SlideShare a Scribd company logo
1 of 4
Download to read offline
Technology Paper

DriveTrust™ Technology:
A Technical Overview




Introduction
As the importance of digital information increases, so does the
need to secure that information. Through DriveTrust™ technology,
Seagate® is ushering in a new era of secure computing.
Data security can be managed at the network and local computing
levels with firewalls, antivirus software and smart cards, but data
remains vulnerable to theft or loss. The hard drive is a critical
element in the computing chain because it is where sensitive data
is stored.
DriveTrust technology implements security on the hard drive itself,
to provide a foundation for trusted computing.

What is DriveTrust Technology?
DriveTrust technology is a drive-level platform for hardware-based
security that takes advantage of the hard drive’s closed computing
environment. While operating system environments are designed
to enable widespread application support, hard drives are closed
computing environments running specialized code (firmware)
to manage drive functions. The hard drive is an ideal place to
implement data security, because its internal operations are sealed
from other elements of the computing system.
The DriveTrust platform does more than protect data stored on the
disk. It establishes trust for data sent between the host and drive
and allows the drive to authenticate applications, assign secure
storage partitions, handle digital signatures and deliver many other
security functions.
DriveTrust technology provides developers and IT administrators
the tools they need to easily and cost-effectively secure the
computing environment. DriveTrust resources are like a toolbox of
hardware-based security functions that secure digital information.
DriveTrust Technology:
A Technical Overview



            Elements of DriveTrust Technology                              DriveTrust-equipped drives can make these
                                                                           secure partitions exclusively available to
            DriveTrust technology comprises four elements,
                                                                           applications that present the proper credentials
            as illustrated in Figure 1.
                                                                           to store application code, additional content or
                                                                           data. ISVs can make use of this capability to build
                                                                           applications with additional features including
                                                                           stronger authentication, time stamping, forensic
                                                                           logging or transaction data.
                                                                           4. Issuance protocol
                                                                           Software applications, basic input/output
                                                                           systems and other programs interoperate with
            Figure 1: The DriveTrust framework includes enhanced firmware
                                                                           the DriveTrust-equipped drive through strictly
            and hardware, the trusted send/receive command set, secure
                                                                           controlled communication channels. ISVs and
            partitions on the drive and the issuance protocol.
                                                                           other developers can write applications and
                                                                           have them assigned to a secure partition in the
            1. Enhanced firmware and hardware
                                                                           drive through the issuance protocol. Anytime
            Firmware is the software that runs on the drive’s              the application attempts to access those secure
            internal computer. It is normally used to manage               resources, it must present its credentials—given
            extremely complex drive functions, such as                     under the issuance protocol—to the administrator
            moving the read/write heads, tracking bad                      function in the drive. The administrator function
            sectors on the disk and storing bitmaps of where               authenticates the application, activates the
            data is located. DriveTrust technology extends a               appropriate secure partition, and allows the
            drive’s capabilities with additional security code             application to interact with the secure partition
            optimized on the drive’s computing resources.                  through the trusted send/receive command set.
            DriveTrust technology implements on the drive
                                                                           DriveTrust Technology in Action
            a cryptographic service provider that provides
            encryption, hashing, secure storage, decryption,               By facilitating the security of digital data where
            digital signature and random-number generating                 it is stored, DriveTrust technology becomes a
            functions.                                                     solid foundation for a secure IT environment.
                                                                           DriveTrust capabilities can be applied to solve
            2. Trusted send/receive command set
                                                                           data security issues within most organizations.
            Trusted storage requires a secure communication
                                                                           These applications include:
            infrastructure. DriveTrust communications are
                                                                           • Full disk encryption. A combination of strong
            sent through the trusted send/receive (in/out)
                                                                             authentication and encryption protects data
            command set, designed in collaboration with
                                                                             against theft or loss. This solution automatically
            the standards bodies that define ATA and SCSI
                                                                             encrypts and decrypts all the data that travels
            interfaces. Secure messaging has been designed
                                                                             in and out of the drive. Unlike other data
            into the ATA and SCSI interface protocol to enable
                                                                             encryption applications, DriveTrust encryption
            support for security technologies, including
                                                                             keys are password-protected and never appear
            DriveTrust technology.
                                                                             in the clear or in any readable format on the
            3. Secure partitions
                                                                             drive.
            A 200-GB hard drive reserves roughly                           • Secure erase for repurposing or end-of-
            200 MB of unaddressable disk space for internal                  life disposal. Government entities and large
            system storage. DriveTrust technology uses this                  corporations spend millions of dollars to
            space to create secure partitions that are both                  ensure that sensitive data is not recovered from
            logically and physically separated from the rest                 discarded or repurposed hard drives. Simply
            of the drive storage, with strong conditional                    changing the encryption key on a DriveTrust
            access controls—providing an excellent place                     drive instantaneously and securely renders all
            to store cryptographic keys and other sensitive                  stored data unreadable and unusable. It can
            information.                                                     be done in seconds and eliminates the time
2
DriveTrust Technology:
A Technical Overview



              and potential for human error associated with      3.5-inch DB35 Series drives use DriveTrust
              standard disk erase techniques.                    technology to pair drives and set-top devices to
                                                                 protect content stored on the drives. DriveTrust
            • Hardware-based security for biometric
                                                                 technology allows DB35 Series drives to engage
              authentication data. Biometric authentication
                                                                 in a dual challenge-response authentication
              is the cutting-edge technology used to verify
                                                                 procedure upon startup, using cryptographically
              users, but what happens when the biometric
                                                                 protected credentials securely stored on a hidden
              credentials themselves are compromised?
                                                                 partition.
              DriveTrust technology allows software
              applications to store biometric data in secure     The 2.5-inch Momentus 5400 FDE.2 drive
              partitions on hidden portions of the hard drive    automatically encrypts all data, restricting access
              for the strongest security.                        to those with the appropriate cryptographic keys.
            • Centralized authentication and                     The drive uses a specialized chip to efficiently
              credentialing for DriveTrust-equipped              encrypt and decrypt all the data stored on the
              drives in multiple drive environments,             drive with no performance penalty. DriveTrust
              such as storage area networks, network             provides strong authentication and stores the
              attached storage and redundant arrays of           encryption keys in a secure partition using a
              independent disks. An open standard is being       cryptographically derived format.
              developed within the Trusted Computing Group
                                                                 Leading the Industry Towards Open Standards
              that will allow enterprises to implement policy-
              driven authentication across their networked or    The Trusted Computing Group is a not-for-profit
              array-based storage infrastructure, providing      industry organization formed to develop, define
              a security management infrastructure for           and promote open standards for hardware-
              DriveTrust technology drives in storage            enabled trusted computing and security
              systems. This base-level protection provided       technologies. Seagate and other industry leaders
              by DriveTrust technology will complement other     involved in the Trusted Computing Group (TCG)—
              security measures implemented higher up the        including AMD, Hewlett-Packard, IBM, Intel,
              storage architecture.                              Microsoft and Sun Microsystems—are working
            • Enterprise management of USB-attached              together to develop technology to ensure that
              external hard drives through drive pairing         elements in the computing environment behave in
              and encryption. USB-attached external              an expected manner for their intended purpose.
              hard drives pose a serious risk to IT security     These trusted elements, also called roots of trust,
              because gigabytes of stored information can        can be used to authenticate other elements and
              be copied and stolen in a matter of minutes. IT    control access to the system.
              departments can use DriveTrust drive-pairing
                                                                 Seagate introduced DriveTrust technology to the
              functionality so that department computers
                                                                 Trusted Computing Group as a framework for
              only work with authorized external hard drives.
                                                                 developing an open standard for extending trust
                                                                 and security to storage devices. Subsequently,
            Who Uses DriveTrust Technology?
                                                                 the Storage Work Group was formed, comprised
            DriveTrust technology gives both individuals and
                                                                 of all leading disk drive manufacturers as well as
            businesses a security foundation that protects
                                                                 flash storage, storage management and storage
            sensitive data and enables additional application
                                                                 integration vendors. Seagate chairs the Storage
            functions. Independent software vendors (ISVs)
                                                                 Work Group and actively contributes to the
            and computer makers can use the DriveTrust
                                                                 standardization effort.
            software development kit offered by Seagate to
                                                                 The Storage Work Group is developing the
            integrate or leverage security capabilities.
                                                                 Core Storage Specification that will enable
            Seagate offers two product lines that feature
                                                                 secure storage solutions that protect data and
            DriveTrust technology: DB35 Series™ drives
                                                                 interoperate with trusted systems. The primary
            for digital video recorders and Momentus®
                                                                 goal is to help users protect information assets
            5400 FDE drives—the first hard drive with full
                                                                 such as data, passwords, and encryption keys
            disk encryption—for notebook computers. The
                                                                 from attack and theft. DriveTrust-equipped drives
3
DriveTrust Technology:
A Technical Overview



                                          become a root of trust in the trusted computing
                                          chain, authenticating and protecting data stored
                                          on the drive.
                                          In addition, the Storage Work Group has
                                          collaborated with the advanced technology
                                          attachment (ATA) and small computer system
                                          interface (SCSI) standards bodies to incorporate a
                                          security payload into ATA and SCSI trusted send/
                                          receive protocols. The Core Storage Specification
                                          defines the payload command set, and will
                                          ensure that all storage devices using ATA and
                                          SCSI interfaces—including USB-attached flash
                                          devices, tape drives and hard drives—will be able
                                          to recognize trusted send/receive commands.
                                          The Core Storage Specification is currently being
                                          prepared for publication, and future DriveTrust
                                          products will comply with the open standard.

                                          Seagate: The Leader in Drive-Based Security
                                          DriveTrust technology provides the tools
                                          necessary to turn the hard drive into a root
                                          of trusted computing. Security provided by
                                          DriveTrust technology is essentially transparent
                                          to the user and is not burdensome to general
                                          computing resources.
                                          Seagate continues to pioneer drive-based
                                          security and make the technology available to
                                          ISVs and technology vendors, with the goal of
                                          making the overall computing environment more
                                          secure for both business and home users.
                                          To find out more about how DriveTrust technology
                                          can be used and how it addresses compliance
                                          issues, please see our DriveTrust technology
                                          general overview white paper and DriveTrust
                                          technology compliance white paper.
                                          For more information on the Trusted Computing
                                          Group, including continuing work in the TCG’s
                                          Storage Working Group, visit their Web site at
                                          www.trustedcomputinggroup.org.




                     AMERICAS             Seagate Technology LLC 920 Disc Drive, Scotts Valley, California 95066, United States, 831-438-6550
                  ASIA/PACIFIC            Seagate Technology International Ltd. 7000 Ang Mo Kio Avenue 5, Singapore 569877, 65-6485-3888
EUROPE, MIDDLE EAST AND AFRICA            Seagate Technology SAS 130–136, rue de Silly, 92773, Boulogne-Billancourt Cedex, France 33 1-4186 10 00

Copyright © 2006 Seagate Technology LLC. All rights reserved. Printed in USA. Seagate, Seagate Technology and the Wave logo are registered trademarks of Seagate
Technology LLC in the United States and/or other countries. DB35 Series, DriveTrust and Momentus are either trademarks or registered trademarks of Seagate
Technology LLC or one of its affiliated companies in the United States and/or other countries. All other trademarks or registered trademarks are the property of
their respective owners. One gigabyte, or GB, equals one billion bytes when referring to hard drive capacity. Accessible capacity may vary depending on operating
environment and formatting. Seagate reserves the right to change, without notice, product offerings or specifications. Publication Number: TP564, October 2006

More Related Content

Viewers also liked (11)

Eureka Peringkat Negeri Selangor 2011
Eureka Peringkat Negeri Selangor 2011Eureka Peringkat Negeri Selangor 2011
Eureka Peringkat Negeri Selangor 2011
 
Survey of Percona Toolkit
Survey of Percona ToolkitSurvey of Percona Toolkit
Survey of Percona Toolkit
 
Extensible Data Modeling
Extensible Data ModelingExtensible Data Modeling
Extensible Data Modeling
 
SQL Outer Joins for Fun and Profit
SQL Outer Joins for Fun and ProfitSQL Outer Joins for Fun and Profit
SQL Outer Joins for Fun and Profit
 
Practical Object Oriented Models In Sql
Practical Object Oriented Models In SqlPractical Object Oriented Models In Sql
Practical Object Oriented Models In Sql
 
Zionism
ZionismZionism
Zionism
 
Models for hierarchical data
Models for hierarchical dataModels for hierarchical data
Models for hierarchical data
 
Sql query patterns, optimized
Sql query patterns, optimizedSql query patterns, optimized
Sql query patterns, optimized
 
Sql Injection Myths and Fallacies
Sql Injection Myths and FallaciesSql Injection Myths and Fallacies
Sql Injection Myths and Fallacies
 
Mentor Your Indexes
Mentor Your IndexesMentor Your Indexes
Mentor Your Indexes
 
Stress management Training
Stress management TrainingStress management Training
Stress management Training
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Seagate Hardware Based Encryption & Drive Trust Technical Overview

  • 1. Technology Paper DriveTrust™ Technology: A Technical Overview Introduction As the importance of digital information increases, so does the need to secure that information. Through DriveTrust™ technology, Seagate® is ushering in a new era of secure computing. Data security can be managed at the network and local computing levels with firewalls, antivirus software and smart cards, but data remains vulnerable to theft or loss. The hard drive is a critical element in the computing chain because it is where sensitive data is stored. DriveTrust technology implements security on the hard drive itself, to provide a foundation for trusted computing. What is DriveTrust Technology? DriveTrust technology is a drive-level platform for hardware-based security that takes advantage of the hard drive’s closed computing environment. While operating system environments are designed to enable widespread application support, hard drives are closed computing environments running specialized code (firmware) to manage drive functions. The hard drive is an ideal place to implement data security, because its internal operations are sealed from other elements of the computing system. The DriveTrust platform does more than protect data stored on the disk. It establishes trust for data sent between the host and drive and allows the drive to authenticate applications, assign secure storage partitions, handle digital signatures and deliver many other security functions. DriveTrust technology provides developers and IT administrators the tools they need to easily and cost-effectively secure the computing environment. DriveTrust resources are like a toolbox of hardware-based security functions that secure digital information.
  • 2. DriveTrust Technology: A Technical Overview Elements of DriveTrust Technology DriveTrust-equipped drives can make these secure partitions exclusively available to DriveTrust technology comprises four elements, applications that present the proper credentials as illustrated in Figure 1. to store application code, additional content or data. ISVs can make use of this capability to build applications with additional features including stronger authentication, time stamping, forensic logging or transaction data. 4. Issuance protocol Software applications, basic input/output systems and other programs interoperate with Figure 1: The DriveTrust framework includes enhanced firmware the DriveTrust-equipped drive through strictly and hardware, the trusted send/receive command set, secure controlled communication channels. ISVs and partitions on the drive and the issuance protocol. other developers can write applications and have them assigned to a secure partition in the 1. Enhanced firmware and hardware drive through the issuance protocol. Anytime Firmware is the software that runs on the drive’s the application attempts to access those secure internal computer. It is normally used to manage resources, it must present its credentials—given extremely complex drive functions, such as under the issuance protocol—to the administrator moving the read/write heads, tracking bad function in the drive. The administrator function sectors on the disk and storing bitmaps of where authenticates the application, activates the data is located. DriveTrust technology extends a appropriate secure partition, and allows the drive’s capabilities with additional security code application to interact with the secure partition optimized on the drive’s computing resources. through the trusted send/receive command set. DriveTrust technology implements on the drive DriveTrust Technology in Action a cryptographic service provider that provides encryption, hashing, secure storage, decryption, By facilitating the security of digital data where digital signature and random-number generating it is stored, DriveTrust technology becomes a functions. solid foundation for a secure IT environment. DriveTrust capabilities can be applied to solve 2. Trusted send/receive command set data security issues within most organizations. Trusted storage requires a secure communication These applications include: infrastructure. DriveTrust communications are • Full disk encryption. A combination of strong sent through the trusted send/receive (in/out) authentication and encryption protects data command set, designed in collaboration with against theft or loss. This solution automatically the standards bodies that define ATA and SCSI encrypts and decrypts all the data that travels interfaces. Secure messaging has been designed in and out of the drive. Unlike other data into the ATA and SCSI interface protocol to enable encryption applications, DriveTrust encryption support for security technologies, including keys are password-protected and never appear DriveTrust technology. in the clear or in any readable format on the 3. Secure partitions drive. A 200-GB hard drive reserves roughly • Secure erase for repurposing or end-of- 200 MB of unaddressable disk space for internal life disposal. Government entities and large system storage. DriveTrust technology uses this corporations spend millions of dollars to space to create secure partitions that are both ensure that sensitive data is not recovered from logically and physically separated from the rest discarded or repurposed hard drives. Simply of the drive storage, with strong conditional changing the encryption key on a DriveTrust access controls—providing an excellent place drive instantaneously and securely renders all to store cryptographic keys and other sensitive stored data unreadable and unusable. It can information. be done in seconds and eliminates the time 2
  • 3. DriveTrust Technology: A Technical Overview and potential for human error associated with 3.5-inch DB35 Series drives use DriveTrust standard disk erase techniques. technology to pair drives and set-top devices to protect content stored on the drives. DriveTrust • Hardware-based security for biometric technology allows DB35 Series drives to engage authentication data. Biometric authentication in a dual challenge-response authentication is the cutting-edge technology used to verify procedure upon startup, using cryptographically users, but what happens when the biometric protected credentials securely stored on a hidden credentials themselves are compromised? partition. DriveTrust technology allows software applications to store biometric data in secure The 2.5-inch Momentus 5400 FDE.2 drive partitions on hidden portions of the hard drive automatically encrypts all data, restricting access for the strongest security. to those with the appropriate cryptographic keys. • Centralized authentication and The drive uses a specialized chip to efficiently credentialing for DriveTrust-equipped encrypt and decrypt all the data stored on the drives in multiple drive environments, drive with no performance penalty. DriveTrust such as storage area networks, network provides strong authentication and stores the attached storage and redundant arrays of encryption keys in a secure partition using a independent disks. An open standard is being cryptographically derived format. developed within the Trusted Computing Group Leading the Industry Towards Open Standards that will allow enterprises to implement policy- driven authentication across their networked or The Trusted Computing Group is a not-for-profit array-based storage infrastructure, providing industry organization formed to develop, define a security management infrastructure for and promote open standards for hardware- DriveTrust technology drives in storage enabled trusted computing and security systems. This base-level protection provided technologies. Seagate and other industry leaders by DriveTrust technology will complement other involved in the Trusted Computing Group (TCG)— security measures implemented higher up the including AMD, Hewlett-Packard, IBM, Intel, storage architecture. Microsoft and Sun Microsystems—are working • Enterprise management of USB-attached together to develop technology to ensure that external hard drives through drive pairing elements in the computing environment behave in and encryption. USB-attached external an expected manner for their intended purpose. hard drives pose a serious risk to IT security These trusted elements, also called roots of trust, because gigabytes of stored information can can be used to authenticate other elements and be copied and stolen in a matter of minutes. IT control access to the system. departments can use DriveTrust drive-pairing Seagate introduced DriveTrust technology to the functionality so that department computers Trusted Computing Group as a framework for only work with authorized external hard drives. developing an open standard for extending trust and security to storage devices. Subsequently, Who Uses DriveTrust Technology? the Storage Work Group was formed, comprised DriveTrust technology gives both individuals and of all leading disk drive manufacturers as well as businesses a security foundation that protects flash storage, storage management and storage sensitive data and enables additional application integration vendors. Seagate chairs the Storage functions. Independent software vendors (ISVs) Work Group and actively contributes to the and computer makers can use the DriveTrust standardization effort. software development kit offered by Seagate to The Storage Work Group is developing the integrate or leverage security capabilities. Core Storage Specification that will enable Seagate offers two product lines that feature secure storage solutions that protect data and DriveTrust technology: DB35 Series™ drives interoperate with trusted systems. The primary for digital video recorders and Momentus® goal is to help users protect information assets 5400 FDE drives—the first hard drive with full such as data, passwords, and encryption keys disk encryption—for notebook computers. The from attack and theft. DriveTrust-equipped drives 3
  • 4. DriveTrust Technology: A Technical Overview become a root of trust in the trusted computing chain, authenticating and protecting data stored on the drive. In addition, the Storage Work Group has collaborated with the advanced technology attachment (ATA) and small computer system interface (SCSI) standards bodies to incorporate a security payload into ATA and SCSI trusted send/ receive protocols. The Core Storage Specification defines the payload command set, and will ensure that all storage devices using ATA and SCSI interfaces—including USB-attached flash devices, tape drives and hard drives—will be able to recognize trusted send/receive commands. The Core Storage Specification is currently being prepared for publication, and future DriveTrust products will comply with the open standard. Seagate: The Leader in Drive-Based Security DriveTrust technology provides the tools necessary to turn the hard drive into a root of trusted computing. Security provided by DriveTrust technology is essentially transparent to the user and is not burdensome to general computing resources. Seagate continues to pioneer drive-based security and make the technology available to ISVs and technology vendors, with the goal of making the overall computing environment more secure for both business and home users. To find out more about how DriveTrust technology can be used and how it addresses compliance issues, please see our DriveTrust technology general overview white paper and DriveTrust technology compliance white paper. For more information on the Trusted Computing Group, including continuing work in the TCG’s Storage Working Group, visit their Web site at www.trustedcomputinggroup.org. AMERICAS Seagate Technology LLC 920 Disc Drive, Scotts Valley, California 95066, United States, 831-438-6550 ASIA/PACIFIC Seagate Technology International Ltd. 7000 Ang Mo Kio Avenue 5, Singapore 569877, 65-6485-3888 EUROPE, MIDDLE EAST AND AFRICA Seagate Technology SAS 130–136, rue de Silly, 92773, Boulogne-Billancourt Cedex, France 33 1-4186 10 00 Copyright © 2006 Seagate Technology LLC. All rights reserved. Printed in USA. Seagate, Seagate Technology and the Wave logo are registered trademarks of Seagate Technology LLC in the United States and/or other countries. DB35 Series, DriveTrust and Momentus are either trademarks or registered trademarks of Seagate Technology LLC or one of its affiliated companies in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. One gigabyte, or GB, equals one billion bytes when referring to hard drive capacity. Accessible capacity may vary depending on operating environment and formatting. Seagate reserves the right to change, without notice, product offerings or specifications. Publication Number: TP564, October 2006