ROHDE SCHWARZ FPH Spectrum Analyzer User Manual
- June 9, 2024
- ROHDE SCHWARZ
Table of Contents
R &S® FPH
Spectrum Analyzer
Instrument Security Procedures
FPH Spectrum Analyzer
This document describes the types of memory and their usage in the R&S® FPH Spectrum Analyzer.
Overview
Securing important information is crucial in many applications.
Generally, highly secured environments do not allow any test equipment to
leave the area unless it can be proven that no user information leaves with
the test equipment, e.g. to be calibrated.
“Regarding sanitization, the principal concern is ensuring that data is not
unintentionally released” [1]. This document provides a statement regarding
the volatility of the memory types used and specifies the steps required to
sanitize an instrument.
The procedures in this document follow “NIST Special Publication 800-88:
Guidelines for Media Sanitization” [1].
In addition, recommendations are provided to safeguard nformation on the R&S
FPH.
References
See the following literature for further information.
- Kissel Richard L. [et al.] Guidelines for Media Sanitization = Special Publication (NIST SP) = NIST SP – 800-88 Rev 1. – Gaithersburg : [s.n.], December 17, 2014.
- National Industrial Security Program Authorization Office Defense Security Service (DSS) Assessment and Authorization Process Manual (DAAPM). – May 6, 2019.
- ACSC Australian Cyber Security Centre Australian Government Information Security Manual, January 2020.
Instrument Models Covered
Table 2-1: R &S FPH models
Product name | Order number |
---|---|
R&S FPH | 1321.1111.02 |
R&S FPH | 1321.1111.06 |
R&S FPH | 1321.1111.13 |
R&S FPH | 1321.1111.26 |
R&S FPH | 1321.1711.23 |
R&S FPH | 1321.1711.36 |
R&S FPH | 1321.1711.44 |
R&S FPH | 1321.1711.54 |
R&S FPH | 1321.1111.52, equivalent to 1321.1111.02 |
R&S FPH | 1321.1111.56, equivalent to 1321.1111.06 |
R&S FPH | 1321.1111.63, equivalent to 1321.1111.13 |
R&S FPH | 1321.1111.76, equivalent to 1321.1111.26 |
Security terms and definitions
Terms defined in Guidelines for Media Sanitization
NIST Special Publication 800-88 [1]
-
Sanitization
“Media sanitization refers to a process that renders access to target data on the media infeasible for a given level of effort.” -
Clear
“Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques; typically applied through the standard Read and Write commands to the storage device, such as by rewriting with a new value or using a menu option to reset the device to the factory state (where rewriting is not supported).” -
Purge
“Purge applies physical or logical techniques that render Target Data recovery infeasible using state of the art laboratory techniques.” -
Destroy
“Destroy renders Target Data recovery infeasible using state of the art laboratory techniques and results in the subsequent inability to use the media for storage of data.”
Control of media
Another option is to keep physical media holding sensitive information within
the classified area, see [1], paragraph 4.4.
Volatile memory
“Memory components that do not retain data after removal of all electrical
power sources, and when reinserted into a similarly configured system, are
considered volatile memory components.” [2] The volatile memory in the
instrument does not have battery backup. It loses its contents when power is
removed from the instrument.
If the instrument is battery operated, e.g. handhelds, it retains data in the
volatile memory as long as the battery is installed.
Typical examples are RAM, e.g. SDRAM.
Non-volatile memory
“Components that retain data when all power sources are discontinued are non-
volatile memory components.” [2].
In the context of this document, non-volatile memory components are non-user
accessible internal memory types, e.g. EEPROM, Flash, etc.
Media
Media are types of non-volatile memory components. Media are user-accessible
and retain data when you turn off power.
In the context of this document, media types are Hard Disk Drives (HDD), Solid
State Drives (SSD), Memory Cards, e.g. SD, microSD, CFast, etc., USB removable
media, e.g. Pen Drives, Memory Sticks, Thumb Drives, etc. and similar
technologies.
Statement of Volatility
The R&S FPH Spectrum Analyzer contains various memory components. See the
subsequent sections for a detailed description regarding type, size, usage and
location.
Notes on memory sizes
Due to the continuous development of memory components, the listed values of
memory sizes may not represent the current, but the minimal configuration.
4.1 Volatile Memory
Volatile memory modules are considered as non-accessible internal memory
devices, as described in Security Terms and Definitions > Volatile Memory. It
requires power to retain data and when the power is turned off, all data is
erased.
Table 4-1: Types of volatile memory
Memory type| Location| Size| Content| UserData|
Sanitization procedure
---|---|---|---|---|---
SDRAM| Mainboard| 512 Mbyte| Temporary information storage for operating
system and instrument firmware| Yes| Turn off instrument power and remove the
battery.
See Chapter 5, “Instrument Sani- tization Procedure”, on page 10
SRAM| Frontboard (µController internal)| 4 kbyte| Temporary information storage for Power-up / Power-down firmware| No
4.2 Non-Volatile Memory
Non-volatile memory modules are considered as non-accessible internal memory
devices, as described in Security Terms and Definitions > Non-volatile Memory.
It does not require power to maintain the stored data.
Table 4-2: Types of non-volatile memory
Memory type| Location| Size| Content| User Data|
Sanitization procedure
---|---|---|---|---|---
Flash| Frontboard (µController internal)| 32 kbyte| Power-up / Power-down
firmware| No| None required (no user data
See Chapter 5, “Instrument Sani- tization Procedure”, on page 10
Flash| Mainboard| 128 Mbyte| ● Operating system
● Instrument firmware
● Boot code
● Calibration correction data, device options and serial number
● User data and instrument settings| Yes
4.3 Media
Media are considered as non-volatile memory devices, as described in Security
Terms and Definitions > Media.
Table 4-3: Types of media memory modules
Memory type| Location| Size| Content| User Data|
Sanitization procedure
---|---|---|---|---|---
Flash| Instrument top view| n.a.| n.a.| Yes| Remove memory device and keep it
under organizational control.
See Chapter 5, “Instrument Sani- tization Procedure”, on page 10
microSD| Instrument rear view. Behind the battery compartment.| n.a.| n.a.| Yes
Instrument Sanitization Procedure
Firmware greater or equal 1.60 is required for the instrument
declassification.
5.1 Volatile Memory
Removing power
- Turn off the R&S FPH.
- Remove the battery.
Leave the instrument powered off at least for 10 minutes to make sure that all
volatile memory modules lose their contents.
5.2 Non-volatile Memory
The Flash does not lose its contents when power is removed. It can contain
user data.
Sanitizing the non-volatile memory
The Flash is cleared by executing the sanitizing procedure provided on the
instrument.
The sanitizing procedure complies to the definition of NIST, see “Terms
defined in Guidelines for Media Sanitization” on page 6.
-
NOTICE! Risk of loosing data. The sanitization procedure clears all user data and resets the instrument.
Back up all data you want to keep. -
Remove all media:
a) Disconnect USB mass memory.
b) Remove microSD card.
For information on how to proceed, see the corresponding instructions in the user manual of the R&S FPH. -
Keep the media memory devices under organizational control.
-
NOTICE! Risk of instrument damage when interrupting the sanitizing procedure.
Do not turn off or disconnect the R&S FPH from the mains while the sanitizing procedure is running.
Wait until the instrument confirms the completed sanitizing.
To activate the sanitizing procedure, press and hold the [PRESET] and [F5] keys while switching on the instrument.
After a few seconds, the sanitizing procedure starts.
The sanitizing procedure takes approximately 8 minutes, indicated by the
message “Secure Formatting Flash, please wait!” on the screen.
When completed, the instrument reboots automatically.
Validity of Instrument Calibration after Sanitization
The validity of the R&S FPH spectrum analyzer’s calibration is maintained throughout the sanitization.
Glossary
C CFast: Compact Fast – compact flash mass memory device.
D DRAM: Dynamic Random Access Memory.
H HDD: Hard disk drive.
M microSD: Micro Solid-state Drive – memory card.
S SD: Solid-state drive – memory card.
SSD: ATA Solid-state drives (including PATA, SATA, eSATA, mSATA,…).
© 2021 Rohde & Schwarz GmbH & Co. KG
Mühldorfstr. 15, 81671 München, Germany
Phone: +49 89 41 29 – 0
Email: info@rohde-schwarz.com
Internet: www.rohde-schwarz.com
Subject to change – data without tolerance limits is not binding.
R&S® is a registered trademark of Rohde & Schwarz GmbH & Co. KG.
Trade names are trademarks of the owners.
1178.8994.02 | Version 05 | R&S® FPH
Throughout this document, products from Rohde & Schwarz are indicated without
the FPH is indicated as R&S FPH. symbol , e.g. R&S Version 05
Documents / Resources
|
ROHDE SCHWARZ FPH Spectrum
Analyzer
[pdf] User Manual
FPH Spectrum Analyzer, FPH, Spectrum Analyzer, Analyzer
---|---
References
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>