API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454
CSV information ?
Status | active |
---|---|
Valid from | 16.02.2023 |
Valid until | 16.02.2028 |
Scheme | 🇫🇷 FR |
Manufacturer | Axway |
Category | Network and Network-Related Devices and Systems |
Security level | EAL4+, ALC_FLR.3, AVA_VAN.4 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL4, EAL2Security Assurance Requirements (SAR)
ALC_FLR.3, AVA_VAN.4Certificates
ANSSI-CC-2023/07Evaluation facilities
OPPIDACertification report ?
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL 4, EAL2, EAL4, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
AGD_PRE, AGD_OPE, ALC_FLR.3, ALC_FLR, AVA_VAN.4Certificates
ANSSI-CC-2023/07Evaluation facilities
OPPIDAStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003Security target ?
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256Asymmetric Algorithms
Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA256, SHA512, PBKDF2Schemes
MAC, Key exchangeProtocols
SSH, SSL, TLS, TLS 1.2, TLS 1.3, TLS v1.2, TLSv1.2, TLS v1.3, PGPRandomness
PRNGLibraries
OpenSSLElliptic Curves
secp256r1Block cipher modes
CBC, CTRTLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384Security level
EAL4+, EAL4Claims
O.ACCESSID, O.AUDIT, O.AUTH, O.BANNER, O.CONSISTENT, O.DISTRIB, O.INTEGRITY, O.MANAGE, O.POLICY, O.PROTCOMMS, O.ROBUST, O.CRYPTO, O.DATAPROT, O.MAINTAIN, O.MNGRID, O.MONITOR, O.OFLOWS, O.RESILIENT, O.SELFID, O.CONSISTEN, O.PROTCOM, T.ADMIN_ERROR, T.CONDTRADICT, T.EAVES, T.FORGE, T.UNAUTH, T.WEAKPOL, T.WEAKIA, T.DISABLE, T.FALSIFY, T.MASK, T.NOROUTE, T.OFLOWS, T.BYPASS_POLICY, T.CONTRADICT, A.ENDUSER_DATA, A.POLICY, A.AUDIT_TRAIL, A.CREDENTIALS, OE.ADMIN, OE.INSTALL, OE.PERSON, OE.SYSTIME, OE.USERID, OE.POLICY, OE.KEY_ERASESecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_ARC.1, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.1, ALC_CMS.1, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_IND.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.4Security Functional Requirements (SFR)
FAU_SEL_EXT.1, FAU_STG_EXT.1, FAU_GEN.1, FAU_SEL.1, FAU_STG.1, FAU_SAR.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SEL.1.1, FAU_SEL_EXT.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FCO_NRR.2, FCO_NRR.1, FCO_NRR.2.1, FCO_NRR.2.2, FCO_NRR.2.3, FCS_TLS_EXT.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_TLS_EXT.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_COP.1.1, FCS_CKM.4, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.4, FDP_IFF.5, FDP_ITC.1, FDP_ITC.2, FIA_AFL.1, FIA_SOS.1, FIA_USB.1, FIA_UID.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF_EXT.1, FMT_MSA_EXT.5, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MOF.1.1, FMT_MOF_EXT.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA_EXT.5.1, FMT_MSA_EXT.5.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1.1, FPT_APW_EXT.1, FPT_FLS_EXT.1, FPT_SKP_EXT.1, FPT_RPL.1, FPT_TDC, FPT_STM.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_FLS_EXT.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_SKP_EXT.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1, FRU_FLT.1, FRU_FLT.1.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Evaluation facilities
OPPIDAStandards
FIPS197, FIPS180-4, PKCS#1, PKCS7, RFC 2818, RFC 5246, RFC8446, RFC4253, RFC5246, RFC4344, RFC3447, RFC2104, RFC4627, RFC2616, RFC2818, RFC0959, RFC4217, RFC4252, RFC2617, RFC5280, RFC4716, RFC 8446, X.509, CCMB-2017-04-002, CCMB-2017-04-003Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4Scheme data ?
Product | API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454 | |
Description | Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE. Ce produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l | |
Sponsor | AXWAY Software | |
Developer | AXWAY Software | |
Cert Id | ANSSI-CC-2023/07 | |
Level | EAL4+ | |
Expiration Date | 15.02.2028 | |
Enhanced | ||
Cert Id | ANSSI-CC-2023/07 | |
Certification Date | 16.02.2023 | |
Expiration Date | 15.02.2028 | |
Category | Produits réseau | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | AXWAY Software | |
Sponsor | AXWAY Software | |
Evaluation Facility | OPPIDA | |
Level | EAL4+ | |
Protection Profile | ||
Mutual Recognition | CCRA SOG-IS | |
Augmented | (AVA_VAN.4, ALC_FLR.3) | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf |
References ?
No references are available for this certificate.
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454', 'url': 'https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454', 'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE. Ce produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'sponsor': 'AXWAY Software', 'developer': 'AXWAY Software', 'cert_id': 'ANSSI-CC-2023/07', 'level': 'EAL4+', 'expiration_date': '2028-02-15', 'enhanced': {'cert_id': 'ANSSI-CC-2023/07', 'certification_date': '2023-02-16', 'expiration_date': '2028-02-15', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AXWAY Software', 'sponsor': 'AXWAY Software', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': '(AVA_VAN.4, ALC_FLR.3)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE. Ce produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'expiration_date': '2028-02-15', 'enhanced': {'__update__': {'certification_date': '2023-02-16', 'expiration_date': '2028-02-15', 'mutual_recognition': 'CCRA SOG-IS'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454', 'url': 'https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454', 'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE.\n\nCe produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'sponsor': 'AXWAY Software', 'developer': 'AXWAY Software', 'cert_id': 'ANSSI-CC-2023/07', 'level': 'EAL4+', 'expiration_date': '15 Février 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/07', 'certification_date': '16/02/2023', 'expiration_date': '15/02/2028', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AXWAY Software', 'sponsor': 'AXWAY Software', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': '(AVA_VAN.4, ALC_FLR.3)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': '28bc07e44b743122ead336c03632a2585889e689e8554ec6e08a3cfe1102512a', 'txt_hash': 'ba4462197e773e496aa57d1dc41353b7be77ca02ec5e136d5fc157179ce674ef'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': 'e9ab30c9496f6e2b6fc67ad410b13bc94e08d09e4e28034517d5ebd79aa29d56', 'txt_hash': '6cbc0fa003c211bfad1b11426bd1e075bd0a57e7175ec37e28f99693ff3add32'}
data.
The PDF extraction data was updated.
- The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_ARC.1': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 2, 'ALC_CMC.1': 1, 'ALC_CMS.1': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.4': 4}}, 'cc_sfr': {'FAU': {'FAU_SEL_EXT.1': 8, 'FAU_STG_EXT.1': 7, 'FAU_GEN.1': 18, 'FAU_SEL.1': 6, 'FAU_STG.1': 6, 'FAU_SAR.3': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_SEL_EXT.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG_EXT.1.1': 1, 'FAU_STG_EXT.1.2': 1, 'FAU_STG_EXT.1.3': 1, 'FAU_SAR.1': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1}, 'FCO': {'FCO_NRR.2': 7, 'FCO_NRR.1': 1, 'FCO_NRR.2.1': 1, 'FCO_NRR.2.2': 1, 'FCO_NRR.2.3': 1}, 'FCS': {'FCS_TLS_EXT.1': 11, 'FCS_CKM.1': 14, 'FCS_CKM.2': 6, 'FCS_COP.1': 44, 'FCS_TLS_EXT.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_COP.1.1': 4, 'FCS_CKM.4': 11}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 8, 'FDP_IFC.1': 9, 'FDP_IFF.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.4': 1, 'FDP_IFF.5': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_AFL.1': 8, 'FIA_SOS.1': 9, 'FIA_USB.1': 8, 'FIA_UID.1': 4, 'FIA_UAU.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 1}, 'FMT': {'FMT_MOF_EXT.1': 14, 'FMT_MSA_EXT.5': 7, 'FMT_MOF.1': 18, 'FMT_MSA.1': 8, 'FMT_MSA.3': 14, 'FMT_SMF.1': 20, 'FMT_SMR.1': 20, 'FMT_MTD.1': 13, 'FMT_MOF.1.1': 2, 'FMT_MOF_EXT.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA_EXT.5.1': 1, 'FMT_MSA_EXT.5.2': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1.1': 1}, 'FPT': {'FPT_APW_EXT.1': 7, 'FPT_FLS_EXT.1': 9, 'FPT_SKP_EXT.1': 7, 'FPT_RPL.1': 10, 'FPT_TDC': 1, 'FPT_STM.1': 2, 'FPT_APW_EXT.1.1': 1, 'FPT_APW_EXT.1.2': 1, 'FPT_FLS_EXT.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_SKP_EXT.1.1': 1, 'FPT_TDC.1': 7, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS.1': 1}, 'FRU': {'FRU_FLT.1': 6, 'FRU_FLT.1.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.4': 4, 'FTA_TAB.1': 6, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 16, 'FTP_TRP.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCESSID': 5, 'O.AUDIT': 5, 'O.AUTH': 4, 'O.BANNER': 5, 'O.CONSISTENT': 4, 'O.DISTRIB': 3, 'O.INTEGRITY': 3, 'O.MANAGE': 4, 'O.POLICY': 4, 'O.PROTCOMMS': 5, 'O.ROBUST': 4, 'O.CRYPTO': 8, 'O.DATAPROT': 5, 'O.MAINTAIN': 4, 'O.MNGRID': 7, 'O.MONITOR': 5, 'O.OFLOWS': 3, 'O.RESILIENT': 5, 'O.SELFID': 5, 'O.CONSISTEN': 1, 'O.PROTCOM': 1}, 'T': {'T.ADMIN_ERROR': 3, 'T.CONDTRADICT': 1, 'T.EAVES': 3, 'T.FORGE': 2, 'T.UNAUTH': 3, 'T.WEAKPOL': 2, 'T.WEAKIA': 3, 'T.DISABLE': 2, 'T.FALSIFY': 3, 'T.MASK': 2, 'T.NOROUTE': 3, 'T.OFLOWS': 2, 'T.BYPASS_POLICY': 3, 'T.CONTRADICT': 1}, 'A': {'A.ENDUSER_DATA': 1, 'A.POLICY': 1, 'A.AUDIT_TRAIL': 1, 'A.CREDENTIALS': 1}, 'OE': {'OE.ADMIN': 5, 'OE.INSTALL': 6, 'OE.PERSON': 3, 'OE.SYSTIME': 4, 'OE.USERID': 4, 'OE.POLICY': 4, 'OE.KEY_ERASE': 7}}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'constructions': {'MAC': {'HMAC': 2, 'HMAC-SHA-256': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 8, 'SHA-384': 4, 'SHA-512': 2, 'SHA256': 1, 'SHA512': 1}}, 'PBKDF': {'PBKDF2': 5}}, 'crypto_scheme': {'MAC': {'MAC': 13}, 'KEX': {'Key exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 6}, 'TLS': {'TLS': 44, 'TLS 1.2': 6, 'TLS 1.3': 7, 'TLS v1.2': 3, 'TLSv1.2': 6, 'TLS v1.3': 7}}, 'PGP': {'PGP': 2}}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'CTR': {'CTR': 3}}, 'ecc_curve': {'NIST': {'secp256r1': 8}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 2, 'TLS_RSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS197': 1, 'FIPS180-4': 3}, 'PKCS': {'PKCS#1': 3, 'PKCS7': 1}, 'RFC': {'RFC 2818': 1, 'RFC 5246': 2, 'RFC8446': 7, 'RFC4253': 6, 'RFC5246': 7, 'RFC4344': 1, 'RFC3447': 2, 'RFC2104': 1, 'RFC4627': 2, 'RFC2616': 1, 'RFC2818': 1, 'RFC0959': 3, 'RFC4217': 1, 'RFC4252': 1, 'RFC2617': 1, 'RFC5280': 2, 'RFC4716': 1, 'RFC 8446': 1}, 'X509': {'X.509': 9}, 'CC': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/07': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2023_07.pdf
. - The cert_filename property was set to
certificat-anssi-cc-2023_07.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': '288219f6ec61eccf73c31eb43bb0d1518e2e981eb85b91dbc77f6eedd8f0b3ef', 'txt_hash': 'd4285de8fd7f4de236407d2571efa6306abf2cb438809c6ec074cb9feb731c0e'}
data.
The PDF extraction data was updated.
- The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/07': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 2, 'EAL4': 2}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_FLR.3': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2023_07fr.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2023/07
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_07fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_07.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The scheme_data property was set to
{'product': 'API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454', 'url': 'https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454', 'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE.\n\nCe produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'sponsor': 'AXWAY Software', 'developer': 'AXWAY Software', 'cert_id': 'ANSSI-CC-2023/07', 'level': 'EAL4+', 'expiration_date': '15 Février 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/07', 'certification_date': '16/02/2023', 'expiration_date': '15/02/2028', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AXWAY Software', 'sponsor': 'AXWAY Software', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': '(AVA_VAN.4, ALC_FLR.3)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf'}}
.
- The report property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2023_07.pdf",
"dgst": "1287477a150148d4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2023/07",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.7.20210"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2023/07",
"description": "Le produit \u00e9valu\u00e9 est \u00ab API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 \u00bb d\u00e9velopp\u00e9 par AXWAY SOFTWARE. Ce produit est une plateforme de gestion d\u2019API qui permet de g\u00e9rer de mani\u00e8re centralis\u00e9e le contr\u00f4le d\u2019acc\u00e8s aux services web et aux ressources connexes d\u2019une entreprise. Plus pr\u00e9cis\u00e9ment, il s\u2019ag\u00eet d\u2019une plateforme compl\u00e8te pour la gestion centralis\u00e9e, et l",
"developer": "AXWAY Software",
"enhanced": {
"augmented": "(AVA_VAN.4, ALC_FLR.3)",
"category": "Produits r\u00e9seau",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2023/07",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf",
"certification_date": "2023-02-16",
"developer": "AXWAY Software",
"evaluation_facility": "OPPIDA",
"expiration_date": "2028-02-15",
"level": "EAL4+",
"mutual_recognition": "CCRA SOG-IS",
"protection_profile": "",
"sponsor": "AXWAY Software"
},
"expiration_date": "2028-02-15",
"level": "EAL4+",
"product": "API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454",
"sponsor": "AXWAY Software",
"url": "https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Axway",
"manufacturer_web": "https://www.axway.com",
"name": "API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454",
"not_valid_after": "2028-02-16",
"not_valid_before": "2023-02-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-anssi-cc-2023_07.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/07": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "anssi-cc-2023_07fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/07": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL2": 2,
"EAL4": 2
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": null,
"st_filename": "anssi-cible-cc-2023_07.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUDIT_TRAIL": 1,
"A.CREDENTIALS": 1,
"A.ENDUSER_DATA": 1,
"A.POLICY": 1
},
"O": {
"O.ACCESSID": 5,
"O.AUDIT": 5,
"O.AUTH": 4,
"O.BANNER": 5,
"O.CONSISTEN": 1,
"O.CONSISTENT": 4,
"O.CRYPTO": 8,
"O.DATAPROT": 5,
"O.DISTRIB": 3,
"O.INTEGRITY": 3,
"O.MAINTAIN": 4,
"O.MANAGE": 4,
"O.MNGRID": 7,
"O.MONITOR": 5,
"O.OFLOWS": 3,
"O.POLICY": 4,
"O.PROTCOM": 1,
"O.PROTCOMMS": 5,
"O.RESILIENT": 5,
"O.ROBUST": 4,
"O.SELFID": 5
},
"OE": {
"OE.ADMIN": 5,
"OE.INSTALL": 6,
"OE.KEY_ERASE": 7,
"OE.PERSON": 3,
"OE.POLICY": 4,
"OE.SYSTIME": 4,
"OE.USERID": 4
},
"T": {
"T.ADMIN_ERROR": 3,
"T.BYPASS_POLICY": 3,
"T.CONDTRADICT": 1,
"T.CONTRADICT": 1,
"T.DISABLE": 2,
"T.EAVES": 3,
"T.FALSIFY": 3,
"T.FORGE": 2,
"T.MASK": 2,
"T.NOROUTE": 3,
"T.OFLOWS": 2,
"T.UNAUTH": 3,
"T.WEAKIA": 3,
"T.WEAKPOL": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 2,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 18,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 6,
"FAU_SEL.1.1": 1,
"FAU_SEL_EXT.1": 8,
"FAU_SEL_EXT.1.1": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG_EXT.1": 7,
"FAU_STG_EXT.1.1": 1,
"FAU_STG_EXT.1.2": 1,
"FAU_STG_EXT.1.3": 1
},
"FCO": {
"FCO_NRR.1": 1,
"FCO_NRR.2": 7,
"FCO_NRR.2.1": 1,
"FCO_NRR.2.2": 1,
"FCO_NRR.2.3": 1
},
"FCS": {
"FCS_CKM.1": 14,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 6,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 11,
"FCS_COP.1": 44,
"FCS_COP.1.1": 4,
"FCS_TLS_EXT.1": 11,
"FCS_TLS_EXT.1.1": 1
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 9,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 7,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.4": 1,
"FDP_IFF.5": 1,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 1,
"FIA_SOS.1": 9,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 1,
"FIA_UID.1": 4,
"FIA_USB.1": 8,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 18,
"FMT_MOF.1.1": 2,
"FMT_MOF_EXT.1": 14,
"FMT_MOF_EXT.1.1": 1,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA_EXT.5": 7,
"FMT_MSA_EXT.5.1": 1,
"FMT_MSA_EXT.5.2": 1,
"FMT_MTD.1": 13,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 20,
"FMT_SMR.1": 20,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_APW_EXT.1": 7,
"FPT_APW_EXT.1.1": 1,
"FPT_APW_EXT.1.2": 1,
"FPT_FLS.1": 1,
"FPT_FLS_EXT.1": 9,
"FPT_FLS_EXT.1.1": 1,
"FPT_RPL.1": 10,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_SKP_EXT.1": 7,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM.1": 2,
"FPT_TDC": 1,
"FPT_TDC.1": 7,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT.1": 6,
"FRU_FLT.1.1": 1
},
"FTA": {
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1,
"FTA_TAB.1": 6,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 16,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 8,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CTR": {
"CTR": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"PGP": {
"PGP": 2
},
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 6
},
"TLS": {
"TLS": 44,
"TLS 1.2": 6,
"TLS 1.3": 7,
"TLS v1.2": 3,
"TLS v1.3": 7,
"TLSv1.2": 6
}
}
},
"crypto_scheme": {
"KEX": {
"Key exchange": 1
},
"MAC": {
"MAC": 13
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"secp256r1": 8
}
},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 1
}
},
"hash_function": {
"PBKDF": {
"PBKDF2": 5
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 8,
"SHA-384": 4,
"SHA-512": 2,
"SHA256": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS180-4": 3,
"FIPS197": 1
},
"PKCS": {
"PKCS#1": 3,
"PKCS7": 1
},
"RFC": {
"RFC 2818": 1,
"RFC 5246": 2,
"RFC 8446": 1,
"RFC0959": 3,
"RFC2104": 1,
"RFC2616": 1,
"RFC2617": 1,
"RFC2818": 1,
"RFC3447": 2,
"RFC4217": 1,
"RFC4252": 1,
"RFC4253": 6,
"RFC4344": 1,
"RFC4627": 2,
"RFC4716": 1,
"RFC5246": 7,
"RFC5280": 2,
"RFC8446": 7
},
"X509": {
"X.509": 9
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"constructions": {
"MAC": {
"HMAC": 2,
"HMAC-SHA-256": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA256": 2,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_07fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"AVA_VAN.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_07.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "e9ab30c9496f6e2b6fc67ad410b13bc94e08d09e4e28034517d5ebd79aa29d56",
"txt_hash": "6cbc0fa003c211bfad1b11426bd1e075bd0a57e7175ec37e28f99693ff3add32"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "288219f6ec61eccf73c31eb43bb0d1518e2e981eb85b91dbc77f6eedd8f0b3ef",
"txt_hash": "d4285de8fd7f4de236407d2571efa6306abf2cb438809c6ec074cb9feb731c0e"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "28bc07e44b743122ead336c03632a2585889e689e8554ec6e08a3cfe1102512a",
"txt_hash": "ba4462197e773e496aa57d1dc41353b7be77ca02ec5e136d5fc157179ce674ef"
}
},
"status": "active"
}