This page was not yet optimized for use on mobile
devices.
IBM AIX 5L for POWER V5.3, Technology level 5300-05-02 with Argus Systems Group PitBull Foundation Suite 5.0 and optional IBM Virtual IO Server (VIOS) Version 1.3
CSV information
| Status | archived |
|---|---|
| Valid from | 16.01.2007 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Innovative Security Systems, Inc. |
| Category | Operating Systems |
| Security level | EAL4+, ALC_FLR.1 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0396-2007
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Schemes
MACSecurity level
EAL4, EAL 1, EAL 7, EAL 4, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL4 augmentedClaims
T.UAUSER, T.UAACCESS, T.UAACTION, T.VIOS, A.MANAGE, A.NO_EVIL_ADMIN, A.COOP, A.UTRAIN, A.UTRUST, A.LOCATE, A.PROTECT, A.NET_COMP, A.PEER, A.CONNECTSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VLA.2, AVA_MSU.2, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.3, AVA_VLA.4, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_RIP, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_USB.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FPT_AMT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_TDC.1, FPT_TST.1, FPT_RVMCertificates
BSI-DSZ-CC-0396-2007, BSI-DSZ-CC-0303-2006, BSI-DSZ-CC-0396Evaluation facilities
atsecSide-channel analysis
malfunctionCertification process
Technical Report BSI-DSZ-CC-0396, Release 2, 2006-12-21, atsec information security GmbH (confidential document) [8] Labeled Security Protection Profile (LSPP), Issue 1.b, 8 October 1999 User GuidanceStandards
AIS 34, ISO/IEC 15408:2005Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-DSZ-CC-0396-2007 |
|---|---|
| Keywords | Common Criteria, Certification, Zertifizierung; AIX 5L for POWER V5.3,Innovative Security Systems, Inc., IBM Corporation, |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20070118130925+01'00' |
| Modification date | D:20070308085123+01'00' |
| Pages | 52 |
| Creator | Acrobat PDFMaker 7.0.7 für Word |
| Producer | Acrobat Distiller 7.0.5 (Windows) |
Frontpage
| Certificate ID | BSI-DSZ-CC-0396-2007 |
|---|---|
| Certified item | AIX 5L for POWER V5.3 with Technology Package 5300-05-02 with Argus Systems Group PitBull Foundation 5.0 and the Virtual IO Server (VIOS) Version 1.3 |
| Certification lab | BSI |
| Developer | Innovative Security Systems, Inc. sponsored by IBM Corporation |
References
Outgoing- BSI-DSZ-CC-0303-2006 - archived - IBM AIX 5L for POWER V 5.2, Maintenance Level 5200-05 with Innovative Security Systems PitBull Foundation 5.0
Security target
Extracted keywords
Schemes
MACSecurity level
EAL4, EAL3, EAL 4, EAL4 augmented, EAL 4 augmentedClaims
O.AUDITING, O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.ENFORCEMENT, O.ERASE, O.MANAGE, O.MANDATORY_ACCESS, O.MANDATORY_INTEGRITY, O.NETWORK_ACCESS, O.RESIDUAL_INFORMATION, O.TCB_ACCESS, O.STACK, O.VIOS, T.UAACCESS, T.UAACTION, T.UAUSER, T.VIOS, A.LOCATE, A.PROTECT, A.COOP, A.MANAGE, A.NO_EVIL_ADM, A.UTRAIN, A.UTRUST, A.CONNECT, A.NET_COMP, A.PEER, A.CLEARANCE, A.SENSITIVITY, OE.ADMIN, OE.CREDEN, OE.HW_SEP, OE.INFO_PROTECT, OE.INSTALL, OE.MAINTENANCE, OE.PHYSICAL, OE.RECOVER, OE.SERIAL_LOGIN, OE.SOFTWARE_IN, OE.PROTECT, OE.LPARSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_GEN, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FDP_RIP, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_IFC.1.1, FDP_IFF.2.1, FDP_IFF.2.2, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_IFF.2.7, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_MSA.3, FDP_RIP.1, FDP_IFF.1, FIA_UID.2, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.7, FIA_USB.1, FIA_UID, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UAU.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_RVM, FPT_AMT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_TDC.1, FPT_TST.1, FPT_AMT.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1Evaluation facilities
atsecSide-channel analysis
malfunctionStandards
FIPS PUB 189, FIPS PUB 188, AIS 32, RFC 1108, ISO/IEC 9945-2, CCIMB-2005-08-001, CCIMB-2005-08-002, CCIMB-2005-08-003, CCIMB-2005-08-004File metadata
| Title | IBM AIX V5.3 w/PitBull Foundation r5.0 and opt VIOS Security Target |
|---|---|
| Author | atsec |
| Creation date | D:20070306161211Z |
| Modification date | D:20070308084600+01'00' |
| Pages | 125 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0396-2007Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Similar certificates
Showing 5 out of 37.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "059ec6ad2ed1bf9e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0396-2007",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0",
"5.3",
"1.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0303-2006"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0302-2005",
"BSI-DSZ-CC-0303-2006",
"BSI-DSZ-CC-0194-2002",
"BSI-DSZ-CC-0217-2003"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Innovative Security Systems, Inc.",
"manufacturer_web": "https://www.innovativesecurity.com/",
"name": "IBM AIX 5L for POWER V5.3, Technology level 5300-05-02 with Argus Systems Group PitBull Foundation Suite 5.0 and optional IBM Virtual IO Server (VIOS) Version 1.3",
"not_valid_after": "2019-09-01",
"not_valid_before": "2007-01-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0396a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0396-2007",
"cert_item": "AIX 5L for POWER V5.3 with Technology Package 5300-05-02 with Argus Systems Group PitBull Foundation 5.0 and the Virtual IO Server (VIOS) Version 1.3",
"cert_lab": "BSI",
"developer": "Innovative Security Systems, Inc. sponsored by IBM Corporation",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0303-2006": 4,
"BSI-DSZ-CC-0396": 1,
"BSI-DSZ-CC-0396-2007": 25
}
},
"cc_claims": {
"A": {
"A.CONNECT": 1,
"A.COOP": 1,
"A.LOCATE": 1,
"A.MANAGE": 1,
"A.NET_COMP": 1,
"A.NO_EVIL_ADMIN": 1,
"A.PEER": 1,
"A.PROTECT": 1,
"A.UTRAIN": 1,
"A.UTRUST": 1
},
"T": {
"T.UAACCESS": 1,
"T.UAACTION": 1,
"T.UAUSER": 1,
"T.VIOS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 2,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.2": 1,
"ADV_HLD": 2,
"ADV_HLD.2": 1,
"ADV_IMP": 2,
"ADV_IMP.1": 1,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.1": 1,
"ADV_SPM": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.1": 1,
"ALC_FLR": 2,
"ALC_FLR.1": 6,
"ALC_LCD": 1,
"ALC_LCD.1": 1,
"ALC_TAT": 2,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.2": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.2": 1,
"AVA_SOF": 3,
"AVA_SOF.1": 1,
"AVA_VLA": 3,
"AVA_VLA.2": 4,
"AVA_VLA.3": 1,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 1,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 11,
"EAL4 augmented": 3,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.2": 1,
"FAU_SAR.1": 1,
"FAU_SAR.2": 1,
"FAU_SAR.3": 1,
"FAU_SEL.1": 1,
"FAU_STG.1": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 1
},
"FDP": {
"FDP_ACC.1": 6,
"FDP_ACF.1": 6,
"FDP_ETC.1": 1,
"FDP_ETC.2": 1,
"FDP_IFC.1": 3,
"FDP_IFF.2": 3,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP": 1,
"FDP_RIP.2": 1
},
"FIA": {
"FIA_ATD.1": 2,
"FIA_SOS.1": 1,
"FIA_UAU.2": 1,
"FIA_UAU.7": 1,
"FIA_UID.2": 2,
"FIA_USB.1": 2
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.3": 7,
"FMT_MTD.1": 7,
"FMT_REV.1": 3,
"FMT_SMF.1": 1,
"FMT_SMR.1": 2
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_RVM": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_STM.1": 1,
"FPT_TDC.1": 1,
"FPT_TST.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"Technical Report BSI-DSZ-CC-0396, Release 2, 2006-12-21, atsec information security GmbH (confidential document) [8] Labeled Security Protection Profile (LSPP), Issue 1.b, 8 October 1999 User Guidance": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"BSI": {
"AIS 34": 1
},
"ISO": {
"ISO/IEC 15408:2005": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Company": "BSI, Postfach 200363, 53133 Bonn",
"/CreationDate": "D:20070118130925+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.7 f\u00fcr Word",
"/Keywords": "Common Criteria, Certification, Zertifizierung; AIX 5L for POWER V5.3,Innovative Security Systems, Inc., IBM Corporation,",
"/ModDate": "D:20070308085123+01\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/SourceModified": "D:20070118120750",
"/Title": "Certification Report BSI-DSZ-CC-0396-2007",
"pdf_file_size_bytes": 348875,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 52
},
"st_filename": "0396b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CLEARANCE": 3,
"A.CONNECT": 8,
"A.COOP": 4,
"A.LOCATE": 4,
"A.MANAGE": 5,
"A.NET_COMP": 6,
"A.NO_EVIL_ADM": 3,
"A.PEER": 4,
"A.PROTECT": 6,
"A.SENSITIVITY": 3,
"A.UTRAIN": 6,
"A.UTRUST": 6
},
"O": {
"O.AUDITING": 23,
"O.AUTHORIZATION": 22,
"O.DISCRETIONARY_ACCESS": 13,
"O.ENFORCEMENT": 17,
"O.ERASE": 8,
"O.MANAGE": 21,
"O.MANDATORY_ACCESS": 13,
"O.MANDATORY_INTEGRITY": 10,
"O.NETWORK_ACCESS": 13,
"O.RESIDUAL_INFORMATION": 11,
"O.STACK": 12,
"O.TCB_ACCESS": 13,
"O.VIOS": 12
},
"OE": {
"OE.ADMIN": 7,
"OE.CREDEN": 4,
"OE.HW_SEP": 9,
"OE.INFO_PROTECT": 15,
"OE.INSTALL": 14,
"OE.LPAR": 9,
"OE.MAINTENANCE": 5,
"OE.PHYSICAL": 8,
"OE.PROTECT": 10,
"OE.RECOVER": 7,
"OE.SERIAL_LOGIN": 5,
"OE.SOFTWARE_IN": 5
},
"T": {
"T.UAACCESS": 7,
"T.UAACTION": 5,
"T.UAUSER": 7,
"T.VIOS": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 2
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_FLR.1": 8,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_SOF.1": 1,
"AVA_VLA.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 4 augmented": 1,
"EAL3": 3,
"EAL4": 7,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 3,
"FAU_GEN.1": 11,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 12,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 10,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 13,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 10,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 10,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 8,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 8,
"FAU_STG.3.1": 1,
"FAU_STG.4": 8,
"FAU_STG.4.1": 1
},
"FDP": {
"FDP_ACC.1": 78,
"FDP_ACC.1.1": 6,
"FDP_ACF.1": 75,
"FDP_ACF.1.1": 6,
"FDP_ACF.1.2": 6,
"FDP_ACF.1.3": 7,
"FDP_ACF.1.4": 6,
"FDP_ETC.1": 9,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_ETC.2": 11,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 49,
"FDP_IFC.1.1": 3,
"FDP_IFF.1": 11,
"FDP_IFF.2": 35,
"FDP_IFF.2.1": 3,
"FDP_IFF.2.2": 6,
"FDP_IFF.2.3": 3,
"FDP_IFF.2.4": 3,
"FDP_IFF.2.5": 3,
"FDP_IFF.2.6": 3,
"FDP_IFF.2.7": 3,
"FDP_ITC.1": 9,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 9,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_MSA.3": 1,
"FDP_RIP": 23,
"FDP_RIP.1": 1,
"FDP_RIP.2": 13
},
"FIA": {
"FIA_ATD.1": 28,
"FIA_ATD.1.1": 2,
"FIA_SOS.1": 13,
"FIA_UAU.1": 3,
"FIA_UAU.2": 13,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 11,
"FIA_UID": 1,
"FIA_UID.1": 8,
"FIA_UID.2": 23,
"FIA_UID.2.1": 2,
"FIA_USB.1": 25,
"FIA_USB.1.1": 2,
"FIA_USB.1.2": 2,
"FIA_USB.1.3": 2
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MSA.1": 63,
"FMT_MSA.1.1": 7,
"FMT_MSA.3": 71,
"FMT_MSA.3.1": 8,
"FMT_MSA.3.2": 7,
"FMT_MTD.1": 63,
"FMT_MTD.1.1": 8,
"FMT_REV.1": 28,
"FMT_REV.1.1": 3,
"FMT_REV.1.2": 3,
"FMT_SMF.1": 35,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 32,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_AMT.1": 9,
"FPT_AMT.1.1": 1,
"FPT_RVM": 19,
"FPT_RVM.1": 10,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 11,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 8,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 10,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 88
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 8
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 8
}
},
"standard_id": {
"BSI": {
"AIS 32": 3
},
"CC": {
"CCIMB-2005-08-001": 1,
"CCIMB-2005-08-002": 1,
"CCIMB-2005-08-003": 1,
"CCIMB-2005-08-004": 1
},
"FIPS": {
"FIPS PUB 188": 2,
"FIPS PUB 189": 1
},
"ISO": {
"ISO/IEC 9945-2": 1
},
"RFC": {
"RFC 1108": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "atsec",
"/CreationDate": "D:20070306161211Z",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20070308084600+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "IBM AIX V5.3 w/PitBull Foundation r5.0 and opt VIOS Security Target",
"pdf_file_size_bytes": 1404682,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 125
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0396a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0396b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "715d164cbcb9d0971bea3a8fc89fda0c488df24456ca8953463436bb90c2df05",
"txt_hash": "e672f8fbd89a5a7c70a3d14b837e1f13d54998f5a36a32058ffcd569c720344e"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f05e3c43e3a8812e91452c03ed331347fd61413d1e7829831d322fdb77ceb913",
"txt_hash": "fd7f9171d7f0067cd6d0b85f01fb0baefce651091496535c34793dd5c9e6948c"
}
},
"status": "archived"
}