ROHDE SCHWARZ FPL1000 Spectrum Analyzer User Manual

June 8, 2024
ROHDE SCHWARZ

ROHDE SCHWARZ logo R &S® FPL1000
Spectrum Analyzer
Instrument Security Procedures
User Manual

Overview

Securing important information is crucial in many applications.
Generally, highly secured environments do not allow any test equipment to leave the area unless it can be proven that no user information leaves with the test equipment, e.g. to be calibrated.
“Regarding sanitization, the principal concern is ensuring that data is not unintentionally released” [1].
This document provides a statement regarding the volatility of the memory types used and specifies the steps required to sanitize an instrument.
The procedures in this document follow “NIST Special Publication 800-88:
Guidelines for Media Sanitization” [1].
In addition, recommendations are provided to safeguard information on the R&S FPL1000.
References
See the following literature for further information.
[1] Kissel Richard L. [et al.] Guidelines for Media Sanitization = Special Publication (NIST SP) = NIST SP – 800-88 Rev 1. – Gaithersburg : [s.n.], December 17, 2014.
[2] National Industrial Security Program Authorization Office Defense Security Service (DSS) Assessment and Authorization Process Manual (DAAPM). – May 6, 2019.
[3] ACSC Australian Cyber Security Centre Australian Government Information Security Manual, January 2020.

Instrument models covered

Table 2-1: Spectrum Analyzer models

Spectrum Analyzer

R&S FPL1003| 1304.0004K03
R&S FPL1007| 1304.0004K07
R&S FPL1014| 1304.0004K14
R&S FPL1026| 1304.0004K26

Security terms and definitions

Terms defined in Guidelines for Media Sanitization NIST Special Publication 800-88 [1]

  • Sanitization
    “Media sanitization refers to a process that renders access to target data on the media infeasible for a given level of effort.”

  • Clear
    “Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques; typically applied through the standard Read and Write commands to the storage device, such as by rewriting with a new value or using a menu option to reset the device to the factory state (where rewriting is not supported).”

  • Purge “Purge applies physical or logical techniques that render Target Data recovery infeasible using state of the art laboratory techniques.”

  • Destroy
    “Destroy renders Target Data recovery infeasible using state of the art laboratory techniques and results in the subsequent inability to use the media for storage of data.”

Control of media
Another option to secure sensitive information is to keep physical media within the classified area, see [1], paragraph 4.4.
Volatile memory
“Memory components that do not retain data after removal of all electrical power sources, and when reinserted into a similarly configured system, are considered volatile
memory components.”
[2] The volatile memory in the instrument does not have battery backup. It loses its contents when power is removed from the instrument.
If the instrument is battery operated, e.g. handhelds, it retains data in the volatile memory as long as the battery is installed.
Typical examples are RAM, e.g. SDRAM.
Non-volatile memory
“Components that retain data when all power sources are discontinued are non- volatile memory components.” [2].
In the context of this document, non-volatile memory components are non-user accessible internal memory types, e.g. EEPROM, Flash, etc.
Media
Media are types of non-volatile memory components. In the context of this document, media are user-accessible and retain data when you turn off power.
Media types are Hard Disk Drives (HDD), Solid State Drives (SSD), Memory Cards, e.g. SD, microSD, CFast, etc., USB removable media, e.g. Pen Drives, Memory Sticks,
Thumb Drives, etc. and similar technologies.

Statement of volatility

The R&S FPL1000 contains various memory components. See the subsequent sections for a detailed description regarding type, size, usage and location.
Notes on memory sizes
Due to the continuous development of memory components, the listed values of memory sizes may not represent the current, but the minimal configuration.

4.1 Volatile memory
Volatile memory modules are considered as non-accessible internal storage devices, as described in Security terms and definitions > Volatile memory.

Table 4-1: Types of volatile memory

Memory type| Location| Size| Content / Function| User modifiable
---|---|---|---|---
SDRAM| PC board| 4 GByte or
8 Gbyte| Temporary information storage for operating system and instrument firmware| Yes

4.2 Non-volatile memory
Non-volatile memory modules are considered as non-accessible internal storage devices, as described in Security terms and definitions > Non-volatile memory.

Table 4-2: Types of non-volatile memory

Memory type| Location| Size| Content / Function| User modifiable
---|---|---|---|---
EEPROM| PC board| 1 kByte| •Board information / configuration
•Serial number| No
Front panel| 2 kByte| Hardware information| No
Smart card (front panel)| s1 MByte| •Serial number
•Product options| No
Flash| PC board| 8 MByte| BIOS| No
Motherboard| 32 MByte| •FPGA configuration
•Hardware information
•Correction data| No
Spectrum Analysis board| 512 kByte| •FPGA configuration
•Hardware information
•Correction data| No
Reference board| 1 MByte| •Hardware information
•Correction data| No
Additional Interface board (R&S FPL1-B5)| 32 MByte| •Hardware information
•Correction data| No
GPIB board (R&S FPL1- B10)| 4 MByte| FPGA configuration| No

4.3 Media
Media memory modules are considered as non-volatile storage devices, as described in Security terms and definitions > Media.

Table 4-3: Types of media memory modules

Memory type| Location| Size| Content / Function| User modifiable
---|---|---|---|---
SSD| PC board| ≥ 32 GByte| ● Operating system
● Instrument firmware
● Instrument settings
● Limit lines
● User calculation data
● Trace data
● Measurement results and screen images| Yes

Instrument sanitization procedure

5.1 Volatile memory
You can purge the volatile memory by following the procedure below. The sanitizing procedure complies to the definition of NIST [1], see “Terms defined in Guidelines for Media Sanitization” on page 3.

To turn off and remove power

  1. Turn off the R&S FPL1000.
  2. Disconnect the power plug.
  3. Remove the battery.

Leave the instrument powered off at least for ten minutes to make sure that all volatile memory modules lose their contents, see [3].

5.2 Non-volatile memory
The non-volatile memories do not contain user data. Therefore no sanitization procedure is required.
5.3 Media
To remove the classified solid-state drive at the rear of the instrument

NOTICE
Risk of losing data and becoming unusable
The media memory holds the operating system. Removing the SSD makes the instrument unusable.
We recommend that you keep a second non-classified SSD for use outside the secured area (option R&S FPL1-B19).
Do not remove the SSD during operation.
You can damage the instrument and lose data.

  1. Turn off the R&S FPL1000 and disconnect the power plug.
  2. Locate the SSD.ROHDE SCHWARZ FPL1000 Spectrum Analyzer -
  3. Unscrew the two knurled screws.
  4. Remove the solid-state drive from the R&S FPL1000.
  5. Keep the solid-state drive under organizational control.

Operability outside the secured area

As the solid-state drive holds the operating system, the R&S FPL1000 cannot be operated without the solid-state drive.
For servicing and calibration, Rohde & Schwarz provides a separate solid-state drive (option R&S FPL1-B19). This solid-state drive contains the operating system and required instrument data.

To use the instrument outside the secured area:

  1. Insert the second solid-state drive.
    This solid-state drive enables the R&S FPL1000 to start the operating system.

  2. Turn on the R&S FPL1000.

  3. Perform a self-alignment as described in Chapter 7, “Validity of instrument calibration after sanitization”, on page 9.
    The instrument is ready for use.

Validity of instrument calibration after sanitization

The EEPROM is the only memory type used to hold permanent adjustment values required to maintain the validity of the R&S FPL1000’s calibration. Therefore, the sanitizing procedure does not affect the validity of the instrument’s calibration.
After exchanging the removable SSD, perform a self-alignment once:
Make sure that the instrument has sufficient warm-up time before you perform the selfalignment.

  1. Select the [SETUP] key.
  2. Select the “Alignment” softkey.
  3. Select “Start Self Alignment”

This function uses the high-stability internal reference generator to produce the temporary adjustment values. Using the permanent and temporary values, the necessary
adjustment information is then stored on the removable SSD.

Special security features

This section leads you to the information on how to use the security features to protect the R&S FPL1000 from unauthorized access of classified information saved or displayed in the instrument.
The user manual is provided for download on the product page at www.rohdeschwarz.com/manual/FPL1000.

8.1 Considerations for USB interfaces
USB ports can pose a security risk in high-security locations. Generally, this risk comes from small USB pen drives, also known as memory sticks or key drives. They can be
easily concealed and can quickly read/write several Gbyte of data.
You can disable the write capability on the USB ports of the R&S FPL1000 via a utility software. This utility software is available on the R&S FPL1000 website https://www.rohde-schwarz.com/manual/r-s-fpl1000-instrument-security- procedures-manualsgb1_78701-478976.html.

To disable the write capability, copy the utility software to the R&S FPL1000 and run it once. After a reboot of the instrument, the write capability to any USB memory device is disabled.

Glossary

C CFast: Compact Fast – compact flash mass memory device.
D DRAM: Dynamic Random Access Memory.
H HDD: Hard disk drive.
M microSD: Micro Solid-state Drive – memory card.
S SD: Solid-state drive – memory card.

SSD: ATA Solid-state drives (including PATA, SATA, eSATA, mSATA,…).

© 2022 Rohde & Schwarz GmbH & Co. KG
Mühldorfstr. 15, 81671 München, Germany
Phone: +49 89 41 29 – 0
Email: info@rohde-schwarz.com
Internet: www.rohde-schwarz.com
Subject to change – data without tolerance limits is not binding.
R&S® is a registered trademark of Rohde & Schwarz GmbH & Co. KG.
Trade names are trademarks of the owners.

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals