This article relies excessively on references to primary sources. Please improve this article by adding secondary or tertiary sources. Find sources: "Opal Storage Specification" – news · newspapers · books · scholar · JSTOR (May 2017) (Learn how and when to remove this template message)
This article is missing information about Opalite and Pyrite, two subsets defined by the TCG (& the even simpler TCG Enterprise). Please expand the article to include this information. Further details may exist on the talk page. (June 2023)

The Opal Storage Specification is a set of specifications for features of data storage devices (such as hard disk drives and solid state drives) that enhance their security. For example, it defines a way of encrypting the stored data so that an unauthorized person who gains possession of the device cannot see the data. That is, it is a specification for self-encrypting drives (SED).

The specification is published by the Trusted Computing Group Storage Workgroup.

Overview

This section does not cite any sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (May 2017) (Learn how and when to remove this template message)

The Opal SSC (Security Subsystem Class) is an implementation profile for Storage Devices built to:

Functions

This section does not cite any sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (May 2017) (Learn how and when to remove this template message)

The Opal SSC encompasses these functions:

Features

This section does not cite any sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (May 2017) (Learn how and when to remove this template message)

Security

Radboud University researchers indicated in November 2018 that some hardware-encrypted SSDs, including some Opal implementations, had security vulnerabilities.[2]

Implementers of SSC

Device companies

Storage controller companies

Software companies

Computer OEMs

References

  1. ^ TCG Storage Security Subsystem Class: Opal Specification Version 2.01 Revision 1.00. Trusted Computing Group, Incorporated. 05 August 2015. Retrieved 2019-11-22.
  2. ^ Meijer, Carlo; van Gastel, Bernard. "Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)" (PDF). Radboud University. Retrieved November 5, 2018.[dead link]
  3. ^ "Intel® SSD Pro 1500 Series (M.2): Specs". Intel.com. Retrieved 2017-05-03.
  4. ^ "Solid State Hard Drives for Business". Kingston.com. 2017-03-05. Retrieved 2017-05-03.
  5. ^ Clain Anderson (2011-02-16). "Opal – More than a Semi-Precious Stone | Lenovo". Blog.lenovo.com. Retrieved 2017-05-03.
  6. ^ "Micron Technology, Inc. - Full SSD Part Catalog". Micron.com. Retrieved 2017-05-03.
  7. ^ "Samsung V-NAND SSD". Samsung.com. Retrieved 2017-05-03.
  8. ^ "SanDisk's X300s Solid State Drive". Archived from the original on 2014-08-03. Retrieved 2014-08-02.
  9. ^ "News". Seagate. Retrieved 2017-05-03.
  10. ^ "Full Disk Encryption Software, Hard Drives, SSDs & Whole Disk". WinMagic. Retrieved 2017-05-03.
  11. ^ "Fujitsu Develops HDD Security Technology based on Opal SSC Standards - Fujitsu Global". Fujitsu.com. Retrieved 2017-05-03.
  12. ^ "Specialty | TOSHIBA Storage & Electronic Devices Solutions Company | Americas". Storage.toshiba.com. Retrieved 2017-05-03.
  13. ^ "Specialty | TOSHIBA Storage & Electronic Devices Solutions Company | Americas". Storage.toshiba.com. Retrieved 2017-05-03.
  14. ^ "Marvell Technology Group Ltd". Marvell.com. Retrieved 2017-05-03.
  15. ^ "Marvell, Kingston Collaboration Proves Positive with Over Six Million SSD Units Shipped". Kingston Technology. Retrieved 30 December 2021.
  16. ^ "SandForce Flash Storage Processor SSD Controllers". Archived from the original on 2013-08-08. Retrieved 2013-08-01.
  17. ^ "Self-Healing Endpoint Security". Absolute. Retrieved 2017-05-03.
  18. ^ "Industry-Leading Cyber Security Keeps Networks, Data Centers, Mobile Devices & Endpoints One Step Ahead | Check Point Software". Checkpoint.com. Retrieved 2017-05-03.
  19. ^ "Data Security | Dell United States". Dell.com. 2017-04-26. Retrieved 2017-05-03.
  20. ^ "CryptoMill :: Products & services". Archived from the original on 2012-02-09. Retrieved 2012-01-14.
  21. ^ "McAfee Corporate KB - KB75045". Kc.mcafee.com. Retrieved 2017-05-03.
  22. ^ "FinallySecure™ Enterprise - SECUDE AG". Archived from the original on 2012-01-26. Retrieved 2012-01-14.
  23. ^ "Comprehensive Data Encryption and Protection Solutions - SecureDrive". Softexinc.com. 2014-06-20. Retrieved 2017-05-03.
  24. ^ "Full Disk Encryption | Always-On, Multi-Platform Enterprise Encryption Synchronizes Devices, Hard Drives, Removable Media, BitLocker, and Cloud Storage Protection in Real-Time". Sophos.com. Retrieved 2017-05-03.
  25. ^ "Endpoint Encryption Powered by PGP Technology". Symantec.com. Retrieved 2017-05-03.
  26. ^ "Archived copy". Archived from the original on 2017-09-25. Retrieved 2016-02-03.((cite web)): CS1 maint: archived copy as title (link)
  27. ^ "Data Protection – Endpoint and Gateway Suites | Trend Micro". Us.trendmicro.com. Retrieved 2017-05-03.
  28. ^ "Full Disk Encryption Software, Hard Drives, SSDs & Whole Disk". WinMagic. Retrieved 2017-05-03.
  29. ^ "Software management of TCG self-encrypting drives". Fidelity Height LLC.
  30. ^ "Dell Official Site | Dell United States". Dell.com. 2017-04-26. Retrieved 2017-05-03.
  31. ^ "Laptop Computers, Desktops, Printers and more | HP® Official Site". Hp.com. Retrieved 2017-05-03.
  32. ^ [1] Archived 2008-08-28 at the Wayback Machine
  33. ^ "Fujitsu News Updates - Fujitsu UK". Fujitsu.com. Retrieved 2017-05-03.
  34. ^ "Panasonic Toughpad | Rugged Tablet | Toughpad". Panasonic.com. 2015-10-27. Retrieved 2017-05-03.
  35. ^ "Rugged Notebooks, Tablets, Handhelds and Laptops from". Getac.com. Retrieved 2017-05-03.