FIPS 140-2 Security Policy SafeZone FIPS Cryptographic Module INSIDE Secure Oy (formerly a division of AuthenTec Inc.) Eerikinkatu 28 FI-00180 Helsinki Finland Phone: +358-20-5007819 INSIDE Secure Corporate Headquarters Rue de la carrière de Bachasson Lieu dit BACHASSON 13590 MEYREUIL Phone: +33 (0)4 42 905 905 2015-05-27 Revision B Software Version 1.1.0 Document Number: FIPS-2015-0112 Non-proprietary security policy. This document may be freely distributed in its entirety without modification. Page 1 of 35 1 Introduction .................................................................................................................. 4 1.1 Purpose................................................................................................................ 6 1.2 Security level ...................................................................................................... 6 1.3 Glossary .............................................................................................................. 6 2 Ports and Interfaces ...................................................................................................... 8 3 Roles, Services, and Authentication ............................................................................ 9 3.1 Roles and Services ............................................................................................ 10 3.1.1 User Role ...................................................................................................... 10 3.1.2 Crypto-officer Role ....................................................................................... 10 3.2 Authentication Mechanisms and Strength ........................................................ 11 4 Secure Operation and Security Rules ........................................................................ 12 4.1 Security Rules ................................................................................................... 12 4.2 Physical Security Rules..................................................................................... 13 4.3 Secure Operation Initialization Rules ............................................................... 13 5 Definition of SRDIs (Security Relevant Data Items) Modes of Access .................... 14 5.1 FIPS Approved and Allowed algorithms .......................................................... 14 5.2 Non-FIPS mode of operation ............................................................................ 18 5.3 Cryptographic Keys, CSPs, and SRDIs ............................................................ 20 5.4 Access Control Policy ....................................................................................... 25 5.5 User Guide ........................................................................................................ 30 5.5.1 NIST SP 800-108: Key Derivation Functions .............................................. 30 5.5.2 NIST SP 800-132: Password-Based Key Derivation Function .................... 30 5.5.3 NIST SP 800-38D: Galois/Counter Mode .................................................... 30 5.5.4 NIST SP 800-90: Deterministic Random Bit Generator............................... 31 5.5.4.1 iOS entropy source ................................................................................ 31 5.5.4.2