PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0

CSV information ?

Status active
Valid from 18.09.2023
Valid until 17.09.2028
Scheme 🇩🇪 DE
Manufacturer SYSGO GmbH
Category Operating Systems
Security level ALC_DVS.2, ALC_CMC.5, EAL5, ALC_FLR.3, AVA_VAN.5, ADV_IMP.2

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1185-2023

Certificate ?

Extracted keywords

Vendor
NXP

Security level
EAL 5, EAL 4, EAL 2, EAL 5 augmented
Security Assurance Requirements (SAR)
ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5
Certificates
BSI-DSZ-CC-1185-2023

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1185-2023
Subject Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel
Keywords "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel"
Author Bundesamt für Sicherheit in der Informationstechnik
Pages 1

Certification report ?

Extracted keywords

Hash functions
SHA-256

Trusted Execution Environments
PSP
Vendor
NXP

Security level
EAL 5, EAL 4, EAL 2, EAL 1, EAL 5+, EAL 6, EAL 5 augmented
Claims
OE.PRIVILEGED_EXECUTABLES, OE.HARDWARE, OE.EXCLUSIVE_RESOURCES, OE.PHYSICAL, OE.TRUSTWORTHY_PERSONNEL
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3, ATE_COV, ATE_DPT, ATE_IND, AVA_VAN.5
Certificates
BSI-DSZ-CC-1185-2023, BSI-DSZ-CC-1146-2022, CC-1146-2022
Evaluation facilities
atsec

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 4, 2023-08-30, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE (Master Document List), 2023-07-27, 20069-0000- MDL.xlsx, Sysgo, confidential document) [9] Guidance documentation for the TOE, see table 2 in chapter 2 7 specifically • AIS 32, Version

Standards
AIS 34, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1185-2023
Subject Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel
Keywords "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel"
Author Bundesamt für Sicherheit in der Informationstechnik
Pages 29

Frontpage

Certificate ID BSI-DSZ-CC-1185-2023
Certified item PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0
Certification lab BSI
Developer SYSGO GmbH

References

Outgoing

Security target ?

Extracted keywords

Trusted Execution Environments
PSP
Vendor
NXP

Security level
EAL 5, EAL 5+, EAL5, EAL 5 augmented
Claims
T.DISCLOSURE, T.MODIFICATION, T.DEPLETION, T.EXECUTION, A.PRIVILEGED_EXECUTABLES, A.HARDWARE, A.EXCLUSIVE_RESOURCES, A.PHYSICAL, A.TRUSTWORTHY_PERSONNEL, OT.CONFIDENTIALITY, OT.INTEGRITY, OT.RESOURCE_AVAILABILITY, OT.API_PROTECTION, OE.PRIVILEGED_EXECUTABLES, OE.HARDWARE, OE.EXCLUSIVE_RESOURCES, OE.PHYSICAL, OE.TRUSTWORTHY_PERSONNEL
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_DVS.2, ALC_CMC.5, ALC_TAT.1, ALC_LCD.1, ATE_DPT.1, AVA_VAN.5
Security Functional Requirements (SFR)
FDP_ACF, FDP_ACF.1, FDP_ACC, FDP_ACC.2, FDP_IFC.2, FDP_IFF.1, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FRU_RSA, FRU_RSA.2

File metadata

Title Security Target for the PikeOS Separation Kernel v5.1.3 for the NXP LS1023A/LS1043A Processor
Keywords operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforcé
Author Guillaume Fumaroli
Pages 59

Heuristics ?

Certificate ID: BSI-DSZ-CC-1185-2023

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_INT.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ATE_DPT.1, AVA_VAN.5

Scheme data ?

Cert Id BSI-DSZ-CC-1185-2023
Product PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0
Vendor SYSGO GmbH
Certification Date 18.09.2023
Category Operating systems
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1185.html
Enhanced
Product PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0
Applicant SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim
Evaluation Facility atsec information security GmbH
Assurance Level EAL5,AVA_VAN.5,ALC_FLR.3,ALC_DVS.2,ALC_CMC.5,ADV_IMP.2
Certification Date 18.09.2023
Expiration Date 17.09.2028
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1185a_pdf.pdf?__blob=publicationFile&v=1
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1185b_pdf.pdf?__blob=publicationFile&v=1
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1185c_pdf.pdf?__blob=publicationFile&v=2
Description The TOE is the PikeOS Separation Kernel v5.1.3 for the NXP LS1023A/LS1043A Processor. It consists of the PikeOS Kernel and System Software instantiated with an ARMv8 ASP and extended with BSP components for the NXP LS1023A/LS1043A Processor hardware platform (featuring an ARM Cortex-A53 core processor with 4 cores for LS1043A, 2 cores for LS1023A): PSP, HWVIRT Hypervisor driver (as kernel device driver), CLKMGR driver (as kernel device driver) and e1000 driver (as external file provider in a normal partition).

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2023-09-18', 'enhanced': {'__update__': {'applicant': 'SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim', 'certification_date': '2023-09-18', 'expiration_date': '2028-09-17'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4b7787f075925db72862923c8d8add72cc8c696c73f20d2d9c087de348ebe7e1', 'txt_hash': 'ac2d6cda8dae87853844014abc3bcbfab66e26a2603d78e2d1c4554d22a2764d'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c136d2dc8ae3acc46dd11150fa4649b76b74e4c731a4c6ca28f805a701c02b1', 'txt_hash': '8626ebe4ca8d75a85e90669032fa46c0894e9dbe4bd3024ec5399b935e342da4'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7aab71a9965001df03e6ab353c77774979c260b215c388e90c45b93bc2d6bb53', 'txt_hash': '0e8963f498187d19017613c9ee5b64a9f948498c8a647b70bd15d8c9ff0a9f19'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 509913, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel"', '/Subject': 'Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel', '/Title': 'Certification Report BSI-DSZ-CC-1185-2023', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 897440, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 59, '/Author': 'Guillaume Fumaroli', '/Keywords': 'operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforcé', '/Subject': '', '/Title': 'Security Target for the PikeOS Separation Kernel v5.1.3 for the NXP LS1023A/LS1043A Processor', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sysgo.com', 'mailto:[email protected]', 'mailto:[email protected]', 'mailto:[email protected]']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 337655, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel"', '/Subject': 'Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel', '/Title': 'Certificate BSI-DSZ-CC-1185-2023', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1185-2023', 'cert_item': 'PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0', 'developer': 'SYSGO GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 conformant', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 5 augmented by ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5 valid until: 17 September 2028'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1185-2023': 15, 'BSI-DSZ-CC-1146-2022': 2}, 'NL': {'CC-1146-2022': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 5': 7, 'EAL 4': 4, 'EAL 2': 3, 'EAL 1': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 5, 'ADV_FSP.5': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1}, 'ALC': {'ALC_CMC.5': 5, 'ALC_DVS.2': 5, 'ALC_FLR.3': 5, 'ALC_FLR': 3, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_DPT.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.PRIVILEGED_EXECUTABLES': 1, 'OE.HARDWARE': 1, 'OE.EXCLUSIVE_RESOURCES': 1, 'OE.PHYSICAL': 1, 'OE.TRUSTWORTHY_PERSONNEL': 1}}, 'vendor': {'NXP': {'NXP': 11}}, 'eval_facility': {'atsec': {'atsec': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'AMD': {'PSP': 8}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report, Version 4, 2023-08-30, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE (Master Document List), 2023-07-27, 20069-0000- MDL.xlsx, Sysgo': 1, 'confidential document) [9] Guidance documentation for the TOE, see table 2 in chapter 2 7 specifically • AIS 32, Version': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 5': 5, 'EAL 5+': 1, 'EAL5': 3, 'EAL 5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 4, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 4, 'ALC_DVS.2': 5, 'ALC_CMC.5': 4, 'ALC_TAT.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {'FDP': {'FDP_ACF': 34, 'FDP_ACF.1': 27, 'FDP_ACC': 32, 'FDP_ACC.2': 12, 'FDP_IFC.2': 8, 'FDP_IFF.1': 11}, 'FIA': {'FIA_UID.2': 6}, 'FMT': {'FMT_MSA.1': 6, 'FMT_MSA.3': 7, 'FMT_MSA.3.1': 2, 'FMT_MTD': 12, 'FMT_MTD.1': 3, 'FMT_SMF.1': 5, 'FMT_SMR.1': 7}, 'FRU': {'FRU_RSA': 10, 'FRU_RSA.2': 5}}, 'cc_claims': {'T': {'T.DISCLOSURE': 4, 'T.MODIFICATION': 4, 'T.DEPLETION': 4, 'T.EXECUTION': 4}, 'A': {'A.PRIVILEGED_EXECUTABLES': 5, 'A.HARDWARE': 4, 'A.EXCLUSIVE_RESOURCES': 4, 'A.PHYSICAL': 4, 'A.TRUSTWORTHY_PERSONNEL': 4}, 'OT': {'OT.CONFIDENTIALITY': 6, 'OT.INTEGRITY': 4, 'OT.RESOURCE_AVAILABILITY': 6, 'OT.API_PROTECTION': 4}, 'OE': {'OE.PRIVILEGED_EXECUTABLES': 3, 'OE.HARDWARE': 2, 'OE.EXCLUSIVE_RESOURCES': 3, 'OE.PHYSICAL': 2, 'OE.TRUSTWORTHY_PERSONNEL': 3}}, 'vendor': {'NXP': {'NXP': 71}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'AMD': {'PSP': 27}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1185-2023': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL 4': 1, 'EAL 2': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 1}, 'ALC': {'ALC_CMC.5': 1, 'ALC_DVS.2': 1, 'ALC_FLR.3': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1185a_pdf.pdf.
    • The st_filename property was set to 1185b_pdf.pdf.
    • The cert_filename property was set to 1185c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1185-2023.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1146-2022']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1146-2022']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}]} values added.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185c_pdf.pdf",
  "dgst": "34fd0553bb4a99ab",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1185-2023",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1.3",
        "3.1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1146-2022"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1146-2022"
        ]
      }
    },
    "scheme_data": {
      "category": "Operating systems",
      "cert_id": "BSI-DSZ-CC-1185-2023",
      "certification_date": "2023-09-18",
      "enhanced": {
        "applicant": "SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim",
        "assurance_level": "EAL5,AVA_VAN.5,ALC_FLR.3,ALC_DVS.2,ALC_CMC.5,ADV_IMP.2",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1185c_pdf.pdf?__blob=publicationFile\u0026v=2",
        "certification_date": "2023-09-18",
        "description": "The TOE is the PikeOS Separation Kernel v5.1.3 for the NXP LS1023A/LS1043A Processor. It consists of the PikeOS Kernel and System Software instantiated with an ARMv8 ASP and extended with BSP components for the NXP LS1023A/LS1043A Processor hardware platform (featuring an ARM Cortex-A53 core processor with 4 cores for LS1043A, 2 cores for LS1023A): PSP, HWVIRT Hypervisor driver (as kernel device driver), CLKMGR driver (as kernel device driver) and e1000 driver (as external file provider in a normal partition).",
        "evaluation_facility": "atsec information security GmbH",
        "expiration_date": "2028-09-17",
        "product": "PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1185a_pdf.pdf?__blob=publicationFile\u0026v=1",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1185b_pdf.pdf?__blob=publicationFile\u0026v=1"
      },
      "product": "PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1185.html",
      "vendor": "SYSGO GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "SYSGO GmbH",
  "manufacturer_web": "https://www.SYSGO.com",
  "name": "PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0",
  "not_valid_after": "2028-09-17",
  "not_valid_before": "2023-09-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1185c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1185-2023": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_IMP.2": 1
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 5": 2,
          "EAL 5 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel",
      "/Title": "Certificate BSI-DSZ-CC-1185-2023",
      "pdf_file_size_bytes": 337655,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1185a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5 valid until: 17 September 2028",
        "cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
        "cert_id": "BSI-DSZ-CC-1185-2023",
        "cert_item": "PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0",
        "cert_lab": "BSI",
        "developer": "SYSGO GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1146-2022": 2,
          "BSI-DSZ-CC-1185-2023": 15
        },
        "NL": {
          "CC-1146-2022": 1
        }
      },
      "cc_claims": {
        "OE": {
          "OE.EXCLUSIVE_RESOURCES": 1,
          "OE.HARDWARE": 1,
          "OE.PHYSICAL": 1,
          "OE.PRIVILEGED_EXECUTABLES": 1,
          "OE.TRUSTWORTHY_PERSONNEL": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.5": 1,
          "ADV_IMP.2": 5,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "ALC": {
          "ALC_CMC.5": 5,
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 3,
          "ALC_FLR.3": 5,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_DPT.3": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 4,
          "EAL 5": 7,
          "EAL 5 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report, Version 4, 2023-08-30, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE (Master Document List), 2023-07-27, 20069-0000- MDL.xlsx, Sysgo": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "confidential document) [9] Guidance documentation for the TOE, see table 2 in chapter 2 7 specifically \u2022 AIS 32, Version": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 38": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 8
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 11
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel",
      "/Title": "Certification Report BSI-DSZ-CC-1185-2023",
      "pdf_file_size_bytes": 509913,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1185b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.EXCLUSIVE_RESOURCES": 4,
          "A.HARDWARE": 4,
          "A.PHYSICAL": 4,
          "A.PRIVILEGED_EXECUTABLES": 5,
          "A.TRUSTWORTHY_PERSONNEL": 4
        },
        "OE": {
          "OE.EXCLUSIVE_RESOURCES": 3,
          "OE.HARDWARE": 2,
          "OE.PHYSICAL": 2,
          "OE.PRIVILEGED_EXECUTABLES": 3,
          "OE.TRUSTWORTHY_PERSONNEL": 3
        },
        "OT": {
          "OT.API_PROTECTION": 4,
          "OT.CONFIDENTIALITY": 6,
          "OT.INTEGRITY": 4,
          "OT.RESOURCE_AVAILABILITY": 6
        },
        "T": {
          "T.DEPLETION": 4,
          "T.DISCLOSURE": 4,
          "T.EXECUTION": 4,
          "T.MODIFICATION": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 4,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 4,
          "ALC_DVS.2": 5,
          "ALC_FLR.3": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_DPT.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 5,
          "EAL 5 augmented": 2,
          "EAL 5+": 1,
          "EAL5": 3
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 32,
          "FDP_ACC.2": 12,
          "FDP_ACF": 34,
          "FDP_ACF.1": 27,
          "FDP_IFC.2": 8,
          "FDP_IFF.1": 11
        },
        "FIA": {
          "FIA_UID.2": 6
        },
        "FMT": {
          "FMT_MSA.1": 6,
          "FMT_MSA.3": 7,
          "FMT_MSA.3.1": 2,
          "FMT_MTD": 12,
          "FMT_MTD.1": 3,
          "FMT_SMF.1": 5,
          "FMT_SMR.1": 7
        },
        "FRU": {
          "FRU_RSA": 10,
          "FRU_RSA.2": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "AMD": {
          "PSP": 27
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 71
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Guillaume Fumaroli",
      "/Keywords": "operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforc\u00e9",
      "/Subject": "",
      "/Title": "Security Target for the PikeOS Separation Kernel v5.1.3 for the NXP LS1023A/LS1043A Processor",
      "pdf_file_size_bytes": 897440,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "https://www.sysgo.com",
          "mailto:[email protected]",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 59
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_IMP.2",
      "EAL5",
      "ALC_FLR.3",
      "ALC_DVS.2",
      "ALC_CMC.5",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7aab71a9965001df03e6ab353c77774979c260b215c388e90c45b93bc2d6bb53",
      "txt_hash": "0e8963f498187d19017613c9ee5b64a9f948498c8a647b70bd15d8c9ff0a9f19"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4b7787f075925db72862923c8d8add72cc8c696c73f20d2d9c087de348ebe7e1",
      "txt_hash": "ac2d6cda8dae87853844014abc3bcbfab66e26a2603d78e2d1c4554d22a2764d"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2c136d2dc8ae3acc46dd11150fa4649b76b74e4c731a4c6ca28f805a701c02b1",
      "txt_hash": "8626ebe4ca8d75a85e90669032fa46c0894e9dbe4bd3024ec5399b935e342da4"
    }
  },
  "status": "active"
}