9.0About self-encrypting drives
The Trusted Computing Group (TCG) is an organization sponsored and operated by companies in the com- puter, storage and digital communications industry. Seagate’s SED models comply with the standards pub- lished by the TCG.
To use the security features in the drive, the host must be capable of constructing and issuing the following two SCSI commands:
•Security Protocol Out
•Security Protocol In
These commands are used to convey the TCG protocol to and from the drive in their command payloads.
9.1Data encryption
Encrypting drives use one inline encryption engine for each port, employing
The
9.2Controlled access
The drive has two security providers (SPs) called the "Admin SP" and the "Locking SP." These act as gate- keepers to the drive security services.
9.2.1Admin SP
The Admin SP allows the drive's owner to enable or disable firmware download operations (see Section 9.4). Access to the Admin SP is available using the SID (Secure ID) password or the MSID (Manufacturers Secure ID) password.
9.2.2Locking SP
The Locking SP controls read/write access to the media and the cryptographic erase feature. Access to the Locking SP is available using the BandMasterX or EraseMaster passwords. Since the drive owner can define up to 16 data bands on the drive, each data band has its own password called BandMasterX where X is the number of the data band (0 through 15).
Constellation.2 SAS Product Manual, Rev. H | 41 |