This page was not yet optimized for use on mobile
devices.
Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | active |
|---|---|
| Valid from | 17.05.2022 |
| Valid until | 17.05.2027 |
| Scheme | 🇲🇾 MY |
| Manufacturer | RSA Security LLC |
| Category | Other Devices and Systems |
| Security level | ALC_FLR.2, EAL2+ |
| Maintenance updates | Archer Suite v6.11 with the Archer IRM Mobile V1.4 (02.03.2023) Certification report Security target |
Heuristics summary
Certificate ID: ISCB-5-RPT-C124-CR-v1
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security Assurance Requirements (SAR)
ALC_FLR.2Certification report
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL 2Claims
A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, A.CRYPTOSecurity Assurance Requirements (SAR)
ALC_FLR.2Security Functional Requirements (SFR)
FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.1, FDP_ACF.1.4, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.2, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMR.1.1, FTA_SSL.4.1, FTA_TAB.1.1, FTA_SSL.3.1, FTA_TSE.1.1Certificates
ISCB-5-RPT-C124-CR-v1Evaluation facilities
LeidosStandards
ISO/IEC15408, ISO/IEC 18045File metadata
| Title | ISCB-5-RPT-C124-CR-v1 |
|---|---|
| Creation date | D:20220522032040Z00'00' |
| Modification date | D:20220522032040Z00'00' |
| Pages | 40 |
| Creator | Word |
| Producer | macOS Version 11.6 (Build 20G165) Quartz PDFContext |
Security target
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL2, EAL 2, EAL 2 augmentedClaims
O.ACCESS_CONTROL, O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.LOGON_BANNER, O.PASSWORD_CONTROLS, O.SECURITY_MANAGEMENT, O.SESSION_LIMITATION, O.SESSION_TERMINATION, O.THROTTLE, T.BRUTE_FORCE, T.DATA_COMPROMISE, T.INAPPROPRIATE_USE, T.NO_ACCOUNTABILITY, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, T.INAPPRORIATE_USE, A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, A.CRYPTO, OE.PHYSICAL, OE.PERSONNEL, OE.SECURE_COMMS, OE.TIME, OE.CRYPTOSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MOF, FMT_MSA, FMT_MTD.1, FMT_REV, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTA_TAB.1, FTA_TAB.1.1, FTA_TSE.1, FTA_TSE.1.1Standards
FIPS 140-2File metadata
| Title | RSA Archer 6.9.1_ST_v1.0-final |
|---|---|
| Creation date | D:20220522032525Z00'00' |
| Modification date | D:20220522032525Z00'00' |
| Pages | 45 |
| Creator | Word |
| Producer | macOS Version 11.6 (Build 20G165) Quartz PDFContext |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-5-RPT-C124-CR-v1Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on |
|---|---|---|---|---|
| Base score | ||||
| CVE-2020-26884 | MEDIUM | 6.1 | 18.11.2020 | |
| CVE-2020-29535 | MEDIUM | 5.4 | 29.01.2021 | |
| CVE-2020-29538 | MEDIUM | 4.9 | 29.01.2021 | |
| CVE-2021-29252 | MEDIUM | 5.4 | 26.05.2021 | |
| CVE-2021-29253 | MEDIUM | 5.5 | 26.05.2021 | |
| CVE-2021-33615 | HIGH | 7.5 | 02.06.2022 | |
| CVE-2021-33616 | MEDIUM | 5.4 | 04.04.2022 | |
| CVE-2021-38362 | MEDIUM | 6.5 | 30.03.2022 | |
| CVE-2021-41594 | MEDIUM | 6.5 | 30.03.2022 | |
| CVE-2022-26947 | MEDIUM | 5.4 | 30.03.2022 | |
| CVE-2022-26948 | HIGH | 7.5 | 30.03.2022 | |
| CVE-2022-26949 | MEDIUM | 6.5 | 30.03.2022 | |
| CVE-2022-26950 | MEDIUM | 6.1 | 30.03.2022 | |
| CVE-2022-26951 | MEDIUM | 6.1 | 30.03.2022 | |
| CVE-2022-30584 | HIGH | 8.8 | 26.05.2022 | |
| CVE-2022-30585 | MEDIUM | 6.5 | 26.05.2022 | |
| CVE-2022-37316 | MEDIUM | 6.5 | 25.08.2022 | |
| CVE-2022-37317 | MEDIUM | 5.4 | 25.08.2022 |
Showing 5 out of 18.
Similar certificates
| Name | Certificate ID | |
|---|---|---|
| RFprotectâ„¢ Distributed v6.1.2, RFprotectâ„¢ Sensor v6.1.22, and RFprotectâ„¢ Mobile v6.1.2 | 383-4-66 | Compare |
Scheme data
| Cert No | 2022-002-C124 | |
|---|---|---|
| Developer | RSA Security LLC | |
| Level | EAL2+ ALC_FLR.2 | |
| Product | Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 | |
| Certification Date | 17.05.2022 | |
| Expiration Date | 17.05.2027 | |
| Recognition | CCRA | |
| Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/128 | |
| Enhanced | ||
| Developer | RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America | |
| Status | Valid | |
| Scope | Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App. | |
| Cert Id | C124 | |
| Category | Other Devices and Systems | |
| Assurance Level | EAL2+ ALC_FLR.2 | |
| Product | Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 | |
| Certification Date | 17.05.2022 | |
| Expiration Date | 17.05.2027 | |
| Mutual Recognition | CCRA | |
| Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/Archer_Suite_v6912_with_the_Archer_IRM_Mobile_V14__ST_v10-final.pdf | |
| Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/ISCB-5-RPT-C124-CR-v1.pdf | |
| Type | Other Devices and Systems | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C124-CERTIFICATE-v1.pdf",
"dgst": "0f38dd1ae9d80dfa",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C124-CR-v1",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:rsa:archer:6.9:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.4",
"6.9.1.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2021-29253",
"CVE-2022-26950",
"CVE-2021-38362",
"CVE-2021-41594",
"CVE-2022-26949",
"CVE-2022-26951",
"CVE-2021-33615",
"CVE-2020-29538",
"CVE-2021-33616",
"CVE-2020-29535",
"CVE-2021-29252",
"CVE-2020-26884",
"CVE-2022-37316",
"CVE-2022-26948",
"CVE-2022-37317",
"CVE-2022-30584",
"CVE-2022-26947",
"CVE-2022-30585"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2022-002-C124",
"certification_date": "2022-05-17",
"developer": "RSA Security LLC",
"enhanced": {
"assurance_level": "EAL2+ ALC_FLR.2",
"category": "Other Devices and Systems",
"cert_id": "C124",
"certification_date": "2022-05-17",
"developer": "RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America",
"expiration_date": "2027-05-17",
"mutual_recognition": "CCRA",
"product": "Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/ISCB-5-RPT-C124-CR-v1.pdf",
"scope": "Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/Archer_Suite_v6912_with_the_Archer_IRM_Mobile_V14__ST_v10-final.pdf",
"type": "Other Devices and Systems"
},
"expiration_date": "2027-05-17",
"level": "EAL2+ ALC_FLR.2",
"product": "Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/128"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2023-03-02",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M019-AMR-v1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%206.11.0.3%20ST%20v1.0.pdf",
"maintenance_title": "Archer Suite v6.11 with the Archer IRM Mobile V1.4"
}
]
},
"manufacturer": "RSA Security LLC",
"manufacturer_web": "https://rsa.com",
"name": "Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4",
"not_valid_after": "2027-05-17",
"not_valid_before": "2022-05-17",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "ISCB-5-CERT-C124-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 1
}
},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C124-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C124-CR-v1": 39
}
},
"cc_claims": {
"A": {
"A.CRYPTO": 1,
"A.MANAGE": 1,
"A.PROTECT": 1,
"A.SECURE_COMMS": 1,
"A.TIME": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1.1": 7,
"FAU_GEN.1.2": 7,
"FAU_GEN.2.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2.1": 1,
"FAU_SAR.3.1": 1
},
"FDP": {
"FDP_ACC.1.1": 1,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 1
},
"FIA": {
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_ATD.1.1": 2,
"FIA_SOS.1.1": 1,
"FIA_UAU.2.1": 7,
"FIA_UAU.5.1": 7,
"FIA_UAU.5.2": 7,
"FIA_UAU.6.1": 2,
"FIA_UID.2.1": 6
},
"FMT": {
"FMT_MOF.1.1": 1,
"FMT_MSA.1.1": 2,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1.1": 4,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMF.1.1": 3,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 2
},
"FTA": {
"FTA_SSL.3.1": 2,
"FTA_SSL.4.1": 5,
"FTA_TAB.1.1": 1,
"FTA_TSE.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 8
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20220522032040Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20220522032040Z00\u002700\u0027",
"/Producer": "macOS Version 11.6 (Build 20G165) Quartz PDFContext",
"/Title": "ISCB-5-RPT-C124-CR-v1",
"pdf_file_size_bytes": 1218735,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
},
"st_filename": "Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 _ST_v1.0-final.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CRYPTO": 3,
"A.MANAGE": 2,
"A.PROTECT": 2,
"A.SECURE_COMMS": 3,
"A.TIME": 2
},
"O": {
"O.ACCESS_CONTROL": 4,
"O.AUDIT": 4,
"O.AUDIT_REVIEW": 4,
"O.I_AND_A": 3,
"O.LOGON_BANNER": 4,
"O.PASSWORD_CONTROLS": 3,
"O.SECURITY_MANAGEMENT": 4,
"O.SESSION_LIMITATION": 3,
"O.SESSION_TERMINATION": 4,
"O.THROTTLE": 3
},
"OE": {
"OE.CRYPTO": 3,
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2,
"OE.SECURE_COMMS": 2,
"OE.TIME": 3
},
"T": {
"T.BRUTE_FORCE": 3,
"T.DATA_COMPROMISE": 2,
"T.INAPPROPRIATE_USE": 2,
"T.INAPPRORIATE_USE": 1,
"T.NO_ACCOUNTABILITY": 2,
"T.UNATTENDED_SESSION": 3,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_ACTIVITY": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.2": 11,
"ADV_TDS": 1,
"ADV_TDS.1": 11
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.2": 8,
"ALC_CMS": 1,
"ALC_CMS.2": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_FLR": 1,
"ALC_FLR.2": 16
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 14,
"ASE_ECD": 1,
"ASE_ECD.1": 10,
"ASE_INT": 1,
"ASE_INT.1": 12,
"ASE_OBJ": 1,
"ASE_OBJ.2": 10,
"ASE_REQ": 1,
"ASE_REQ.2": 13,
"ASE_SPD": 1,
"ASE_SPD.1": 7,
"ASE_TSS": 1,
"ASE_TSS.1": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL 2 augmented": 2,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 6,
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR": 9,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 4,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1
},
"FCS": {
"FCS_COP.1": 2,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 11,
"FDP_ACC.1.1": 1,
"FDP_ACF": 3,
"FDP_ACF.1": 5,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS": 3,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU": 7,
"FIA_UAU.1": 1,
"FIA_UAU.2": 9,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 5,
"FIA_UAU.6.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA": 5,
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 6,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 2,
"FMT_REV": 3,
"FMT_REV.1": 4,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMF": 2,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 2
},
"FTA": {
"FTA_SSL": 6,
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1,
"FTA_TAB": 3,
"FTA_TAB.1": 5,
"FTA_TAB.1.1": 1,
"FTA_TSE": 3,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 11
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20220522032525Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20220522032525Z00\u002700\u0027",
"/Producer": "macOS Version 11.6 (Build 20G165) Quartz PDFContext",
"/Title": "RSA Archer 6.9.1_ST_v1.0-final",
"pdf_file_size_bytes": 1012560,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C124-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Archer%20Suite%20v6.9.1.2%20with%20the%20Archer%20IRM%20Mobile%20V1.4%20_ST_v1.0-final.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "4e8ff25f020ab4dc3fefe0b9bd2a1dc594d98aaa60918a7a0c8f123f66590080",
"txt_hash": "35a7442933749f2fb6637596ae4fd50fda7324403b78f5247cb6b3e1437212af"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "02cbc4f91ccc98f97a590b2a06aaaf1a8c8030bd7e5dcd3a0ac2db85c5c2cd82",
"txt_hash": "158d154df2592e9660ab421614abd12b7ab7a555eb58f8f311f14f4dc85dbed2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "db7526965cda03c5bab505621d570354d427a22da45c412a5c2bc857eb8ebd03",
"txt_hash": "19958e4d742077e5d26b0acbef7c8c0c6efb7f77405dd4fd33587a46760115b0"
}
},
"status": "active"
}