{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146c_pdf.pdf",
"dgst": "2704a53db5b77866",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1146-2022",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.1.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1185-2023"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1185-2023"
]
},
"indirectly_referencing": null
},
"scheme_data": {
"category": "Operating systems",
"cert_id": "BSI-DSZ-CC-1146-2022",
"certification_date": "2022-09-20",
"enhanced": {
"applicant": "SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim",
"assurance_level": "EAL5,AVA_VAN.5,ALC_FLR.3,ALC_DVS.2,ALC_CMC.5,ADV_IMP.2",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146c_pdf.pdf?__blob=publicationFile\u0026v=1",
"certification_date": "2022-09-20",
"description": "The TOE is the PikeOS Separation Kernel version 5.1.3 running on the microprocessor Family (x86 64-bit, ARMv8, or PowerPC) hosting different applications. The TOE is referenced as PikeOS 5.1.3 base product build S6510 for Linux and Windows development host with PikeOS 5.1.3 Certification Kit build S6510.",
"evaluation_facility": "atsec information security GmbH",
"expiration_date": "2027-09-19",
"product": "PikeOS Separation Kernel, Version 5.1.3",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146a_pdf.pdf?__blob=publicationFile\u0026v=1",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1146b_pdf.pdf?__blob=publicationFile\u0026v=3"
},
"product": "PikeOS Separation Kernel, Version 5.1.3",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1146.html",
"vendor": "SYSGO GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SYSGO GmbH",
"manufacturer_web": "https://www.SYSGO.com",
"name": "PikeOS Separation Kernel, Version 5.1.3",
"not_valid_after": "2027-09-19",
"not_valid_before": "2022-09-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1146c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1146-2022": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP.2": 1
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5": 2,
"EAL 5 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20220920112048+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, Certification Report\"",
"/ModDate": "D:20220920135502+02\u002700\u0027",
"/Producer": "LibreOffice 7.2",
"/Subject": "Certification Report, Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 5.1.3",
"/Title": "Certification Report BSI-DSZ-CC-1146-2022",
"pdf_file_size_bytes": 327689,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1146a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5",
"cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1146-2022",
"cert_item": "PikeOS Separation Kernel Version 5.1.3",
"cert_lab": "BSI",
"developer": "SYSGO GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1146-2022": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.5": 1,
"ADV_IMP.2": 5,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"ALC": {
"ALC_CMC.5": 5,
"ALC_CMS.5": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 3,
"ALC_FLR.3": 5,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_DPT.3": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 4,
"EAL 5": 7,
"EAL 5 augmented": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 7, 2022-09-08, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 2022-09-06, 18064-0000-MDL.xlsx (confidential document) [9": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {
"AMD": {
"PSP": 5
}
},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20220920112048+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, Certification Report\"",
"/ModDate": "D:20220920113713+02\u002700\u0027",
"/Producer": "LibreOffice 7.2",
"/Subject": "Certification Report, Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 5.1.3",
"/Title": "Certification Report BSI-DSZ-CC-1146-2022",
"pdf_file_size_bytes": 533185,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"http://www.commoncriteriaportal.org/cc/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1146b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.EXCLUSIVE_RESOURCES": 4,
"A.HARDWARE": 4,
"A.PHYSICAL": 4,
"A.PRIVILEGED_EXECUTABLES": 5,
"A.TRUSTWORTHY_PERSONNEL": 4
},
"OE": {
"OE.EXCLUSIVE_RESOURCES": 3,
"OE.HARDWARE": 2,
"OE.PHYSICAL": 2,
"OE.PRIVILEGED_EXECUTABLES": 3,
"OE.TRUSTWORTHY_PERSONNEL": 3
},
"OT": {
"OT.API_PROTECTION": 4,
"OT.CONFIDENTIALITY": 6,
"OT.INTEGRITY": 4,
"OT.RESOURCE_AVAILABILITY": 6
},
"T": {
"T.DEPLETION": 4,
"T.DISCLOSURE": 4,
"T.EXECUTION": 4,
"T.MODIFICATION": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 4,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.5": 4,
"ALC_DVS.2": 5,
"ALC_FLR.3": 4,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_DPT.1": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 5,
"EAL 5 augmented": 2,
"EAL 5+": 1,
"EAL5": 3
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 32,
"FDP_ACC.2": 12,
"FDP_ACF": 34,
"FDP_ACF.1": 27,
"FDP_IFC.2": 8,
"FDP_IFF.1": 11
},
"FIA": {
"FIA_UID.2": 6
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 2,
"FMT_MTD": 12,
"FMT_MTD.1": 3,
"FMT_SMF.1": 5,
"FMT_SMR.1": 7
},
"FRU": {
"FRU_RSA": 10,
"FRU_RSA.2": 5
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"AMD": {
"PSP": 37
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Guillaume Fumaroli",
"/CreationDate": "D:20220907162051Z",
"/Creator": "disclosed",
"/Keywords": "operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforc\u00e9",
"/ModDate": "D:20220907162051Z",
"/PTEX.Fullbanner": "This is pdfTeX, Version 3.1415926-2.4-1.40.13 (TeX Live 2012/Debian) kpathsea version 6.1.0",
"/Producer": "disclosed",
"/Subject": "",
"/Title": "Security Target PikeOS Separation Kernel v5.1.3",
"/Trapped": "/False",
"pdf_file_size_bytes": 1057120,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sysgo.com",
"mailto:[email protected]",
"mailto:[email protected]",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 63
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"ALC_FLR.3",
"ADV_IMP.2",
"ALC_CMC.5",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "e6fc6f20680d65cc477e2365ac862c490d188561768abc939bf1db758df08c81",
"txt_hash": "51b006b3cd7bce0c1c6f823d721173069355634750b1a812332f9b2c30f6b265"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "0a6e75533d6e700465ddeb6507e333295a8ee46ccfe28d2aacc9b3fc3b5a5ffa",
"txt_hash": "37912c1d29c38a6779ecd0ee629f891ef20ff322b3eabb6477294e33bfe54abd"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "f5febeebd96a6fb4775fdd9cf8445373cde0c9d70a5f19abe113a233a7fa92ae",
"txt_hash": "e4f75aecd1f235d0fd429777170837adef542f868a7f2582919e873112c5e853"
}
},
"status": "active"
}