This page was not yet optimized for use on mobile
devices.
XOmail 22.2.0
CSV information
| Status | active |
|---|---|
| Valid from | 20.06.2023 |
| Valid until | 20.06.2028 |
| Scheme | 🇳🇴 NO |
| Manufacturer | Thales Norway AS |
| Category | Other Devices and Systems |
| Security level | ALC_FLR.3, EAL4 |
| Maintenance updates | XOmail 22.3.0 (03.09.2024) Certification report Security target |
Heuristics summary
Certificate ID: SERTIT-125
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Vendor
ThalesSecurity level
EAL4, EAL 2, EAL 4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLRCertificates
SERTIT-125Evaluation facilities
Norconsult ASCertification report
Extracted keywords
Schemes
MACVendor
ThalesSecurity level
EAL 4, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Certificates
SERTIT-125Evaluation facilities
Norconsult ASStandards
ISO/IEC 15408, ISO/IEC 17025, X.509, CCMB-2017-04-004File metadata
| Title | tittel |
|---|---|
| Keywords | ugradert |
| Author | Hole, Øystein |
| Creation date | D:20230630102655+02'00' |
| Modification date | D:20230630102655+02'00' |
| Pages | 21 |
| Creator | Microsoft® Word 2019 |
| Producer | Microsoft® Word 2019 |
Security target
Extracted keywords
Hash functions
SHA-1, SHA-2Schemes
MACTrusted Execution Environments
SEVendor
Thales, MicrosoftSecurity level
EAL4, EAL 4, EAL4 augmented, EAL 4 augmentedClaims
O.ACCESS_HIST, O.AUDIT, O.AUTO_LOGOUT, O.CMD_ACL, O.CMD_LOG, O.DAC, O.FLASH, O.ID_AUTH, O.LABELLING, O.LOCK, O.MANAGE, O.MAC, O.MAC_INTEGRITY, O.MESSAGING, O.MSG_INTEGRITY, O.RECOVER, O.REUSE, O.ROLE_MNG, O.ROLES, O.SCHEDULING, O.SELF_TEST, A.PHYSICAL, A.PHYSICAL_LOC, A.ADM_TRAINING, A.AUDIT_REVIEW, A.CONFIDENCE, A.INVALIDATE, A.NOTIFY, A.USR_TRAINING, A.TIME_SOURCE, A.ARCHIVE_DB, A.NETWORK, A.OS, OE.ACCOUNTABLE, OE.AUDIT, OE.ID_AUTH, OE.NETWORK, OE.PLATFORM, OE.PKI, OE.TRAF_SEPARATION, OE.TIME_SOURCESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_INT, ASE_CCL, ASE_SPD, ASE_ECD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAA.1, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.3, FCO_NRR.1, FCO_NRR.1.1, FCO_NRR.1.2, FCO_NRR.1.3, FCS_NRO.1.2, FCS_COP.1, FCS_COP.1.1, FDP_ACC.2, FDP_ACF.1, FDP_ETC.2, FDP_IFC.2, FDP_IFF.2, FDP_ITC.2, FDP_RIP.2, FDP_UIT.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.2.1, FDP_IFF.2.2, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_IFF.2.7, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.2.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FDP_IFC.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU.5, FIA_UAU.6, FIA_UID.2, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTS, FMT_MTD, FPT_FLS.1, FPT_RCV.1, FPT_RCV.2, FPT_RCV.4, FPT_TDC.1, FPT_TST.1, FPT_FLS.1.1, FPT_RCV.1.1, FPT_RCV.2.1, FPT_RCV.2.2, FPT_RCV.4.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_STM.1, FPT_AMT.1, FRU_FLT.2, FRU_PRS.1, FRU_FLT.2.1, FRU_PRS.1.1, FRU_PRS.1.2, FTA_SSL.3, FTA_TSE.1, FTA_SSL.3.1, FTA_TSE.1.1, FTP_ITC.1, FTP_TRP.1Standards
FIPS PUB 180-4, RFC 6477, RFC 5321, ISO/IEC 15408, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Title | XOmail 22 Security Target |
|---|---|
| Author | Thales Norway AS |
| Creation date | D:20230512171812+02'00' |
| Modification date | D:20230512171812+02'00' |
| Pages | 104 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
SERTIT-125Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Scheme data
| Product | XOmail 22.2.0 | |
|---|---|---|
| Url | https://sertit.no/certified-products/xomail-22-2-0-article3102-1919.html | |
| Category | Messaging system | |
| Developer | Thales Norway AS | |
| Certification Date | 20.06.2023 | |
| Enhanced | ||
| Description | The XOmail Server software (TOE) enforces controlled message and information flow according to military requirements with integrated multi-level security and mandatory access control. The TOE provides priority handling for messaging, ensuring flash message traffic is delivered with minimal delay even with heavy traffic or congestion. The TOE preserves message security through consistent interpretation of security labels across all supported messaging protocols, and supports use of digital signatures to ensure message integrity. The TOE ensures all users are authenticated, and provides user management functions such as automated logout, lockout, and verification. The TOE provides fine grained access control for messaging operations and administrative commands, with complete accountability of all operations. The XOmail Server is themain building block of the XOmail product family. The XOmail Server provides secure message handling, transfer, storage, and administration functionality. The TOE can be deployed in different product configurations. Multiple configurations may be deployed to a single instance of the TOE. | |
| Cert Id | SERTIT-125 | |
| Mutual Recognition | CCRA, SOG-IS | |
| Product | XOmail 22.2.0 | |
| Category | Messaging system | |
| Sponsor | FMA Forsvarsmateriell | |
| Developer | Thales Norway AS | |
| Evaluation Facility | Norconsult AS | |
| Certification Date | 20.06.2023 | |
| Expiration Date | 20.06.2028 | |
| Level | EAL 4, ALC_FLR.3 | |
| Documents | frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/1313152-1691150778/SERTIT/Sertifikater/2023/125/SERTIT-125C_unsign.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/1313155-1691150781/SERTIT/Sertifikater/2023/125/739_20802_aaaa_sc_ed4-public.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/1313296-1692360133/SERTIT/Sertifikater/2023/125/SERTIT-125%20CR%201.1.pdf'})]}) | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificate%20SERTIT-125-C%20XOmail%20(signert).pdf",
"dgst": "1bf08be89810ab71",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "SERTIT-125",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"22.2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Messaging system",
"certification_date": "2023-06-20",
"developer": "Thales Norway AS",
"enhanced": {
"category": "Messaging system",
"cert_id": "SERTIT-125",
"certification_date": "2023-06-20",
"description": "The XOmail Server software (TOE) enforces controlled message and information flow according to military requirements with integrated multi-level security and mandatory access control. The TOE provides priority handling for messaging, ensuring flash message traffic is delivered with minimal delay even with heavy traffic or congestion. The TOE preserves message security through consistent interpretation of security labels across all supported messaging protocols, and supports use of digital signatures to ensure message integrity. The TOE ensures all users are authenticated, and provides user management functions such as automated logout, lockout, and verification. The TOE provides fine grained access control for messaging operations and administrative commands, with complete accountability of all operations. The XOmail Server is themain building block of the XOmail product family. The XOmail Server provides secure message handling, transfer, storage, and administration functionality. The TOE can be deployed in different product configurations. Multiple configurations may be deployed to a single instance of the TOE.",
"developer": "Thales Norway AS",
"documents": {
"cert": [
{
"href": "https://sertit.no/getfile.php/1313152-1691150778/SERTIT/Sertifikater/2023/125/SERTIT-125C_unsign.pdf"
}
],
"report": [
{
"href": "https://sertit.no/getfile.php/1313296-1692360133/SERTIT/Sertifikater/2023/125/SERTIT-125%20CR%201.1.pdf"
}
],
"target": [
{
"href": "https://sertit.no/getfile.php/1313155-1691150781/SERTIT/Sertifikater/2023/125/739_20802_aaaa_sc_ed4-public.pdf"
}
]
},
"evaluation_facility": "Norconsult AS",
"expiration_date": "2028-06-20",
"level": "EAL 4, ALC_FLR.3",
"mutual_recognition": "CCRA, SOG-IS",
"product": "XOmail 22.2.0",
"sponsor": "FMA Forsvarsmateriell"
},
"product": "XOmail 22.2.0",
"url": "https://sertit.no/certified-products/xomail-22-2-0-article3102-1919.html"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2024-09-03",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-125%20MR%20Maintenance%20Report.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/739_20802_aaaa_sc_ed6-public.pdf",
"maintenance_title": "XOmail 22.3.0"
}
]
},
"manufacturer": "Thales Norway AS",
"manufacturer_web": "https://www.thales.no/",
"name": "XOmail 22.2.0",
"not_valid_after": "2028-06-20",
"not_valid_before": "2023-06-20",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "Certificate SERTIT-125-C XOmail (signert).pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NO": {
"SERTIT-125": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL4": 1,
"EAL4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Norconsult": {
"Norconsult AS": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 1
}
},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "SERTIT-125 CR 1.1.docx.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NO": {
"SERTIT-125": 21
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR": 1,
"ALC_FLR.3": 25,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 25,
"EAL 4 augmented": 23
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Norconsult": {
"Norconsult AS": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 15408": 8,
"ISO/IEC 17025": 2
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Hole, \u00d8ystein",
"/CreationDate": "D:20230630102655+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/Keywords": "ugradert",
"/ModDate": "D:20230630102655+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"/Title": "tittel",
"pdf_file_size_bytes": 324404,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "739_20802_aaaa_sc_ed4-public.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADM_TRAINING": 4,
"A.ARCHIVE_DB": 2,
"A.AUDIT_REVIEW": 4,
"A.CONFIDENCE": 2,
"A.INVALIDATE": 4,
"A.NETWORK": 2,
"A.NOTIFY": 4,
"A.OS": 3,
"A.PHYSICAL": 2,
"A.PHYSICAL_LOC": 4,
"A.TIME_SOURCE": 2,
"A.USR_TRAINING": 4
},
"O": {
"O.ACCESS_HIST": 14,
"O.AUDIT": 11,
"O.AUTO_LOGOUT": 11,
"O.CMD_ACL": 5,
"O.CMD_LOG": 16,
"O.DAC": 8,
"O.FLASH": 10,
"O.ID_AUTH": 9,
"O.LABELLING": 11,
"O.LOCK": 6,
"O.MAC": 12,
"O.MAC_INTEGRITY": 8,
"O.MANAGE": 8,
"O.MESSAGING": 6,
"O.MSG_INTEGRITY": 10,
"O.RECOVER": 10,
"O.REUSE": 10,
"O.ROLES": 11,
"O.ROLE_MNG": 6,
"O.SCHEDULING": 8,
"O.SELF_TEST": 7
},
"OE": {
"OE.ACCOUNTABLE": 10,
"OE.AUDIT": 11,
"OE.ID_AUTH": 6,
"OE.NETWORK": 16,
"OE.PKI": 7,
"OE.PLATFORM": 7,
"OE.TIME_SOURCE": 6,
"OE.TRAF_SEPARATION": 9
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 8,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 2,
"ASE_INT.1": 1,
"ASE_OBJ": 2,
"ASE_OBJ.2": 1,
"ASE_REQ": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 8,
"EAL4 augmented": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 8,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAA.1": 7,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 7,
"FAU_STG.3.1": 1,
"FAU_STG.4": 7,
"FAU_STG.4.1": 1
},
"FCO": {
"FCO_NRO.1": 4,
"FCO_NRO.1.1": 1,
"FCO_NRO.1.3": 1,
"FCO_NRR.1": 5,
"FCO_NRR.1.1": 1,
"FCO_NRR.1.2": 1,
"FCO_NRR.1.3": 1
},
"FCS": {
"FCS_COP.1": 5,
"FCS_COP.1.1": 1,
"FCS_NRO.1.2": 1
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_ACC.2": 8,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.2": 9,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 4,
"FDP_IFC.2": 8,
"FDP_IFC.2.1": 1,
"FDP_IFC.2.2": 1,
"FDP_IFF.2": 9,
"FDP_IFF.2.1": 1,
"FDP_IFF.2.2": 2,
"FDP_IFF.2.3": 1,
"FDP_IFF.2.4": 1,
"FDP_IFF.2.5": 1,
"FDP_IFF.2.6": 1,
"FDP_IFF.2.7": 1,
"FDP_ITC.2": 9,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_RIP.2": 8,
"FDP_RIP.2.1": 1,
"FDP_UIT.1": 7,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 10,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 13,
"FIA_UID.2.1": 1,
"FIA_USB.1": 12,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_MTS": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 11,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 2,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_RCV.1": 7,
"FPT_RCV.1.1": 1,
"FPT_RCV.2": 10,
"FPT_RCV.2.1": 1,
"FPT_RCV.2.2": 1,
"FPT_RCV.4": 8,
"FPT_RCV.4.1": 1,
"FPT_STM.1": 2,
"FPT_TDC.1": 13,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT.2": 7,
"FRU_FLT.2.1": 1,
"FRU_PRS.1": 9,
"FRU_PRS.1.1": 1,
"FRU_PRS.1.2": 1
},
"FTA": {
"FTA_SSL.3": 7,
"FTA_SSL.3.1": 1,
"FTA_TSE.1": 11,
"FTA_TSE.1.1": 1
},
"FTP": {
"FTP_ITC.1": 3,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 72
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS PUB 180-4": 2
},
"ISO": {
"ISO/IEC 15408": 6
},
"RFC": {
"RFC 5321": 1,
"RFC 6477": 3
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 4
},
"Thales": {
"Thales": 105
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Thales Norway AS",
"/CreationDate": "D:20230512171812+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20230512171812+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "XOmail 22 Security Target",
"pdf_file_size_bytes": 3445246,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"file://///spiff2/web-root/arbeidspakker/TIL-ARKIV/739_20802_aaaa_sc_ed2-public.docx%23_Toc85024697"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 104
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-125%20CR%201.1.docx.pdf",
"scheme": "NO",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"EAL4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/739_20802_aaaa_sc_ed4-public.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "9dc49989e465fc608402863bc4c600754ccb2a97deb949da858cb1b46a144345",
"txt_hash": "2913c936c90978a4557ef456425c08cfafeec8816fe27c53c13d05195281c716"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "36bf942b76fe3f0e5061478381614009cf0518f524027cdc89dabf33ab22fc83",
"txt_hash": "1e3ba55814ffa2ffc88937c99e920df6941aa1e934a639a489e883bf83b376d9"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "62ffb94f65a15c299f0248328a25662307ae99c2e900cddd8a841907db78f4f2",
"txt_hash": "e7b4cb3d5011075fd0c0022ccae3047f789793eb2b421435c7f3b7567e8e7c61"
}
},
"status": "active"
}