HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
CSV information ?
Status | archived |
---|---|
Valid from | 18.03.2015 |
Valid until | 18.03.2020 |
Scheme | 🇲🇾 MY |
Manufacturer | HP TippingPoint |
Category | Network and Network-Related Devices and Systems |
Security level | ALC_FLR.2, EAL3+ |
Maintenance updates | Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0 (25.04.2016) Certification report Security target |
HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0 (07.04.2015) Certification report Security target | |
Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.8.2 (21.07.2016) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Schemes
MACProtocols
SSH, SSLSecurity level
EAL3, EAL2Security Assurance Requirements (SAR)
ALC_FLR.2Security Functional Requirements (SFR)
FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_SEL.1.1, FMT_SMF.1.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certificates
ISCB-5-RPT-C055-CR-v1Standards
FIPS 140-2, ISO/IEC15408, ISO/IEC 18045File metadata
Title | C055 Certification Report |
---|---|
Subject | HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2 |
Keywords | HP TippingPoint Intrusion Prevention System |
Author | ISCB Department |
Creation date | D:20150318142844+08'00' |
Modification date | D:20150318142844+08'00' |
Pages | 29 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, RC2, RC4, DES, 3DES, BlowfishAsymmetric Algorithms
DSASchemes
MACProtocols
SSH, SSLLibraries
OpenSSLSecurity level
EAL 3, EAL3, EAL 3 augmentedClaims
O.SENSOR, O.ANALYZER, O.RESPONSE, O.REVIEW, O.ADMIN, O.ACCESS, O.AUDIT, O.INTEGRITY, O.STORAGE, O.TRAFFIC, T.COMPROMISE, T.LOSSOF, T.PRIVILEGE, T.CONFIG, T.INFLUX, T.ACCOUNT, T.MISUSE, T.ACCIDENT, T.MALICE, A.ACCESS, A.PROTECT, A.MANAGE, A.NOEVIL, OE.INSTALL, OE.PHYSICAL, OE.PERSONNEL, OE.CONFIDSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_STG.4, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_STG.1, FDP_IFC, FDP_IFF, FDP_IFF.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UAU.1, FIA_UID.1, FMT_MTD.1, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.3, FPT_STM, FPT_STM.1, FPT_STM.1.1, FTP_TRP, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Evaluation facilities
LeidosSide-channel analysis
malfunctionStandards
FIPS 140-2, X.509File metadata
Creation date | D:20150318142909+08'00' |
---|---|
Modification date | D:20150318142917+08'00' |
Pages | 58 |
Producer | Foxit Reader PDF Printer Version 7.0.1.831 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
Name | Certificate ID | |
---|---|---|
HP TippingPoint Intrusion Prevention Systems (S6100N, S5100N, S2500N, S1400N, S660N running TippingPoint OS v3.2.1; S330, S110, S10 running TippingPoint OS v3.1.4) | CCEVS-VR-VID-10345-2011 | Compare |
Scheme data ?
Cert No | 2015-001-C055 | |
---|---|---|
Developer | Trend Micro TippingPoint | |
Level | EAL3+ALC_FLR.2 | |
Product | Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2 | |
Certification Date | 18.03.2015 | |
Expiration Date | 18.03.2020 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120 | |
Enhanced | ||
Cert Id | C055 | |
Product | Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2 | |
Developer | Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL:http://www.trendmicro.com/ | |
Category | Network and Network-Related Devices and Systems | |
Type | Hardware-based intrusion prevention systems | |
Scope | The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI. | |
Assurance Level | EAL3+ALC_FLR.2 | |
Certification Date | 18.03.2015 | |
Expiration Date | 18.03.2020 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf | |
Status | Archive |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_no': '2015-001-C055', 'developer': 'Trend Micro TippingPoint', 'level': 'EAL3+ALC_FLR.2', 'product': 'Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2', 'certification_date': '2015-03-18', 'expiration_date': '2020-03-18', 'recognition': 'CCRA', 'url': 'https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120', 'enhanced': {'cert_id': 'C055', 'product': 'Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2', 'developer': 'Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL:http://www.trendmicro.com/', 'category': 'Network and Network-Related Devices and Systems', 'type': 'Hardware-based intrusion prevention systems', 'scope': 'The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.', 'assurance_level': 'EAL3+ALC_FLR.2', 'certification_date': '2015-03-18', 'expiration_date': '2020-03-18', 'mutual_recognition': 'CCRA', 'target_link': 'https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf', 'report_link': 'https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf', 'status': 'Archive'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c1c43a666a3fc88559e91db9cb80b213e0836113429e361bdc7000dad0854ec', 'txt_hash': '9b9db6bb6759e1a61d0fe2f3841d0bc635a4fd7c09b9a1f95ade2be0ba083979'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cff9a1bcdc3e242cb429e5ba2dc4677e32ff1fb42a98872beae7766c75d39e6f', 'txt_hash': '5a2ae1ecd47b81bf3736e7072cc96dd7cab836c8116cea6aa28f2de9047f44fe'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 733406, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Title': 'C055 Certification Report', '/Author': 'ISCB Department', '/Subject': 'HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2', '/Keywords': 'HP TippingPoint Intrusion Prevention System', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20150318142844+08'00'", '/ModDate': "D:20150318142844+08'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cybersecurity.my/mycc', 'http://www.commoncriteriaportal.org/', 'mailto:[email protected]']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1322388, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 58, '/Producer': 'Foxit Reader PDF Printer Version 7.0.1.831', '/Creator': '', '/CreationDate': "D:20150318142909+08'00'", '/ModDate': "D:20150318142917+08'00'", '/Author': '', '/Keywords': '', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C055-CR-v1': 28}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 8, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 6}}, 'cc_sfr': {'FAU': {'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_SEL.1.1': 1}, 'FMT': {'FMT_SMF.1.1': 1, 'FMT_MTD.1.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1.1': 1}, 'FTP': {'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}, 'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 5, 'EAL3': 1, 'EAL 3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.3': 12, 'ADV_TDS.2': 13}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 18, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_CMC.3': 13, 'ALC_CMS.3': 6, 'ALC_DEL.1': 5, 'ALC_DVS.1': 5, 'ALC_LCD.1': 6}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 5, 'ATE_DPT.1': 5, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}, 'ASE': {'ASE_INT': 1, 'ASE_CCL': 1, 'ASE_SPD': 1, 'ASE_OBJ': 1, 'ASE_ECD': 1, 'ASE_REQ': 1, 'ASE_TSS': 1, 'ASE_INT.1': 12, 'ASE_CCL.1': 14, 'ASE_SPD.1': 7, 'ASE_OBJ.2': 10, 'ASE_ECD.1': 10, 'ASE_REQ.2': 13, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2, 'FAU_SAR': 5, 'FAU_SEL': 2, 'FAU_STG': 2, 'FAU_GEN.1': 13, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1': 12, 'FAU_SAR.2': 6, 'FAU_SEL.1': 6, 'FAU_STG.4': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.2': 9, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG.1': 2}, 'FDP': {'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_IFF.1': 12, 'FDP_IFC.1': 8, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 1}, 'FIA': {'FIA_AFL': 2, 'FIA_ATD': 3, 'FIA_SOS': 2, 'FIA_UAU': 2, 'FIA_UID': 1, 'FIA_AFL.1': 7, 'FIA_SOS.1': 8, 'FIA_UAU.2': 12, 'FIA_UID.2': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MTD.1': 14, 'FMT_MOF': 2, 'FMT_MTD': 1, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_MOF.1': 7, 'FMT_SMF.1': 7, 'FMT_SMR.1': 12, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 6, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3': 2}, 'FPT': {'FPT_STM': 3, 'FPT_STM.1': 9, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_TRP': 2, 'FTP_TRP.1': 7, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.SENSOR': 7, 'O.ANALYZER': 6, 'O.RESPONSE': 7, 'O.REVIEW': 6, 'O.ADMIN': 4, 'O.ACCESS': 4, 'O.AUDIT': 4, 'O.INTEGRITY': 3, 'O.STORAGE': 4, 'O.TRAFFIC': 3}, 'T': {'T.COMPROMISE': 3, 'T.LOSSOF': 2, 'T.PRIVILEGE': 3, 'T.CONFIG': 2, 'T.INFLUX': 3, 'T.ACCOUNT': 2, 'T.MISUSE': 3, 'T.ACCIDENT': 2, 'T.MALICE': 3}, 'A': {'A.ACCESS': 3, 'A.PROTECT': 2, 'A.MANAGE': 3, 'A.NOEVIL': 2}, 'OE': {'OE.INSTALL': 2, 'OE.PHYSICAL': 2, 'OE.PERSONNEL': 2, 'OE.CONFID': 2}}, 'vendor': {}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'RC': {'RC2': 2, 'RC4': 2}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 2}}, 'miscellaneous': {'Blowfish': {'Blowfish': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {'SSH': {'SSH': 9}, 'TLS': {'SSL': {'SSL': 5}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C055-CR-v1.pdf
. - The st_filename property was set to
TippingPointST 1-0.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C055-CR-v1
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "2cfde4db66d5e375",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C055-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.7.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2015-001-C055",
"certification_date": "2015-03-18",
"developer": "Trend Micro TippingPoint",
"enhanced": {
"assurance_level": "EAL3+ALC_FLR.2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C055",
"certification_date": "2015-03-18",
"developer": "Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 \u2013 USA URL:http://www.trendmicro.com/",
"expiration_date": "2020-03-18",
"mutual_recognition": "CCRA",
"product": "Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf",
"scope": "The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.",
"status": "Archive",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf",
"type": "Hardware-based intrusion prevention systems"
},
"expiration_date": "2020-03-18",
"level": "EAL3+ALC_FLR.2",
"product": "Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2015-04-07",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055A-AMR-v1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-0.pdf",
"maintenance_title": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-07-21",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M005-AMR-v1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-2.pdf",
"maintenance_title": "Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.8.2"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-04-25",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M003-AMR-v2.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-1-clean.pdf",
"maintenance_title": "Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0"
}
]
},
"manufacturer": "HP TippingPoint",
"manufacturer_web": "https://www.hp.com/",
"name": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2",
"not_valid_after": "2020-03-18",
"not_valid_before": "2015-03-18",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C055-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C055-CR-v1": 28
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 6
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL3": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_SEL.1.1": 1,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4.1": 1
},
"FMT": {
"FMT_MTD.1.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
},
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1
},
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/CreationDate": "D:20150318142844+08\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "HP TippingPoint Intrusion Prevention System",
"/ModDate": "D:20150318142844+08\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2",
"/Title": "C055 Certification Report",
"pdf_file_size_bytes": 733406,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cybersecurity.my/mycc",
"http://www.commoncriteriaportal.org/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "TippingPointST 1-0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.MANAGE": 3,
"A.NOEVIL": 2,
"A.PROTECT": 2
},
"O": {
"O.ACCESS": 4,
"O.ADMIN": 4,
"O.ANALYZER": 6,
"O.AUDIT": 4,
"O.INTEGRITY": 3,
"O.RESPONSE": 7,
"O.REVIEW": 6,
"O.SENSOR": 7,
"O.STORAGE": 4,
"O.TRAFFIC": 3
},
"OE": {
"OE.CONFID": 2,
"OE.INSTALL": 2,
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2
},
"T": {
"T.ACCIDENT": 2,
"T.ACCOUNT": 2,
"T.COMPROMISE": 3,
"T.CONFIG": 2,
"T.INFLUX": 3,
"T.LOSSOF": 2,
"T.MALICE": 3,
"T.MISUSE": 3,
"T.PRIVILEGE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.3": 12,
"ADV_TDS": 1,
"ADV_TDS.2": 13
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.3": 13,
"ALC_CMS": 1,
"ALC_CMS.3": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_DVS": 1,
"ALC_DVS.1": 5,
"ALC_FLR": 1,
"ALC_FLR.2": 18,
"ALC_LCD": 1,
"ALC_LCD.1": 6
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 14,
"ASE_ECD": 1,
"ASE_ECD.1": 10,
"ASE_INT": 1,
"ASE_INT.1": 12,
"ASE_OBJ": 1,
"ASE_OBJ.2": 10,
"ASE_REQ": 1,
"ASE_REQ.2": 13,
"ASE_SPD": 1,
"ASE_SPD.1": 7,
"ASE_TSS": 1,
"ASE_TSS.1": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 5,
"ATE_DPT": 1,
"ATE_DPT.1": 5,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 5,
"EAL 3 augmented": 4,
"EAL3": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 13,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 5,
"FAU_SAR.1": 12,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 6,
"FAU_SAR.3.1": 1,
"FAU_SEL": 2,
"FAU_SEL.1": 6,
"FAU_SEL.1.1": 1,
"FAU_STG": 2,
"FAU_STG.1": 2,
"FAU_STG.2": 9,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 7,
"FAU_STG.4.1": 1
},
"FDP": {
"FDP_IFC": 2,
"FDP_IFC.1": 8,
"FDP_IFC.1.1": 1,
"FDP_IFF": 2,
"FDP_IFF.1": 12,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS": 2,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 1,
"FIA_UAU.2": 12,
"FIA_UAU.2.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 10,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA.3": 2,
"FMT_MTD": 1,
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 6,
"FMT_SMF": 2,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM": 3,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_TRP": 2,
"FTP_TRP.1": 7,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 9
},
"TLS": {
"SSL": {
"SSL": 5
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
},
"RC": {
"RC2": 2,
"RC4": 2
}
},
"DES": {
"3DES": {
"3DES": 2
},
"DES": {
"DES": 2
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20150318142909+08\u002700\u0027",
"/Creator": "",
"/Keywords": "",
"/ModDate": "D:20150318142917+08\u002700\u0027",
"/Producer": "Foxit Reader PDF Printer Version 7.0.1.831",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 1322388,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 58
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2c1c43a666a3fc88559e91db9cb80b213e0836113429e361bdc7000dad0854ec",
"txt_hash": "9b9db6bb6759e1a61d0fe2f3841d0bc635a4fd7c09b9a1f95ade2be0ba083979"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "cff9a1bcdc3e242cb429e5ba2dc4677e32ff1fb42a98872beae7766c75d39e6f",
"txt_hash": "5a2ae1ecd47b81bf3736e7072cc96dd7cab836c8116cea6aa28f2de9047f44fe"
}
},
"status": "archived"
}