrument firmware
●
Boot code
●
Calibration correction data,
device options and serial
number
●
User data and instrument
settings
Sanitization procedure
Data
YesTurn off instrument power and
remove the battery.
See Chapter 5, "Instrument Sani-
tization Procedure", on page 7
No
Sanitization procedure
Data
See Chapter 5, "Instrument Sani-
tization Procedure", on page 7
Yes
4.3Media
Media are considered as non-volatile memory devices, as described in Security Terms
and Definitions > Media.
Table 4-3: Types of media memory modules
Memory
type
FlashInstrument top viewn.a.n.a.YesRemove memory device and keep
microSDInstrument rear view.
LocationSizeContentUser
Data
n.a.n.a.Yes
Behind the battery
compartment.
Sanitization procedure
it under organizational control.
See See Chapter 5, "Instrument
Sanitization Procedure",
on page 7
6Instrument Security Procedures 1178.9390.02 ─ 02
R&S®ZPH
Instrument Sanitization Procedure
Non-volatile Memory
5Instrument Sanitization Procedure
Firmware greater or equal 1.30 is required for the instrument declassification.
5.1Volatile Memory
Removing power
1. Turn off the R&S ZPH.
2. Remove the battery.
Leave the instrument powered off at least for 10 minutes to make sure that all volatile memory modules lose their contents.
5.2Non-volatile Memory
The Flash does not lose its contents when power is removed. It can contain user data.
Sanitizing the non-volatile memory
The Flash is cleared by executing the sanitizing procedure provided on the instrument.
The sanitizing procedure complies to the definition of NIST, see "Terms defined in
Guidelines for Media Sanitization"on page 4.
NOTICE! Risk of loosing data. The sanitization procedure clears all user data and
1.
resets the instrument.
Back up all data you want to keep.
2. Remove all media:
a) Disconnect USB mass memory.
b) Remove microSD card.
For information on how to proceed, see the corresponding instructions in the
user manual of the R&S ZPH.
3. Keep the media memory devices under organizational control.
NOTICE! Risk of instrument damage when interrupting the sanitizing procedure.
4.
Do not turn off or disconnect the R&S ZPH from the mains while the sanitizing procedure is running.
Wait until the instrument confirms the completed sanitizing.
To activate the sanitizing procedure, press and hold the [PRESET] and [F5] keys
while switching on the instrument.
7Instrument Security Procedures 1178.9390.02 ─ 02
R&S®ZPH
Validity of Instrument Calibration after Sanitization
After a few seconds, the sanitizing procedure starts.
The sanitizing procedure takes approximately 8 minutes, indicated by the message
"Secure Formatting Flash, please wait!" on the screen.
When completed, the instrument reboots automatically.
6Validity of Instrument Calibration after Sani-
tization
The validity of the R&S ZPH cable and antenna analyzer's calibration is maintained
throughout the sanitization.
Glossary: Terminology for instrument security procedures
C
CFast: Compact Fast - compact flash mass memory device.
D
DRAM: Dynamic Random Access Memory.
H
HDD: Hard disk drive.
M
microSD: Micro Solid State Drive - memory card.
S
SD: Solid-state Drive - memory card.
SSD: ATA Solid State Drives (including PATA, SATA, eSATA, mSATA,...).
Control of media ............................................................................................................................................... 4
see References .......................................................................................................................................... 3
Terms and definitions ................................................................................................................................. 5
Terms and definitions ................................................................................................................................. 5
Remove power ........................................................................................................................................... 7
Statement of volatility ....................................................................................................................................... 5
9Instrument Security Procedures 1178.9390.02 ─ 02
R&S®ZPH
Index
T
Terms and definitions ....................................................................................................................................... 4
Control of media ......................................................................................................................................... 4
Media ......................................................................................................................................................... 5
Terms and definitions ................................................................................................................................. 4