SECIRON – Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0

CSV information ?

Status active
Valid from 06.02.2024
Valid until 06.02.2029
Scheme 🇲🇾 MY
Manufacturer SecIron (Malaysia) Sdn. Bhd.
Category Mobility
Security level EAL2

Heuristics summary ?

Certificate ID: ISCB-3-RPT-C129-CR-v1a

Certificate ?

Extracted keywords

Security level
EAL2

File metadata

Title ISCB-5-CERT-C129-CERTIFICATE-v1
Creation date D:20240222045557Z00'00'
Modification date D:20240222045557Z00'00'
Pages 1
Creator Word
Producer macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext

Certification report ?

Extracted keywords

Security level
EAL2, EAL 2
Claims
A.USER, A.DATAFLOW
Certificates
ISCB-5-RPT-C129-CR-v1a

Side-channel analysis
reverse engineering

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Title ISCB-3-RPT-C129-CR-v1a
Creation date D:20240222044408Z00'00'
Modification date D:20240222044408Z00'00'
Pages 31
Creator Word
Producer macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
RSA 1024
Hash functions
SHA256
Block cipher modes
CBC

Security level
EAL 2, EAL2
Claims
O.DATA, O.TAMPER, O.LOGS, T.TAMPER, T.DATA, T.LOGS, A.USER, A.DATAFLOW, OE.USER
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FPT_ITT.1, FPT_ITT.3, FPT_ITT.1.1, FPT_ITT.3.1, FPT_ITT.3.2, FPT_STM.1
Certification process
out of scope, FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1, 2, or FCS_COP.1 FCS_CKM.4 Yes (FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1) No - FCS_CKM.4 is not, as key management is out of scope FPT_ITT.1 - - - FPT_ITT.3 FPT_ITT.1 Yes - FAU_GEN.1 FPT_STM.1 No The timestamp is provided by the

Side-channel analysis
reverse engineering
Certification process
out of scope, FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1, 2, or FCS_COP.1 FCS_CKM.4 Yes (FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1) No - FCS_CKM.4 is not, as key management is out of scope FPT_ITT.1 - - - FPT_ITT.3 FPT_ITT.1 Yes - FAU_GEN.1 FPT_STM.1 No The timestamp is provided by the

Standards
FIPS PUB 197, FIPS 197, FIPS 180-4, FIPS 186-5

File metadata

Title SECIRON – Android Mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 Security Target
Subject SECIRON – Android Mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 Security Target
Author wlim
Creation date D:20231228204556+08'00'
Modification date D:20231228204556+08'00'
Pages 24
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Heuristics ?

Certificate ID: ISCB-3-RPT-C129-CR-v1a

Extracted SARs

ASE_SPD.1, ASE_REQ.2, ADV_FSP.2, ASE_INT.1, ALC_CMC.2, ASE_CCL.1, ADV_TDS.1, AGD_OPE.1, ALC_CMS.2, ASE_TSS.1, ALC_DEL.1, ATE_FUN.1, ADV_ARC.1, AVA_VAN.2, AGD_PRE.1, ATE_IND.2, ATE_COV.1, ASE_OBJ.2, ASE_ECD.1

Scheme data ?

Cert No 2024-001-C129
Developer SecIron (Malaysia) Sdn. Bhd. (201801025495 (1287515-T))
Level EAL2
Product SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0
Certification Date 06-02-2024
Expiration Date 06-02-2029
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/169
Enhanced
Cert Id C129
Product SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0
Developer Unit 704, Uptown One, No. 1, Jalan SS21/58, Damansara Uptown, 47400 Petaling Jaya, SelangorE-mail: [email protected]: +601133503181Website: https://www.seciron.com
Category Other Devices and Systems
Type Mobility
Scope Android Mobile Application Hardening Sandbox Module is a product designed by SECIRON and developed as part of IronWALL. IronWALL is designed to safeguard against a wide range of threats, including mobile application tampering, reverse engineering, debugging, jailbreaks, application cloning, malware, repackaging and other attacks on untrusted environment. The integrated security guarantee service effectively prevents malicious attacks against mobile applications such as de-compilation, repackaging, memory injection, dynamic debugging, data theft, transaction hijacking, and application phishing, and comprehensively protects application software security.
Assurance Level EAL2
Certification Date 06-02-2024
Expiration Date 06-02-2029
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/SECIRON__Android_Mobile_Application_Hardening_Sandbox_Module_AMAHSM_version_7.0-Security_Target-1.0.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/ISCB-3-RPT-C129-CR-v1a.pdf
Status Valid

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ce28a05a1dfdc2b4a321506c801c4c1e3f8a45f18936ba16df2fc75226847604', 'txt_hash': '6a925df113abee9d61037f49383fafbc9e608d61f86bc8c1500fc94fa1c1f1f5'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f66134024a62dde37b914bdfe124d08a534857f9a615be169013146803d57de7', 'txt_hash': '825cf90ad78ac9f9a0a07b05f5fb1b27e5f63f5e47b009d661e7517bed2ba115'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 641532, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/Title': 'SECIRON – Android Mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 Security Target', '/Author': 'wlim', '/Subject': 'SECIRON – Android Mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 Security Target', '/Creator': 'Microsoft® Word 2021', '/CreationDate': "D:20231228204556+08'00'", '/ModDate': "D:20231228204556+08'00'", '/Producer': 'Microsoft® Word 2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 829372, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'ISCB-5-CERT-C129-CERTIFICATE-v1', '/Producer': 'macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20240222045557Z00'00'", '/ModDate': "D:20240222045557Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1}, 'FCS': {'FCS_COP.1': 8, 'FCS_CKM.1': 8, 'FCS_CKM.2': 1, 'FCS_CKM.4': 4, 'FCS_CKM.1.1': 2, 'FCS_COP.1.1': 2}, 'FDP': {'FDP_ITC.1': 2, 'FDP_ITC.2': 2}, 'FPT': {'FPT_ITT.1': 6, 'FPT_ITT.3': 4, 'FPT_ITT.1.1': 3, 'FPT_ITT.3.1': 1, 'FPT_ITT.3.2': 1, 'FPT_STM.1': 2}}, 'cc_claims': {'O': {'O.DATA': 5, 'O.TAMPER': 4, 'O.LOGS': 4}, 'T': {'T.TAMPER': 3, 'T.DATA': 2, 'T.LOGS': 3}, 'A': {'A.USER': 3, 'A.DATAFLOW': 2}, 'OE': {'OE.USER': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS 197': 2, 'FIPS 180-4': 1, 'FIPS 186-5': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1': 1, '2, or FCS_COP.1 FCS_CKM.4 Yes (FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1) No - FCS_CKM.4 is not': 1, 'as key management is out of scope FPT_ITT.1 - - - FPT_ITT.3 FPT_ITT.1 Yes - FAU_GEN.1 FPT_STM.1 No The timestamp is provided by the': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to SECIRON – Android Mobile Application Hardening Sandbox Module (AMAHSM) version 7.0-Security Target-1.0.pdf.
    • The cert_filename property was set to ISCB-5-CERT-C129-CERTIFICATE-v1.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9d74a47e731deeb7f628ff3b05ba7c13b0651d75cdbb6d8c6f4490ddd417a82c', 'txt_hash': '0c219e4dad5e4b30f9c15d3c41b25dbda1e4ebebc5c02f90ff6161e8a98235eb'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1100872, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 31, '/Title': 'ISCB-3-RPT-C129-CR-v1a', '/Producer': 'macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20240222044408Z00'00'", '/ModDate': "D:20240222044408Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C129-CR-v1a': 30}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2, 'EAL 2': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.USER': 1, 'A.DATAFLOW': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-3-RPT-C129-CR-v1a.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-3-RPT-C129-CR-v1a.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C129-CR-v1a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SECIRON%20–%20Android%20Mobile%20Application%20Hardening%20Sandbox%20Module%20(AMAHSM)%20version%207.0-Security%20Target-1.0.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SECIRON – Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Mobility",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C129-CERTIFICATE-v1.pdf",
  "dgst": "17bfc3f4edcb545c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-3-RPT-C129-CR-v1a",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2024-001-C129",
      "certification_date": "06-02-2024",
      "developer": "SecIron (Malaysia) Sdn. Bhd. (201801025495 (1287515-T))",
      "enhanced": {
        "assurance_level": "EAL2",
        "category": "Other Devices and Systems",
        "cert_id": "C129",
        "certification_date": "06-02-2024",
        "developer": "Unit 704, Uptown One, No. 1, Jalan SS21/58, Damansara Uptown, 47400 Petaling Jaya, SelangorE-mail: [email protected]: +601133503181Website: https://www.seciron.com",
        "expiration_date": "06-02-2029",
        "mutual_recognition": "CCRA",
        "product": "SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/ISCB-3-RPT-C129-CR-v1a.pdf",
        "scope": "Android Mobile Application Hardening Sandbox Module is a product designed by SECIRON and developed as part of IronWALL. IronWALL is designed to safeguard against a wide range of threats, including mobile application tampering, reverse engineering, debugging, jailbreaks, application cloning, malware, repackaging and other attacks on untrusted environment. The integrated security guarantee service effectively prevents malicious attacks against mobile applications such as de-compilation, repackaging, memory injection, dynamic debugging, data theft, transaction hijacking, and application phishing, and comprehensively protects application software security.",
        "status": "Valid",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/SECIRON__Android_Mobile_Application_Hardening_Sandbox_Module_AMAHSM_version_7.0-Security_Target-1.0.pdf",
        "type": "Mobility"
      },
      "expiration_date": "06-02-2029",
      "level": "EAL2",
      "product": "SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/169"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "SecIron (Malaysia) Sdn. Bhd.",
  "manufacturer_web": "https://www.seciron.com",
  "name": "SECIRON \u2013 Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0",
  "not_valid_after": "2029-02-06",
  "not_valid_before": "2024-02-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ISCB-5-CERT-C129-CERTIFICATE-v1.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240222045557Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20240222045557Z00\u002700\u0027",
      "/Producer": "macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext",
      "/Title": "ISCB-5-CERT-C129-CERTIFICATE-v1",
      "pdf_file_size_bytes": 829372,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "ISCB-3-RPT-C129-CR-v1a.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C129-CR-v1a": 30
        }
      },
      "cc_claims": {
        "A": {
          "A.DATAFLOW": 1,
          "A.USER": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240222044408Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20240222044408Z00\u002700\u0027",
      "/Producer": "macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext",
      "/Title": "ISCB-3-RPT-C129-CR-v1a",
      "pdf_file_size_bytes": 1100872,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 31
    },
    "st_filename": "SECIRON \u2013 Android Mobile Application Hardening Sandbox Module (AMAHSM) version 7.0-Security Target-1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.DATAFLOW": 2,
          "A.USER": 3
        },
        "O": {
          "O.DATA": 5,
          "O.LOGS": 4,
          "O.TAMPER": 4
        },
        "OE": {
          "OE.USER": 3
        },
        "T": {
          "T.DATA": 2,
          "T.LOGS": 3,
          "T.TAMPER": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 5,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 8,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 4,
          "FCS_COP.1": 8,
          "FCS_COP.1.1": 2
        },
        "FDP": {
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2
        },
        "FPT": {
          "FPT_ITT.1": 6,
          "FPT_ITT.1.1": 3,
          "FPT_ITT.3": 4,
          "FPT_ITT.3.1": 1,
          "FPT_ITT.3.2": 1,
          "FPT_STM.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "2, or FCS_COP.1 FCS_CKM.4 Yes (FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1) No - FCS_CKM.4 is not": 1,
          "FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1": 1,
          "as key management is out of scope FPT_ITT.1 - - - FPT_ITT.3 FPT_ITT.1 Yes - FAU_GEN.1 FPT_STM.1 No The timestamp is provided by the": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-5": 1,
          "FIPS 197": 2,
          "FIPS PUB 197": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "wlim",
      "/CreationDate": "D:20231228204556+08\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20231228204556+08\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Subject": "SECIRON \u2013 Android Mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 Security Target",
      "/Title": "SECIRON \u2013 Android Mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 Security Target",
      "pdf_file_size_bytes": 641532,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C129-CR-v1a.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SECIRON%20\u2013%20Android%20Mobile%20Application%20Hardening%20Sandbox%20Module%20(AMAHSM)%20version%207.0-Security%20Target-1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f66134024a62dde37b914bdfe124d08a534857f9a615be169013146803d57de7",
      "txt_hash": "825cf90ad78ac9f9a0a07b05f5fb1b27e5f63f5e47b009d661e7517bed2ba115"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9d74a47e731deeb7f628ff3b05ba7c13b0651d75cdbb6d8c6f4490ddd417a82c",
      "txt_hash": "0c219e4dad5e4b30f9c15d3c41b25dbda1e4ebebc5c02f90ff6161e8a98235eb"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ce28a05a1dfdc2b4a321506c801c4c1e3f8a45f18936ba16df2fc75226847604",
      "txt_hash": "6a925df113abee9d61037f49383fafbc9e608d61f86bc8c1500fc94fa1c1f1f5"
    }
  },
  "status": "active"
}