{"id":42729,"date":"2022-09-26T08:00:23","date_gmt":"2022-09-26T15:00:23","guid":{"rendered":"https:\/\/phisonblog.com\/?p=42729"},"modified":"2022-09-26T14:23:01","modified_gmt":"2022-09-26T21:23:01","slug":"the-worlds-first-and-only-self-defending-solid-state-storage-device","status":"publish","type":"post","link":"https:\/\/phisonblog.com\/de\/the-worlds-first-and-only-self-defending-solid-state-storage-device\/","title":{"rendered":"Das erste und einzige der Welt <br>Selbstverteidigender Festk\u00f6rper <br>Speichermedium"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><\/p>\n<p style=\"text-align: center;\"><em>In this article (recently published in edited form on <a href=\"https:\/\/www.toolbox.com\/it-security\/cyber-risk-management\/guest-article\/self-defending-ssds-a-breakthrough-in-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Spiceworks<\/a>), Phison CTO Sebastien Jean focuses on the innovative built-in security features of self-defending SSDs, how they work and why you should choose them<\/em><\/p>\n<p>In this article (recently published in edited form on Spiceworks), Phison CTO Sebastien Jean focuses on the innovative built-in security features of self-defending SSDs, how they work and why you should choose them.<\/p>\n<p>The solid-state drive (SSD) is more vulnerable than one might imagine. While most SSDs are relatively well-defended by layers of OS security, if an attacker can penetrate defense-in-depth countermeasures, they can often access the data stored on the drive. This may occur in a ransomware attack or the theft of a device, including by an insider. However, a new generation of self-defending SSDs adds to data loss mitigation capabilities on flash storage devices.<\/p>\n<p>&nbsp;<\/p>\n<h3>Risks to data on SSDs<\/h3>\n<p>To reach the data on an SSD, an attacker must either break through the OS security over the network or gain physical access to its host device. This may not be as hard as it sounds. SSDs are often carried on portable devices like laptops, but even office environments are not always safe. Once the host security is bypassed, SSDs contain few, if any, protections of their own. Passwords, endpoint protection, firewalls and intrusion detection systems, among many other security tools, are designed to keep malicious users out. However, as everyone knows, these defenses frequently fail.<\/p>\n<p>Laptops can also be stolen, making their SSDs vulnerable to all manner of unauthorized access. Laptop thieves can try to get access to the SSD through the standard user interface. Or, they may remove the SSD from the machine and attempt to break into it, either logically, physically or both. In some cases, data thieves remove the memory chips in order to access the data stored on the drive.<\/p>\n<p>&nbsp;<\/p>\n<h3>What if the SSD could defend itself?<\/h3>\n<p>Phison, working in partnership with <a href=\"https:\/\/www.cigent.com\/product\" target=\"_blank\" rel=\"noopener\">Cigent Technology<\/a>, the leader in embedded cybersecurity technology, is now offering the industry\u2019s first and only self-defending storage devices with cybersecurity built into the firmware itself. The result is a line of Trusted Computing Group (TCG)-enabled self-encrypting drives that are designed to pass FIPS 140-3 Level 2 certification. Each drive carries its own onboard countermeasures. Even if left undefended by external layers of security, the SSD can take action to protect its data.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"banner_wrapper\" style=\"height: 83px;\"><div class=\"banner  banner-34040 bottom vert custom-banners-theme-default_style\" style=\"\"><img decoding=\"async\" width=\"1080\" height=\"150\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/09\/Data-at-Rest-Protection-for-Corporate-Security.jpg\" class=\"attachment-full size-full\" alt=\"\" style=\"height: 83px;\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/09\/Data-at-Rest-Protection-for-Corporate-Security.jpg 1080w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/09\/Data-at-Rest-Protection-for-Corporate-Security-980x136.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/09\/Data-at-Rest-Protection-for-Corporate-Security-480x67.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1080px, 100vw\" \/><a class=\"custom_banners_big_link\" href=\"https:\/\/phisonblog.com\/phisons-second-generation-pro-gaming-ssd-is-the-real-deal-2\/\"><\/a><div class=\"banner_caption\" style=\"\"><div class=\"banner_caption_inner\"><div class=\"banner_caption_text\" style=\"\">Read: Data at Rest Protection for Corporate Security and Why FIPS 140-2\/-3 Validation Matters<\/div><\/div><\/div><\/div><\/div>\n<p>&nbsp;<\/p>\n<p>The drives were originally developed for U.S. government and military use. They are suitable for enterprise use cases where organizations need to protect high-value data. Pharmaceutical companies, for example, may benefit from a self-defending SSD to protect valuable intellectual property (IP) on a laptop.<\/p>\n<p>&nbsp;<\/p>\n<h3>Detecting attacks<\/h3>\n<p>The Cigent\u00ae <a href=\"https:\/\/phisonblog.com\/phison-and-cigent-partnership-sets-new-standard-in-cybersecurity-with-self-defending-flash-storage-drives\/\">self-defending SSD<\/a> has the ability to detect if it is being attacked in several ways:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Spotting suspicious access patterns<\/strong>\u2014The firmware on the self-defending SSD \u201cknows\u201d what normal read\/write processes look like. It can also spot abnormal attempts to access its data. For instance, if logical block addressing (LBA) processes are repetitively reading data and immediately writing it back to the drive, that might suggest the presence of malware. The self-defending SSD will respond and protect itself when it sees such an anomaly.<\/li>\n<li><strong>Recognizing when the drive has been disconnected<\/strong>\u2014Sophisticated thieves may attempt to remove the drive from its host device. The self-defending SSD can recognize when this is happening. The drive uses supercapacitors to power its own monitoring, even if the device has been disconnected from power. If the drive\u2019s \u201cheartbeat\u201d signal is not detected, the drive will take defense measures. The drive is very hard to tamper with as a result.<\/li>\n<li><strong>Sensing when the device is being moved<\/strong>\u2014The self-defending SSD has an on-board accelerometer so it can sense when it is being jiggled or moved without authorization. If you go out to lunch or leave your hotel room, you probably don\u2019t expect your laptop to move. If it does move, it\u2019s probably not a good sign. The SSD detects the movement and locks itself down.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Defense by way of a storage-compute architecture<\/h3>\n<p>This architecture makes the SSD\u2019s attack surface smaller. The self-defending SSD has a dedicated security CPU to manage the advanced protection. This compute-storage combination enables it to run its pattern recognition program and other defensive sensing capabilities. The firmware integration places the SSD\u2019s defense mechanisms below the host\u2019s software, operating system (OS) and BIOS firmware.<\/p>\n<p>This way, the SSD can process threat data right on its own, without interacting with any other element on the device or network. The SSD does integrate into the Cigent D3E architecture, enabling additional capabilities and policy-based management.<\/p>\n<p>When the SSD detects an attack, it can take a number of actions, including:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Alerting the support app<\/li>\n<li>Locking the drive, making it impossible to unlock without cryptographic authentication keys<\/li>\n<li>Erasing the drive<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div class=\"banner_wrapper\" style=\"height: 83px;\"><div class=\"banner  banner-33326 bottom vert custom-banners-theme-default_style\" style=\"\"><img decoding=\"async\" width=\"1080\" height=\"150\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Securing-SSD-Data-with-Encryption.jpg\" class=\"attachment-full size-full\" alt=\"\" style=\"height: 83px;\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Securing-SSD-Data-with-Encryption.jpg 1080w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Securing-SSD-Data-with-Encryption-980x136.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Securing-SSD-Data-with-Encryption-480x67.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1080px, 100vw\" \/><a class=\"custom_banners_big_link\" href=\"https:\/\/phisonblog.com\/securing-ssd-data-with-encryption-2\/\"><\/a><div class=\"banner_caption\" style=\"\"><div class=\"banner_caption_inner\"><div class=\"banner_caption_text\" style=\"\">Read: Securing SSD Data with Encryption<\/div><\/div><\/div><\/div><\/div>\n<p>&nbsp;<\/p>\n<h3>Conclusion<\/h3>\n<p>Data on SSDs is at risk. If OS based countermeasures fail, the drive itself is often quite vulnerable to logical and physical threats. This may prove to be an unacceptable vulnerability in a sensitive enterprise or government setting. Now, self-defending SSDs add a much-needed protection for valuable data like state secrets or intellectual property. Self-defending SSDs carry a variety of attack detection and response mechanisms on their own firmware\u2014made possible by unusually robust storage-compute functionality. Taken together, these capabilities represent a new and uniquely powerful approach to protecting data on flash storage devices.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article (recently published in edited form on Spiceworks), Phison CTO Sebastien Jean focuses on the innovative built-in security features of self-defending SSDs, how they work and why you should choose them In this article (recently published in edited form on Spiceworks), Phison CTO Sebastien Jean focuses on the innovative built-in security features of [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":43275,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[23,3],"tags":[22],"class_list":["post-42729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-posts","category-enterprise","tag-long-content"],"acf":[],"_links":{"self":[{"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/posts\/42729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/comments?post=42729"}],"version-history":[{"count":10,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/posts\/42729\/revisions"}],"predecessor-version":[{"id":47356,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/posts\/42729\/revisions\/47356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/media\/43275"}],"wp:attachment":[{"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/media?parent=42729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/categories?post=42729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/tags?post=42729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}