
Unmanned Vehicles
Data Protection Solutions for Unmanned Vehicles
UxV store and collect sensitive and classified data. Their mission parameters guarantee many will be recovered by adversaries. Unauthorized access to UxV data will have significant consequences. Adversary may gain unauthorized access to algorithms compromising UxV efficacy and access sensitive mission information including location, tactics, targets, and capability data.
Cigent protects data on UxV with layered security features that prevent unauthorized data access.
Challenge
Unauthorized access to UxV data will have significant consequences.
Adversary accessing UxV algorithms can:
- Gain insight into ATR (Automated Target Recognition) criteria. Utilize to modify configurations undermining UxV efficacy.
- Compromise the efficacy of swarms with automated reactions. Utilize algorithms to understand and develop countermeasures.
- Degrade the effectiveness of PNT (Position, Navigation, and Timing) algorithms used to map the terrain in GPS-denied environments.
.png?width=560&height=479&name=Untitled%20design%20(37).png)

Data at Rest Protection
Data security is fundamental to preventing unauthorized access to data at rest (DAR). UxV data is secured with three layers of encryption, including both hardware and software encryption. The solution meets NIST, FIPS, and CSfC DAR compliance requirements.

Critical Data Protected from Attacks
Cigent protects UxV data from advanced data recovery, malware, and denial-of-service attacks. Protection includes zero-trust access controls and isolated storage partitions, ensuring constant, secure availability of critical data only by trusted users and applications.
.png?width=80&height=80&name=Frame%2093%20(2).png)
Data Sanitization.
UxV operations make data destruction an essential element of each mission. Cigent implements erasure in seconds via crypto wipe, full block-level erasure, and firmware-based verification, ensuring UxV with remote and automated execution capabilities.

Insider Threat Mitigation
Reducing the risk of insider threat requires controlling access and monitoring activity. Separate partitions provide for the segmentation of data and controlling access to required personnel. Data access logs provide an uncompromised record of activity that can be exported for analysis and event forensics.

Portfolio
Secure Storage Solutions for Unmanned Vehicles
Cigent is unique in its ability to provide an array of protected storage designed to meet the rigorous environment of unmanned vehicles.
01.
Secure Drive 2230 SSD Alpha.
Meets automotive temperature standards (-40 to 105 C). Features include hardware encryption with PBA, software encryption, hidden partitions, and data sanitization.
The Secure Drive 2230 is undergoing NSA validation, including PBA and FDE software for inner and outer layer CSfC protection.
02.
Secure Drive SSD BGA Encrypted Alpha.
Meets automotive temperature standards (-40 to 105 C). Features include hardware encryption, enterprise management, cloning and wipe prevention, data erasure, and crypto and full-block erasure.
03.
Secure Drive SD Encrypted Alpha.
Provides 64 GB of storage and meets industrial temperature standards. Features include hardware encryption, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.
04.
MicroSD Encrypted Alpha.
Provides 64 GB of storage and meets industrial temperature standards. Features include hardware encryption, enterprise management, hidden partitions, cloning and wipe prevention, data erasure, and crypto and full block erasure.
Features
Unmanned Vehicle Solution Capabilities
Hardware Full Drive Encryption. Encryption is AES-256 and FIPS compliant in accordance with the TCG (Trusted Computing Group) Opal 2.0 or similar guidelines. Storage may also adhere to the FIPS 140-2 Level 2 requirements, including using epoxy on the drives.
Locked Ranges. Ranges are defined segments of data storage that are monitored and protected independently. To protect data from attempts to wipe, clone, or view data at the hex level storage ranges are locked at the firmware layer, rendering the ranges/data unreadable by cloning tools and hex readers.
Pre-boot Authentication. Pre-boot authentication (PBA) provides a secure user authentication platform on the device that is fully protected at rest. Properly configured PBA prevents adversaries from circumventing encryption by manipulating the boot process.
All storage utilizes hardware encryption. If an adversary removes the data from the drive with advanced techniques, the data remains in an encrypted state. Without the decryption key, adversaries will be unable to decrypt the data.
The key will not be stored in its entirety anywhere on the drive and the pieces of it that are stored on the drive will be encrypted. Between these two measures, the key cannot be accessed or recreated.
Secured Firmware. In addition to the encryption capabilities, the storage firmware has been modified to resist advanced threat vectors. SSD firmware has been modified to meet compliance with FIPS 140-2, NIAP Common Criteria FDE_EE standards, and CSfC DAR Capabilities Package 5.0 requirements. Including:
Standalone approved cryptographic algorithm certification, power-on self-tests of all cryptographic algorithms, a module entering error states when any cryptographic function fails, NIST-approved methods for cryptographic key generation and using approved techniques for the generation of random bits, and minimum entropy of hardware random bit generator evaluated according to SP 800-90B, and tamper-evidence protection.
Locked Ranges. Devices can be configured where data, software, and configuration files can be stored separately, providing the ability to create “read-only” secure enclaves where software and configuration files will be sequestered. Devices will still be able to “write” collecting and processing data as their role requires. These partitions will also enable access controls defined by user requirements.
File filter driver. Once the O/S loads a file filter driver will be initiated. The file filter driver will provide a layer of runtime protection ensuring only appropriate (allow list) apps and processes can access and save files, preventing malicious access, data extraction, and compromise (such as modification, deletion, overwriting, etc.)
App Whitelisting. The appropriate file or application for accessing a file can be allow list preventing the MFA prompt. This ensures proper execution of the system functionality, while simultaneously preventing malicious access and data extraction.
OS partition. The O/S partition will further be mounted in read-only mode. This will ensure malware is not loaded on this partition and a reboot process will reload the system into a known good state.
Data Access Control. Access is controlled with 2FA/MFA. In the event an adversary attempts to access files in an unauthorized manner, a prompt will be displayed, requiring the user to authenticate. If they are unable to authenticate, they will not be able to access the file. An adversary attempting to access a file will not disrupt the allow list apps or processes from accessing the file. All access log attempts will be stored on the system in a secure location in a special log file designated for this purpose.
File Level Encryption. Preventive protection is delivered through file level encryption that encrypts data collected and stored on UXV devices. File level encryption sustains encryption protection if data is removed from the device. The approach prevents an insider from exfiltrating data in clear text.
Secure Data Logs. All data access is captured in secured logs with restricted access. Logs can be utilized to detect malicious insider activity and for post-recovery evaluation.
Both system and firmware logs can be captured and uploaded to the enterprise management software for reporting, analysis, and suspected insider threat alerts. These can also be exported to a SIEM for ongoing analysis. Both system and firmware logs can be captured and uploaded to the enterprise management software for reporting, analysis, and suspected insider threat alerts. These can also be exported to a SIEM for ongoing analysis.
Crypto and Block Erasure. Crypto erase deletes encryption keys thereby rendering data permanently inaccessible. Block erase utilizes an electrical charge to erase data.
Verified Data Erasure. Firmware immediately verifies that all data has been erased with block-by-block analysis. Block erasure can be automatically re-run until all data is successfully sanitized.
Sanitization Execution. Sanitization command can be initiated manually either locally or remotely or utilizing automated requirements. For example, if connectivity is severed or an UxV falls below a pre-determined altitude sanitization can be set to execute.
-1.png)
Tagline
The Cigent Advantage
Cigent is prepared to support your mission, navigating the complex compliance requirements to protect data at the edge. Its solutions were developed for and with US Federal agencies with deep expertise in data protection. Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
To ensure availability and provide flexibility, Cigent works with leading drive manufacturers including Digistor, Kanguru, and Seagate and Cigent offers our own branded drives.
.png?width=560&height=540&name=Rectangle%203(2).png)
datasheet
Protect Unmanned Vehicles
All Cigent Secure Storage provides AES-256 full drive hardware encryption with additional data protection to support unmanned vehicle operations.


Edge Computing Requires Edge Security: Best Practices for Protecting Sensitive Data at the Edge
Discover best practices for protecting sensitive data at the edge with Cigent's insights ..

Prevent Data Security Issues with Disk Cloning & Data Destruction
Explore how disk cloning and data destruction can prevent security issues. Learn how to ..

FIPS 140-2 & FISMA — Understanding Cybersecurity Compliance for Cryptography Modules
Learn about FIPS 140-2 and FISMA compliance for cryptography modules, essential for ..
Frequently Asked Questions
Check out the answers to some of most frequently asked questions about Cigent, what we do, and how we do it. Don’t see your question on the list? Click the BOOK A DEMO button in the top right corner of your screen to learn more about us during a custom demo.
Unmanned vehicles collect, process, and warehouse significant data. This data can include mission information, data gathered during the mission, algorithms and other proprietary information enabling the vehicle. Unmanned vehicles are operating in uncontrolled environments where they risk being compromised through accidental loss or intentional actions. Even in the event of a physical accident any sensitive data is likely still accessible. To ensure the integrity of data on the vehicle it is imperative that robust protections are in place.
Protecting sensitive data from advanced threat actors requires layers of protection. Software encryption provides a basic level of protection but can be defeated using a variety of techniques and technologies. This is why the NSA, DISA, NIAP and other leading experts require full drive hardware encryption to meet standards including CSfC for data at rest and FIPS 140-2. Ideally organizations use a combination of software and hardware encryption with pre boot authentication and multifactor authentication providing layers of protection that can defeat the most sophisticated threat actors.
Cigent provides multiple secure storage to support Unmanned Vehicle operations. These include M.2 2230 SSD that provides full drive hardware encryption, the ability to create up to eight separate hidden partitions, and patented verified data erasure. Additionally, Cigent offers SSD BGA with full drive hardware encryption, the ability to create hidden partitions, and remote and policy data erasure. Both of these drives have Automotive temperature ratings. Additionally, Cigent provides the flexibility and security of hardware encryption on SD and MicroSD cards. These also include the ability to create hidden partitions and data erasure and have Industrial temperature ratings.
Yes, Cigent protections have been thoroughly tested and validated by leading Federal agencies including MITRE, NIST, NSA, NIAP, the Air Force, Cyber Resilience of Weapon Systems (CROWS), and NSSIF (UK).
Still have questions?
Learn more about Cigent and our solutions by downloading our company overview.

Cigent’s Federal Data Protection Solutions are second to none
Learn more about how Cigent can help you achieve your mission and protect data at rest and data on the edge from all forms of attack.