The oldest Protection Profile (PP) currently on NIAP’s approved PP list is also one that has not gotten much attention. The Protection Profile for USB Flash Drives was approved in December of 2011 but in the nearly half-decade since its approval no successful evaluations have been performed against it. It is interesting to take a look at this largely forgotten PP and it may be worth it for vendors with compliant products to consider the benefits of certification in the future.

The USB PP was written for USB flash drives which encrypt data with an onboard processor. AES is the only encryption algorithm which is allowed. While most of the PP’s encryption requirements will be familiar to anyone who was worked in CC it does contain an unusual key masking requirement in FCS_COP.1(4). The purpose of that SFR is to ensure that the Data Encryption Key (DEK) used to encrypt the data stored on the TOE is masked by a Key Encryption Key (KEK). Similar requirements are found in newer PPs for encrypted data storage products such as the Full Drive Encryption cPP but the USB PP’s requirements are more proscriptive.

One of the USB PP’s most obvious weaknesses is its very basic authentication requirements. Split authentication factors are optional and the use of a password is the only mandatory requirement. The PP does not require any specific minimum password length. This is acknowledged as a weakness in an application note for FCS_CKM.1(3) but is accepted because of perceived convenience. There is nothing preventing a TOE from implementing stronger password requirements, but PP conformance is possible without any meaningful password strength enforcement mechanism. The PP does contain an assumption that users will follow guidance on strong password creation but real-world experience has shown that this is probably not realistic if the TOE is to be deployed on a large scale.

The USB PP’s non-cryptographic SFRs focus on self-tests, user authorization and the prevention of malware distribution by the TOE. Unsurprisingly considering the nature of the TOE there are no audit requirements, nor are there any requirements for individual user identification.

Even though the USB PP has fallen by the wayside it is still a NIAP-approved PP with no current planned sunset date. Vendors who make FIPS-approved encrypted flash drives should keep in mind that it may take relatively little effort to get their products CC certified as well. The data encryption assurance activities for this PP are drawn directly from CAVP tests and any product which meets FIPS 140-2 self-test requirements will satisfy the self-test requirements of this PP. A vendor will have to determine for themselves if CC certification would give them a competitive advantage, but the USB PP is still available should anyone decide that they are in the market.