Certified/Validated Products List

Hitachi Virtual Storage Platform,
Hitachi Virtual Storage Platform VP9500
Control Program
70-02-05-00/00(R7-02-06A)

Hitachi, Ltd.
Last Updated 2011-12-26
Product Name :
Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program
Version of TOE :
70-02-05-00/00(R7-02-06A)
Product Type :
Control Program for storage system
Certification No. :
C0315
Date :
2011-09-30
Version of Common Criteria:
3.1
Conformance Claim :
EAL2
PP Identifier :
None

PRODUCT DESCRIPTION

Description of TOE

The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system.


TOE security functionality

The TOE has the following security functions to protect user data stored in the storage system.

- Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources
- Controlling accesses from host computers to the granted logical devices in the storage system.
- Authentication of host computers
- Identification and authentication of Storage Navigator users and support personnel
- Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers.
- Encryption of stored data(Encryption key management)
- Shredding
- Audit logging

Security functional requirements

This TOE implements the following security functional requirements.

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels