Hitachi Command Suite Common Component Version: 7.0.1-00

CSV information

Status archived
Valid from 15.08.2011
Valid until 01.09.2016
Scheme 🇯🇵 JP
Manufacturer Hitachi, Ltd.
Category Access Control Devices and Systems
Security level EAL2+, ALC_FLR.1

Heuristics summary

Certificate ID: JISEC-CC-CRP-C0303

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Protocols
SSH

Vendor
Microsoft

Security level
EAL2, EAL2 augmented
Claims
T.ILLEGAL_ACCESS, T.UNAUTHORISED_ACCESS, A.PHYSICAL, A.ADMINISTRATORS, A.PASSWORD, A.SECURE_CHANNEL, A.NETWORKS, A.SRV_MGMT, A.CLIENTS, A.VERSION
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.2
Certificates
CRP-C0303-01, Certification No. C0303

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title CRP-e
Author IPA/JISEC
Creation date D:20110928100804+09'00'
Modification date D:20110928100931+09'00'
Pages 38
Creator Word 用 Acrobat PDFMaker 8.1
Producer Acrobat Distiller 8.3.0 (Windows)

Security target

Extracted keywords

Vendor
Microsoft Corporation, Microsoft

Security level
EAL2, EAL2 augmented
Claims
O.MGMT, O.BANNER, O.PASSWORD, T.ILLEGAL_ACCESS, T.UNAUTHORISED_ACCESS, A.PHYSICAL, A.NETWORKS, A.ADMINISTRATORS, A.SECURE_CHANNEL, A.VERSION, A.PASSWORD, A.CLIENTS, A.SRV_MGMT, A.ADMINISTROTORS, OE.SECURE_CHANNEL, OE.BANNER, OE.PASSWORD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ACC, FDP_ACF, FIA_UAU.1, FIA_UID.1, FIA_SOS.1, FIA_ATD.1, FIA_USB.1, FIA_AFL.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.1.1, FIA_ATD.1.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID, FIA_SOS, FIA_USB, FIA_AFL, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FTA_TAB.1, FTA_TAB.1.1, FTA_TAB

File metadata

Title Hitachi Command Suite Common Component ST
Subject HSCC-ST
Author Hitachi, Ltd. Software Division
Creation date D:20110926112144
Modification date D:20110926112144
Pages 58
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

JISEC-CC-CRP-C0303

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Scheme data

Cert Id JISEC-CC-CRP-C0303
Supplier Hitachi, Ltd.
Toe Overseas Name -----
Expiration Date 01.09.2016
Claim EAL2+ ALC_FLR.1
Certification Date 01.08.2011
Toe Overseas Link None
Toe Japan Name Hitachi Command Suite Common Component 7.0.1-00
Toe Japan Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
Enhanced
Product Hitachi Command Suite Common Component
Toe Version 7.0.1-00
Product Type Foundational Module Software
Cc Version 3.1
Assurance Level EAL2 Augmented with ALC_FLR.1
Vendor Hitachi, Ltd.
Evaluation Facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
Report Link https://www.ipa.go.jp/en/security/c0303_erpt.pdf
Target Link https://www.ipa.go.jp/en/security/c0303_est.pdf
Description PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "3d4662c844b7ac14",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0303",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.0.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0303",
      "certification_date": "2011-08-01",
      "claim": "EAL2+ ALC_FLR.1",
      "enhanced": {
        "assurance_level": "EAL2 Augmented with ALC_FLR.1",
        "cc_version": "3.1",
        "description": "PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
        "product": "Hitachi Command Suite Common Component",
        "product_type": "Foundational Module Software",
        "report_link": "https://www.ipa.go.jp/en/security/c0303_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0303_est.pdf",
        "toe_version": "7.0.1-00",
        "vendor": "Hitachi, Ltd."
      },
      "expiration_date": "2016-09-01",
      "supplier": "Hitachi, Ltd.",
      "toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html",
      "toe_japan_name": "Hitachi Command Suite Common Component 7.0.1-00",
      "toe_overseas_link": null,
      "toe_overseas_name": "-----"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Hitachi, Ltd.",
  "manufacturer_web": "https://www.hitachi.com/",
  "name": "Hitachi Command Suite Common Component Version: 7.0.1-00",
  "not_valid_after": "2016-09-01",
  "not_valid_before": "2011-08-15",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0303_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0303-01": 1,
          "Certification No. C0303": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMINISTRATORS": 1,
          "A.CLIENTS": 1,
          "A.NETWORKS": 1,
          "A.PASSWORD": 1,
          "A.PHYSICAL": 1,
          "A.SECURE_CHANNEL": 1,
          "A.SRV_MGMT": 1,
          "A.VERSION": 1
        },
        "T": {
          "T.ILLEGAL_ACCESS": 2,
          "T.UNAUTHORISED_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 3,
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 6
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "IPA/JISEC",
      "/Company": "IPA",
      "/CreationDate": "D:20110928100804+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
      "/Manager": "IPA",
      "/ModDate": "D:20110928100931+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.3.0 (Windows)",
      "/Title": "CRP-e",
      "pdf_file_size_bytes": 345195,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 38
    },
    "st_filename": "c0303_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMINISTRATORS": 3,
          "A.ADMINISTROTORS": 1,
          "A.CLIENTS": 4,
          "A.NETWORKS": 3,
          "A.PASSWORD": 3,
          "A.PHYSICAL": 4,
          "A.SECURE_CHANNEL": 3,
          "A.SRV_MGMT": 3,
          "A.VERSION": 4
        },
        "O": {
          "O.BANNER": 6,
          "O.MGMT": 9,
          "O.PASSWORD": 7
        },
        "OE": {
          "OE.BANNER": 4,
          "OE.PASSWORD": 4,
          "OE.SECURE_CHANNEL": 4
        },
        "T": {
          "T.ILLEGAL_ACCESS": 4,
          "T.UNAUTHORISED_ACCESS": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.1": 6
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 7,
          "EAL2 augmented": 3
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 15,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 2
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 11,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 11,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 7,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 2,
          "FMT_MSA.1": 10,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 9,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 11,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FTA": {
          "FTA_TAB": 1,
          "FTA_TAB.1": 8,
          "FTA_TAB.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 4,
          "Microsoft Corporation": 4
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Hitachi, Ltd. Software Division",
      "/CreationDate": "D:20110926112144",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110926112144",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "HSCC-ST",
      "/Title": "Hitachi Command Suite Common Component ST",
      "pdf_file_size_bytes": 455862,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 58
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6d53e443a9a706ec6d2e7b63ae3f23c093d26086e54354c4eefe2da8e5c35e90",
      "txt_hash": "5715eac33217710ca2e388d2a9cce5fe32f1a65cadc3bd0580d39d458f1a50ce"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f2f4098ecaac915ebf4b427ba932a01c2beb24bae1c44387fefb470a713cfb0e",
      "txt_hash": "4e4e716e35185a7b2c3ddb981dbc6ac44b0e4f5b4d197685712c314bb84a98ad"
    }
  },
  "status": "archived"
}