7.0About self-encrypting drives
The Trusted Computing Group (TCG) is an organization sponsored and operated by companies in the com- puter, storage and digital communications industry. Seagate’s SED models comply with the standards pub- lished by the TCG.
To use the security features in the drive, the host must be capable of constructing and issuing the following two SCSI commands:
•Security Protocol Out
•Security Protocol In
These commands are used to convey the TCG protocol to and from the drive in their command payloads.
7.1Data encryption
Encrypting drives use one inline encryption engine for each port, employing
The
7.2Controlled access
The drive has two security partitions (SPs) called the "Admin SP" and the "Locking SP." These act as gate- keepers to the drive security services.
7.2.1Admin SP
The Admin SP allows the drive's owner to enable or disable firmware download operations (see Section 7.4). Access to the Admin SP is available using the SID (Secure ID) password or the MSID (Makers Secure ID) password.
Cheetah 15K.7 FC Product Manual, Rev. A | 35 |