Opal Storage Specification

The Opal Storage Specification is a set of specifications for features of data storage devices (such as disk drives) that enhance their security. For example, it defines a way of encrypting the stored data so that an unauthorized person who gains possession of the device cannot see the data. That is, it is a specification for self-encrypting drives (SED).

The specification is published by the Trusted Computing Group Storage Workgroup.

SSC Overview

The Opal SSC (Security Subsystem Class) is an implementation profile for Storage Devices built to:

  • Protect the confidentiality of stored user data against unauthorized access once it leaves the owner's control (involving a power cycle and subsequent deauthentication).
  • Enable interoperability between multiple SD vendors.[1]

Functions

The Opal SSC encompasses these functions:

  • Security provider support
  • Interface communication protocol
  • Cryptographic features
  • Authentication
  • Table management
  • Access control and personalization
  • Issuance
  • SSC discovery

Features

  • Security Protocol 1 support
  • Security Protocol 2 support
  • Communications
  • Protocol stack reset commands

Security

Radboud University researchers indicated in November 2018 that some hardware encryption, including some Opal implementations, had security vulnerabilities.[2]

Implementers of SSC

Device Companies

Storage Controller Companies

Software companies

Computer OEMs

References

  1. TCG Storage Security Subsystem Class: Opal Specification Version 2.01 Revision 1.00. Trusted Computing Group, Incorporated. 05 August 2015. Retrieved 2019-11-22.
  2. Meijer, Carlo; van Gastel, Bernard. "Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)" (PDF). Radboud University. Radboud University. Retrieved November 5, 2018.
  3. "Intel® SSD Pro 1500 Series (M.2): Specs". Intel.com. Retrieved 2017-05-03.
  4. "Solid State Hard Drives for Business". Kingston.com. 2017-03-05. Retrieved 2017-05-03.
  5. Clain Anderson (2011-02-16). "Opal – More than a Semi-Precious Stone | Lenovo". Blog.lenovo.com. Retrieved 2017-05-03.
  6. "Micron Technology, Inc. - Full SSD Part Catalog". Micron.com. Retrieved 2017-05-03.
  7. "Samsung V-NAND SSD". Samsung.com. Retrieved 2017-05-03.
  8. "Archived copy". Archived from the original on 2014-08-03. Retrieved 2014-08-02.CS1 maint: archived copy as title (link)
  9. "News". Seagate. Retrieved 2017-05-03.
  10. "Full Disk Encryption Software, Hard Drives, SSDs & Whole Disk". WinMagic. Retrieved 2017-05-03.
  11. "Fujitsu Develops HDD Security Technology based on Opal SSC Standards - Fujitsu Global". Fujitsu.com. Retrieved 2017-05-03.
  12. "Specialty | TOSHIBA Storage & Electronic Devices Solutions Company | Americas". Storage.toshiba.com. Retrieved 2017-05-03.
  13. "Specialty | TOSHIBA Storage & Electronic Devices Solutions Company | Americas". Storage.toshiba.com. Retrieved 2017-05-03.
  14. "Marvell Technology Group Ltd". Marvell.com. Retrieved 2017-05-03.
  15. "Archived copy". Archived from the original on 2013-08-08. Retrieved 2013-08-01.CS1 maint: archived copy as title (link)
  16. "Self-Healing Endpoint Security". Absolute. Retrieved 2017-05-03.
  17. "Industry-Leading Cyber Security Keeps Networks, Data Centers, Mobile Devices & Endpoints One Step Ahead | Check Point Software". Checkpoint.com. Retrieved 2017-05-03.
  18. "Data Security | Dell United States". Dell.com. 2017-04-26. Retrieved 2017-05-03.
  19. "Archived copy". Archived from the original on 2012-02-09. Retrieved 2012-01-14.CS1 maint: archived copy as title (link)
  20. "McAfee Corporate KB - KB75045". Kc.mcafee.com. Retrieved 2017-05-03.
  21. "Archived copy". Archived from the original on 2012-01-26. Retrieved 2012-01-14.CS1 maint: archived copy as title (link)
  22. "Comprehensive Data Encryption and Protection Solutions - SecureDrive". Softexinc.com. 2014-06-20. Retrieved 2017-05-03.
  23. "Full Disk Encryption | Always-On, Multi-Platform Enterprise Encryption Synchronizes Devices, Hard Drives, Removable Media, BitLocker, and Cloud Storage Protection in Real-Time". Sophos.com. Retrieved 2017-05-03.
  24. "Endpoint Encryption Powered by PGP Technology". Symantec.com. Retrieved 2017-05-03.
  25. "Archived copy". Archived from the original on 2017-09-25. Retrieved 2016-02-03.CS1 maint: archived copy as title (link)
  26. "Data Protection – Endpoint and Gateway Suites | Trend Micro". Us.trendmicro.com. Retrieved 2017-05-03.
  27. "Full Disk Encryption Software, Hard Drives, SSDs & Whole Disk". WinMagic. Retrieved 2017-05-03.
  28. "Dell Official Site | Dell United States". Dell.com. 2017-04-26. Retrieved 2017-05-03.
  29. "Laptop Computers, Desktops, Printers and more | HP® Official Site". Hp.com. Retrieved 2017-05-03.
  30. Archived 2008-08-28 at the Wayback Machine
  31. "Fujitsu News Updates - Fujitsu UK". Fujitsu.com. Retrieved 2017-05-03.
  32. "Panasonic Toughpad | Rugged Tablet | Toughpad". Panasonic.com. 2015-10-27. Retrieved 2017-05-03.
  33. "Rugged Notebooks, Tablets, Handhelds and Laptops from". Getac.com. Retrieved 2017-05-03.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.