IDnomic ID CA Version 1.3.7
CSV information ?
Status | active |
---|---|
Valid from | 12.05.2021 |
Valid until | 12.05.2026 |
Scheme | 🇫🇷 FR |
Manufacturer | IDNOMIC |
Category | Key Management Systems |
Security level | EAL4+, ALC_FLR.3 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 4, EAL2, EAL4Security Assurance Requirements (SAR)
ALC_FLR.3Certificates
ANSSI-CC-2021/17Evaluation facilities
OPPIDAFile metadata
Creation date | D:20210519154758+02'00' |
---|---|
Modification date | D:20210519154758+02'00' |
Pages | 2 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL 4, EAL2, EAL4, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSCertificates
ANSSI-CC-2021/17Evaluation facilities
CESTI, OPPIDAStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Creation date | D:20210519154641+02'00' |
---|---|
Modification date | D:20210519154641+02'00' |
Pages | 14 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
Security target ?
Extracted keywords
Asymmetric Algorithms
ECDSAProtocols
SSH, TLS, IPsecSecurity level
EAL4, EAL4 augmentedClaims
T.PRIVILEGED_USER_ERROR, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.TSF_FAILURE, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.UNAUTHENTICATED_TRANSACTIONS, T.WEAK_CRYPTO, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.BACK_UP, A.COMSEC, A.NTP, A.OPERATING_SYSTEM, A.HSM, A.RPM_SIGNATURE, OT.RECOVERY, OT.INTEGRITY_PROTECTION, OT.TOE_ADMINISTRATION, OT.AUDIT_PROTECTION, OT.AUDIT_LOSS_RESPONSE, OT.SYSTEM_MONITORING, OT.VERIFIABLE_UPDATES, OT.RESIDUAL_INFORMATION_CLEARING, OT.KEY_ESCROW, OT.CERTIFICATES, OT.NON_REPUDIATION, OT.CONFIGURATION_MANAGEMENT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.BACKUP, OE.COMSEC, OE.NTP, OE.OPERATING_SYSTEM, OE.HSM, OE.RPM_SIGNATURESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.4, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_DEL.1, ALC_TAT.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.4, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1, ASE_REQ.1, ASE_OBJ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_STG.4, FAU_STG.3, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_GEN, FCO_NRO_EXT, FCO_NRR_EXT, FCO_NRO_EXT.2, FCO_NRR_EXT.2, FCO_NRO_EXT.2.1, FCO_NRO_EXT.2.3, FCO_NRO_EXT.2.4, FCO_NRO_EXT.2.5, FCO_NRR_EXT.2.1, FCO_NRO_EXT.2.2, FCS_CKM.4, FCS_CKM.1, FCS_COP.1, FCS_CKM.5, FCS_CKM_EXT, FCS_STG_EXT, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_STG_EXT.1, FCS_CKM.1.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_STG_EXT.1.1, FCS_CKM.2, FCS_CKM, FDP_CER_EXT, FDP_CSI_EXT, FDP_CRL_EXT, FDP_STG_EXT, FDP_CER_EXT.1, FDP_CER_EXT.2, FDP_CER_EXT.3, FDP_CSI_EXT.1, FDP_CRL_EXT.1, FDP_STG_EXT.1, FDP_RIP.2, FDP_CER_EXT.1.1, FDP_CER_EXT.1.2, FDP_CER_EXT.1.3, FDP_CER_EXT.2.1, FDP_CER_EXT.3.1, FDP_CSI_EXT.1.1, FDP_CSI_EXT.1.2, FDP_CRL_EXT.1.1, FDP_STG_EXT.1.1, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_CMC_EXT.1, FIA_EST_EXT.1, FIA_UID.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_SMF, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_MOF.1.1, FMT_MTD, FMT_MTD.1.1, FMT_SMR.1, FPT_TST.2, FPT_STM.1, FPT_TUD_EXT.1, FPT_FLS.1, FPT_SKP_EXT, FPT_TUD_EXT, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FTA_TAB.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC.1, FTP_TRP.1, FTP_TUD_EXT.1Evaluation facilities
OPPIDAStandards
PKCS#11, RFC 5280, RFC 5652, RFC 6960, X.509File metadata
Title | Common Criteria Security Target |
---|---|
Subject | IDnomic ID CA |
Author | IDnomic |
Creation date | D:20210423093956+02'00' |
Modification date | D:20210423094159+02'00' |
Pages | 58 |
Creator | Acrobat PDFMaker 17 pour Word |
Producer | Adobe PDF Library 17.11.238 |
Heuristics ?
Extracted SARs
ADV_FSP.4, ADV_IMP.1, ATE_FUN.1, AGD_OPE.1, ASE_SPD.1, AGD_PRE.1, ATE_IND.2, ALC_DVS.1, ASE_CCL.1, ATE_COV.2, ADV_ARC.1, ATE_DPT.1, ADV_TDS.3, ASE_ECD.1, ALC_LCD.1, ALC_DEL.1, ASE_OBJ.2, AVA_VAN.4, ALC_FLR.3, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ASE_TSS.1Scheme data ?
Product | IDnomic ID CA Version 1.3.7 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137 | |
Description | Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA. Ce produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cr | |
Sponsor | IDNOMIC | |
Developer | IDNOMIC | |
Cert Id | 2021/17 | |
Level | EAL4+ | |
Expiration Date | 12 Mai 2026 | |
Enhanced | ||
Cert Id | 2021/17 | |
Certification Date | 12/05/2021 | |
Expiration Date | 12/05/2026 | |
Category | Produits pour ordinateur personnel et serveur | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | IDNOMIC | |
Sponsor | IDNOMIC | |
Evaluation Facility | OPPIDA | |
Level | EAL4+ | |
Protection Profile | ||
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_FLR.3 | |
Cert Link | https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf |
References ?
No references are available for this certificate.
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'IDnomic ID CA Version 1.3.7', 'url': 'https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137', 'description': 'Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cr', 'sponsor': 'IDNOMIC', 'developer': 'IDNOMIC', 'cert_id': '2021/17', 'level': 'EAL4+', 'expiration_date': '12 Mai 2026', 'enhanced': {'cert_id': '2021/17', 'certification_date': '12/05/2021', 'expiration_date': '12/05/2026', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDNOMIC', 'sponsor': 'IDNOMIC', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731', 'txt_hash': '1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7cecd3c179e0da323c7ee414394afd9b9dc77305aa752523a10346c42d1d8d13', 'txt_hash': '0d62468afedc2a985a83d3a66a345bf2cb5601a215db1c7fc8dcdaf048545d5c'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1023987, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 58, '/Author': 'IDnomic', '/Category': '[Mettre à jour la propriété "Catégorie" du document pour insérer ici le numéro de chrono/ref du document]', '/Company': 'Microsoft', '/CreationDate': "D:20210423093956+02'00'", '/Creator': 'Acrobat PDFMaker 17 pour Word', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId': '09aba970-b117-4f0a-bebd-4540198027e9', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits': '0', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled': 'true', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method': 'Standard', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name': 'All Employees_2', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate': '2021-01-08T16:57:10Z', '/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId': '33440fc6-b7c7-412c-bb73-0e70b0198d5a', '/ModDate': "D:20210423094159+02'00'", '/Producer': 'Adobe PDF Library 17.11.238', '/SourceModified': '', '/Subject': 'IDnomic ID CA', '/Title': 'Common Criteria Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 279186, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20210519154758+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210519154758+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_IMP.1': 5, 'ADV_TDS.1': 2, 'ADV_TDS.3': 6, 'ADV_FSP.4': 6, 'ADV_FSP.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 6, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.3': 4, 'ALC_CMC.4': 2, 'ALC_DEL.1': 2, 'ALC_TAT.1': 4, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_IND.2': 2, 'ATE_FUN.1': 6, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.4': 2, 'AVA_VAN.3': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_INT.1': 3, 'ASE_REQ.2': 3, 'ASE_TSS.1': 2, 'ASE_ECD.1': 4, 'ASE_REQ.1': 2, 'ASE_OBJ.2': 2, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 1, 'FAU_STG.4': 1, 'FAU_STG.3': 6, 'FAU_GEN.1': 12, 'FAU_GEN.2': 6, 'FAU_SAR.1': 7, 'FAU_SAR.3': 5, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_GEN': 6}, 'FCO': {'FCO_NRO_EXT': 3, 'FCO_NRR_EXT': 3, 'FCO_NRO_EXT.2': 13, 'FCO_NRR_EXT.2': 12, 'FCO_NRO_EXT.2.1': 2, 'FCO_NRO_EXT.2.3': 2, 'FCO_NRO_EXT.2.4': 2, 'FCO_NRO_EXT.2.5': 2, 'FCO_NRR_EXT.2.1': 2, 'FCO_NRO_EXT.2.2': 1}, 'FCS': {'FCS_CKM.4': 16, 'FCS_CKM.1': 15, 'FCS_COP.1': 44, 'FCS_CKM.5': 1, 'FCS_CKM_EXT': 4, 'FCS_STG_EXT': 3, 'FCS_CKM_EXT.1': 12, 'FCS_CKM_EXT.2': 12, 'FCS_STG_EXT.1': 13, 'FCS_CKM.1.1': 1, 'FCS_CKM_EXT.1.1': 2, 'FCS_CKM_EXT.2.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 4, 'FCS_STG_EXT.1.1': 2, 'FCS_CKM.2': 1, 'FCS_CKM': 1}, 'FDP': {'FDP_CER_EXT': 5, 'FDP_CSI_EXT': 3, 'FDP_CRL_EXT': 3, 'FDP_STG_EXT': 3, 'FDP_CER_EXT.1': 14, 'FDP_CER_EXT.2': 12, 'FDP_CER_EXT.3': 12, 'FDP_CSI_EXT.1': 16, 'FDP_CRL_EXT.1': 12, 'FDP_STG_EXT.1': 12, 'FDP_RIP.2': 14, 'FDP_CER_EXT.1.1': 2, 'FDP_CER_EXT.1.2': 2, 'FDP_CER_EXT.1.3': 2, 'FDP_CER_EXT.2.1': 2, 'FDP_CER_EXT.3.1': 1, 'FDP_CSI_EXT.1.1': 2, 'FDP_CSI_EXT.1.2': 2, 'FDP_CRL_EXT.1.1': 2, 'FDP_STG_EXT.1.1': 2, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_UAU.2': 5, 'FIA_UID.2': 6, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_CMC_EXT.1': 3, 'FIA_EST_EXT.1': 3, 'FIA_UID.1': 2}, 'FMT': {'FMT_MOF.1': 24, 'FMT_MTD.1': 7, 'FMT_SMF.1': 15, 'FMT_SMR.2': 5, 'FMT_SMF': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.2.1': 3, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_MOF.1.1': 4, 'FMT_MTD': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR.1': 5}, 'FPT': {'FPT_TST.2': 1, 'FPT_STM.1': 2, 'FPT_TUD_EXT.1': 12, 'FPT_FLS.1': 1, 'FPT_SKP_EXT': 3, 'FPT_TUD_EXT': 3, 'FPT_SKP_EXT.1': 12, 'FPT_SKP_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2}, 'FTA': {'FTA_TAB.1': 1, 'FTA_SSL.3': 1, 'FTA_SSL.4': 7, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1, 'FTP_TUD_EXT.1': 1}}, 'cc_claims': {'T': {'T.PRIVILEGED_USER_ERROR': 2, 'T.UNDETECTED_ACTIONS': 1, 'T.UNAUTHORIZED_ACCESS': 2, 'T.TSF_FAILURE': 1, 'T.UNAUTHORIZED_UPDATE': 2, 'T.USER_DATA_REUSE': 1, 'T.UNAUTHENTICATED_TRANSACTIONS': 2, 'T.WEAK_CRYPTO': 1}, 'A': {'A.NO_GENERAL_PURPOSE': 2, 'A.PHYSICAL': 1, 'A.TRUSTED_ADMIN': 2, 'A.BACK_UP': 1, 'A.COMSEC': 1, 'A.NTP': 3, 'A.OPERATING_SYSTEM': 2, 'A.HSM': 1, 'A.RPM_SIGNATURE': 2}, 'OT': {'OT.RECOVERY': 1, 'OT.INTEGRITY_PROTECTION': 1, 'OT.TOE_ADMINISTRATION': 6, 'OT.AUDIT_PROTECTION': 6, 'OT.AUDIT_LOSS_RESPONSE': 5, 'OT.SYSTEM_MONITORING': 3, 'OT.VERIFIABLE_UPDATES': 6, 'OT.RESIDUAL_INFORMATION_CLEARING': 3, 'OT.KEY_ESCROW': 3, 'OT.CERTIFICATES': 5, 'OT.NON_REPUDIATION': 3, 'OT.CONFIGURATION_MANAGEMENT': 5}, 'OE': {'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 3, 'OE.TRUSTED_ADMIN': 3, 'OE.BACKUP': 3, 'OE.COMSEC': 5, 'OE.NTP': 3, 'OE.OPERATING_SYSTEM': 3, 'OE.HSM': 3, 'OE.RPM_SIGNATURE': 3}}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 5}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 9}}, 'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#11': 1}, 'RFC': {'RFC 5280': 11, 'RFC 5652': 1, 'RFC 6960': 2}, 'X509': {'X.509': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 1, 'EAL4': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-2021-17en.pdf
. - The cert_filename property was set to
certificat_2021_17fr.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b', 'txt_hash': '83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 223359, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Author': '', '/CreationDate': "D:20210519154641+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210519154641+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2021/17': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL2': 2, 'EAL4': 2, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'OPPIDA': {'OPPIDA': 3}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2021_17fr.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2021/17
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_17fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021-17en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'IDnomic ID CA Version 1.3.7', 'url': 'https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137', 'description': 'Le produit évalué est « IDnomic ID CA, Version 1.3.7 » développé par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorité de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de clés (IGC). La TOE consiste en des programmes, formats de données, procédures, protocoles de communications, politiques de sécurité et mécanismes de cr', 'sponsor': 'IDNOMIC', 'developer': 'IDNOMIC', 'cert_id': '2021/17', 'level': 'EAL4+', 'expiration_date': '12 Mai 2026', 'enhanced': {'cert_id': '2021/17', 'certification_date': '12/05/2021', 'expiration_date': '12/05/2026', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDNOMIC', 'sponsor': 'IDNOMIC', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf'}}
.
- The cert property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IDnomic ID CA Version 1.3.7 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Key Management Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2021_17fr.pdf",
"dgst": "34c4331a0995e7f6",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2021/17",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.3.7"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "2021/17",
"description": "Le produit \u00e9valu\u00e9 est \u00ab IDnomic ID CA, Version 1.3.7 \u00bb d\u00e9velopp\u00e9 par IDNOMIC, marque commerciale de KEYNECTIS SA.\nCe produit est une autorit\u00e9 de certification (AC) et intervient en tant que composant principal dans une infrastructure de gestion de cl\u00e9s (IGC). La TOE consiste en des programmes, formats de donn\u00e9es, proc\u00e9dures, protocoles de communications, politiques de s\u00e9curit\u00e9 et m\u00e9canismes de cr",
"developer": "IDNOMIC",
"enhanced": {
"augmented": "ALC_FLR.3",
"category": "Produits pour ordinateur personnel et serveur",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "2021/17",
"cert_link": "https://cyber.gouv.fr/sites/default/files/2021/05/certificat_2021_17fr.pdf",
"certification_date": "12/05/2021",
"developer": "IDNOMIC",
"evaluation_facility": "OPPIDA",
"expiration_date": "12/05/2026",
"level": "EAL4+",
"mutual_recognition": "SOG-IS\n CCRA",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cc-2021_17fr.pdf",
"sponsor": "IDNOMIC",
"target_link": "https://cyber.gouv.fr/sites/default/files/2021/05/anssi-cible-2021-17en.pdf"
},
"expiration_date": "12 Mai 2026",
"level": "EAL4+",
"product": "IDnomic ID CA Version 1.3.7",
"sponsor": "IDNOMIC",
"url": "https://cyber.gouv.fr/produits-certifies/idnomic-id-ca-version-137"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "IDNOMIC",
"manufacturer_web": "https://atos.net/en/solutions/cyber-security-products/idnomic-pki-solutions-for-digital-identities-security",
"name": "IDnomic ID CA Version 1.3.7",
"not_valid_after": "2026-05-12",
"not_valid_before": "2021-05-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat_2021_17fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2021/17": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "",
"/CreationDate": "D:20210519154758+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20210519154758+02\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 279186,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "anssi-cc-2021_17fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2021/17": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_FLR": 2,
"ALC_FLR.3": 2,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL2": 2,
"EAL4": 2
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"OPPIDA": {
"OPPIDA": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20210519154641+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20210519154641+02\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 223359,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "anssi-cible-2021-17en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 5
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.BACK_UP": 1,
"A.COMSEC": 1,
"A.HSM": 1,
"A.NO_GENERAL_PURPOSE": 2,
"A.NTP": 3,
"A.OPERATING_SYSTEM": 2,
"A.PHYSICAL": 1,
"A.RPM_SIGNATURE": 2,
"A.TRUSTED_ADMIN": 2
},
"OE": {
"OE.BACKUP": 3,
"OE.COMSEC": 5,
"OE.HSM": 3,
"OE.NO_GENERAL_PURPOSE": 3,
"OE.NTP": 3,
"OE.OPERATING_SYSTEM": 3,
"OE.PHYSICAL": 3,
"OE.RPM_SIGNATURE": 3,
"OE.TRUSTED_ADMIN": 3
},
"OT": {
"OT.AUDIT_LOSS_RESPONSE": 5,
"OT.AUDIT_PROTECTION": 6,
"OT.CERTIFICATES": 5,
"OT.CONFIGURATION_MANAGEMENT": 5,
"OT.INTEGRITY_PROTECTION": 1,
"OT.KEY_ESCROW": 3,
"OT.NON_REPUDIATION": 3,
"OT.RECOVERY": 1,
"OT.RESIDUAL_INFORMATION_CLEARING": 3,
"OT.SYSTEM_MONITORING": 3,
"OT.TOE_ADMINISTRATION": 6,
"OT.VERIFIABLE_UPDATES": 6
},
"T": {
"T.PRIVILEGED_USER_ERROR": 2,
"T.TSF_FAILURE": 1,
"T.UNAUTHENTICATED_TRANSACTIONS": 2,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_UPDATE": 2,
"T.UNDETECTED_ACTIONS": 1,
"T.USER_DATA_REUSE": 1,
"T.WEAK_CRYPTO": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 2,
"ADV_FSP.2": 2,
"ADV_FSP.4": 6,
"ADV_IMP.1": 5,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 6
},
"AGD": {
"AGD_OPE.1": 6,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 3,
"ALC_FLR.3": 4,
"ALC_LCD.1": 3,
"ALC_TAT.1": 4
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 4,
"ASE_INT.1": 3,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 3,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 3,
"ATE_FUN.1": 6,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.3": 2,
"AVA_VAN.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 6,
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 6,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 6,
"FAU_STG.3.1": 1,
"FAU_STG.4": 1,
"FAU_STG_EXT": 1
},
"FCO": {
"FCO_NRO_EXT": 3,
"FCO_NRO_EXT.2": 13,
"FCO_NRO_EXT.2.1": 2,
"FCO_NRO_EXT.2.2": 1,
"FCO_NRO_EXT.2.3": 2,
"FCO_NRO_EXT.2.4": 2,
"FCO_NRO_EXT.2.5": 2,
"FCO_NRR_EXT": 3,
"FCO_NRR_EXT.2": 12,
"FCO_NRR_EXT.2.1": 2
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 15,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 1,
"FCS_CKM.5": 1,
"FCS_CKM_EXT": 4,
"FCS_CKM_EXT.1": 12,
"FCS_CKM_EXT.1.1": 2,
"FCS_CKM_EXT.2": 12,
"FCS_CKM_EXT.2.1": 2,
"FCS_COP.1": 44,
"FCS_COP.1.1": 4,
"FCS_STG_EXT": 3,
"FCS_STG_EXT.1": 13,
"FCS_STG_EXT.1.1": 2
},
"FDP": {
"FDP_CER_EXT": 5,
"FDP_CER_EXT.1": 14,
"FDP_CER_EXT.1.1": 2,
"FDP_CER_EXT.1.2": 2,
"FDP_CER_EXT.1.3": 2,
"FDP_CER_EXT.2": 12,
"FDP_CER_EXT.2.1": 2,
"FDP_CER_EXT.3": 12,
"FDP_CER_EXT.3.1": 1,
"FDP_CRL_EXT": 3,
"FDP_CRL_EXT.1": 12,
"FDP_CRL_EXT.1.1": 2,
"FDP_CSI_EXT": 3,
"FDP_CSI_EXT.1": 16,
"FDP_CSI_EXT.1.1": 2,
"FDP_CSI_EXT.1.2": 2,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5,
"FDP_RIP.2": 14,
"FDP_RIP.2.1": 1,
"FDP_STG_EXT": 3,
"FDP_STG_EXT.1": 12,
"FDP_STG_EXT.1.1": 2
},
"FIA": {
"FIA_CMC_EXT.1": 3,
"FIA_EST_EXT.1": 3,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 24,
"FMT_MOF.1.1": 4,
"FMT_MTD": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 15,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 5,
"FMT_SMR.2": 5,
"FMT_SMR.2.1": 3,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_SKP_EXT": 3,
"FPT_SKP_EXT.1": 12,
"FPT_SKP_EXT.1.1": 2,
"FPT_STM.1": 2,
"FPT_TST.2": 1,
"FPT_TUD_EXT": 3,
"FPT_TUD_EXT.1": 12,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2
},
"FTA": {
"FTA_SSL.3": 1,
"FTA_SSL.4": 7,
"FTA_SSL.4.1": 1,
"FTA_TAB.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1,
"FTP_TUD_EXT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS": 9
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"PKCS": {
"PKCS#11": 1
},
"RFC": {
"RFC 5280": 11,
"RFC 5652": 1,
"RFC 6960": 2
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "IDnomic",
"/Category": "[Mettre \u00e0 jour la propri\u00e9t\u00e9 \"Cat\u00e9gorie\" du document pour ins\u00e9rer ici le num\u00e9ro de chrono/ref du document]",
"/Company": "Microsoft",
"/CreationDate": "D:20210423093956+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 17 pour Word",
"/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ActionId": "09aba970-b117-4f0a-bebd-4540198027e9",
"/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_ContentBits": "0",
"/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Enabled": "true",
"/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Method": "Standard",
"/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_Name": "All Employees_2",
"/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SetDate": "2021-01-08T16:57:10Z",
"/MSIP_Label_e463cba9-5f6c-478d-9329-7b2295e4e8ed_SiteId": "33440fc6-b7c7-412c-bb73-0e70b0198d5a",
"/ModDate": "D:20210423094159+02\u002700\u0027",
"/Producer": "Adobe PDF Library 17.11.238",
"/SourceModified": "",
"/Subject": "IDnomic ID CA",
"/Title": "Common Criteria Security Target",
"pdf_file_size_bytes": 1023987,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 58
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_17fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021-17en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7cecd3c179e0da323c7ee414394afd9b9dc77305aa752523a10346c42d1d8d13",
"txt_hash": "0d62468afedc2a985a83d3a66a345bf2cb5601a215db1c7fc8dcdaf048545d5c"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "080e2277524778c58ebdeeffbf38b7f8082866b4924e6d0a3867d2a33a0e3d3b",
"txt_hash": "83004789d08d8073012f835ba105e965483b6f9326bf4aa3b96789367040acd7"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c0bf5b4f90559db4c7e2814af6a7605c75c960374a482392d4f869c8e6037731",
"txt_hash": "1d3ffe8d0a26c11cb213f8c2fa3b3076473ea3399d6b2269f8ff527fa90b852d"
}
},
"status": "active"
}