Hitachi Command Suite Common Component Version: 7.0.1-00
CSV information ?
Status | archived |
---|---|
Valid from | 15.08.2011 |
Valid until | 01.09.2016 |
Scheme | 🇯🇵 JP |
Manufacturer | Hitachi, Ltd. |
Category | Access Control Devices and Systems |
Security level | ALC_FLR.1, EAL2+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSHVendor
MicrosoftSecurity level
EAL2, EAL2 augmentedClaims
T.ILLEGAL_ACCESS, T.UNAUTHORISED_ACCESS, A.PHYSICAL, A.ADMINISTRATORS, A.PASSWORD, A.SECURE_CHANNEL, A.NETWORKS, A.SRV_MGMT, A.CLIENTS, A.VERSIONSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.2Certificates
CRP-C0303-01, Certification No. C0303Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | CRP-e |
---|---|
Author | IPA/JISEC |
Creation date | D:20110928100804+09'00' |
Modification date | D:20110928100931+09'00' |
Pages | 38 |
Creator | Word 用 Acrobat PDFMaker 8.1 |
Producer | Acrobat Distiller 8.3.0 (Windows) |
Security target ?
Extracted keywords
Vendor
Microsoft Corporation, MicrosoftSecurity level
EAL2, EAL2 augmentedClaims
O.MGMT, O.BANNER, O.PASSWORD, T.ILLEGAL_ACCESS, T.UNAUTHORISED_ACCESS, A.PHYSICAL, A.NETWORKS, A.ADMINISTRATORS, A.SECURE_CHANNEL, A.VERSION, A.PASSWORD, A.CLIENTS, A.SRV_MGMT, A.ADMINISTROTORS, OE.SECURE_CHANNEL, OE.BANNER, OE.PASSWORDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ACC, FDP_ACF, FIA_UAU.1, FIA_UID.1, FIA_SOS.1, FIA_ATD.1, FIA_USB.1, FIA_AFL.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.1.1, FIA_ATD.1.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID, FIA_SOS, FIA_USB, FIA_AFL, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FTA_TAB.1, FTA_TAB.1.1, FTA_TABFile metadata
Title | Hitachi Command Suite Common Component ST |
---|---|
Subject | HSCC-ST |
Author | Hitachi, Ltd. Software Division |
Creation date | D:20110926112144 |
Modification date | D:20110926112144 |
Pages | 58 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
Name | Certificate ID | |
---|---|---|
HP StorageWorks P9000 Command View Advanced Edition Software Common Component Version: 7.0.1-00 | JISEC-CC-CRP-C0305 | Compare |
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1 | ANSSI-CC-2011/78 | Compare |
Hitachi Storage Command Suite Common Component Version: 6.0.0-01 | JISEC-CC-CRP-C0199 | Compare |
Scheme data ?
Cert Id | JISEC-CC-CRP-C0303 | |
---|---|---|
Supplier | Hitachi, Ltd. | |
Toe Overseas Name | ----- | |
Expiration Date | 01.09.2016 | |
Claim | EAL2+ ALC_FLR.1 | |
Certification Date | 01.08.2011 | |
Toe Overseas Link | None | |
Toe Japan Name | Hitachi Command Suite Common Component 7.0.1-00 | |
Toe Japan Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html | |
Enhanced | ||
Product | Hitachi Command Suite Common Component | |
Toe Version | 7.0.1-00 | |
Product Type | Foundational Module Software | |
Cc Version | 3.1 | |
Assurance Level | EAL2 Augmented with ALC_FLR.1 | |
Vendor | Hitachi, Ltd. | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security | |
Report Link | https://www.ipa.go.jp/en/security/c0303_erpt.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0303_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0303', 'expiration_date': '2016-09-01', 'claim': 'EAL2+ ALC_FLR.1', 'certification_date': '2011-08-01', 'toe_japan_name': 'Hitachi Command Suite Common Component 7.0.1-00', 'enhanced': {'__update__': {'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'description': 'PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0303', 'supplier': 'Hitachi, Ltd.', 'toe_overseas_name': '-----', 'expiration_date': '2016-09', 'claim': 'EAL2+\n ALC_FLR.1', 'certification_date': '2011-08', 'toe_overseas_link': None, 'toe_japan_name': 'Hitachi Command Suite Common Component\n 7.0.1-00', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html', 'enhanced': {'product': 'Hitachi Command Suite Common Component', 'toe_version': '7.0.1-00', 'product_type': 'Foundational Module Software', 'certification_date': '2011-08-15', 'cc_version': '3.1', 'assurance_level': 'EAL2 Augmented with ALC_FLR.1', 'vendor': 'Hitachi, Ltd.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Center for Evaluation of Information Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0303_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0303_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. \n \n TOE security functionality \n TOE provides the following security functionality: \n \n - Identification/authentication functionality\n (External authentication functionality provided by external authentication servers, \n or the use of linkage functionality for external authentication groups)\n - Security management functionality\n (Functionality that manages TOE user account information, \n and allows the user to set security parameters)\n - Warning banner functionality'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6d53e443a9a706ec6d2e7b63ae3f23c093d26086e54354c4eefe2da8e5c35e90', 'txt_hash': '5715eac33217710ca2e388d2a9cce5fe32f1a65cadc3bd0580d39d458f1a50ce'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f2f4098ecaac915ebf4b427ba932a01c2beb24bae1c44387fefb470a713cfb0e', 'txt_hash': '4e4e716e35185a7b2c3ddb981dbc6ac44b0e4f5b4d197685712c314bb84a98ad'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 345195, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 38, '/Author': 'IPA/JISEC', '/Company': 'IPA', '/CreationDate': "D:20110928100804+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/Manager': 'IPA', '/ModDate': "D:20110928100931+09'00'", '/Producer': 'Acrobat Distiller 8.3.0 (Windows)', '/Title': 'CRP-e', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 455862, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 58, '/Title': 'Hitachi Command Suite Common Component ST', '/Author': 'Hitachi, Ltd. Software Division', '/Subject': 'HSCC-ST', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110926112144', '/ModDate': 'D:20110926112144', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0303-01': 1, 'Certification No. C0303': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 3, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.ILLEGAL_ACCESS': 2, 'T.UNAUTHORISED_ACCESS': 2}, 'A': {'A.PHYSICAL': 1, 'A.ADMINISTRATORS': 1, 'A.PASSWORD': 1, 'A.SECURE_CHANNEL': 1, 'A.NETWORKS': 1, 'A.SRV_MGMT': 1, 'A.CLIENTS': 1, 'A.VERSION': 1}}, 'vendor': {'Microsoft': {'Microsoft': 6}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7, 'EAL2 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC.1': 15, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2, 'FDP_ACC': 1, 'FDP_ACF': 1}, 'FIA': {'FIA_UAU.1': 11, 'FIA_UID.1': 11, 'FIA_SOS.1': 8, 'FIA_ATD.1': 10, 'FIA_USB.1': 7, 'FIA_AFL.1': 7, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.1.1': 1, 'FIA_ATD.1.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UID': 1, 'FIA_SOS': 1, 'FIA_USB': 1, 'FIA_AFL': 1}, 'FMT': {'FMT_MSA.3': 9, 'FMT_MSA.1': 10, 'FMT_SMR.1': 13, 'FMT_SMF.1': 11, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 10, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 2, 'FMT_MTD': 1, 'FMT_SMF': 1, 'FMT_SMR': 1}, 'FTA': {'FTA_TAB.1': 8, 'FTA_TAB.1.1': 1, 'FTA_TAB': 1}}, 'cc_claims': {'O': {'O.MGMT': 9, 'O.BANNER': 6, 'O.PASSWORD': 7}, 'T': {'T.ILLEGAL_ACCESS': 4, 'T.UNAUTHORISED_ACCESS': 3}, 'A': {'A.PHYSICAL': 4, 'A.NETWORKS': 3, 'A.ADMINISTRATORS': 3, 'A.SECURE_CHANNEL': 3, 'A.VERSION': 4, 'A.PASSWORD': 3, 'A.CLIENTS': 4, 'A.SRV_MGMT': 3, 'A.ADMINISTROTORS': 1}, 'OE': {'OE.SECURE_CHANNEL': 4, 'OE.BANNER': 4, 'OE.PASSWORD': 4}}, 'vendor': {'Microsoft': {'Microsoft Corporation': 4, 'Microsoft': 4}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0303_erpt.pdf
. - The st_filename property was set to
c0303_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0303
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Hitachi Command Suite Common Component Version: 7.0.1-00 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Access Control Devices and Systems",
"cert_link": null,
"dgst": "3d4662c844b7ac14",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0303",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.0.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0303",
"certification_date": "2011-08-01",
"claim": "EAL2+ ALC_FLR.1",
"enhanced": {
"assurance_level": "EAL2 Augmented with ALC_FLR.1",
"cc_version": "3.1",
"description": "PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
"product": "Hitachi Command Suite Common Component",
"product_type": "Foundational Module Software",
"report_link": "https://www.ipa.go.jp/en/security/c0303_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0303_est.pdf",
"toe_version": "7.0.1-00",
"vendor": "Hitachi, Ltd."
},
"expiration_date": "2016-09-01",
"supplier": "Hitachi, Ltd.",
"toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html",
"toe_japan_name": "Hitachi Command Suite Common Component 7.0.1-00",
"toe_overseas_link": null,
"toe_overseas_name": "-----"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hitachi, Ltd.",
"manufacturer_web": "https://www.hitachi.com/",
"name": "Hitachi Command Suite Common Component Version: 7.0.1-00",
"not_valid_after": "2016-09-01",
"not_valid_before": "2011-08-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0303_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0303-01": 1,
"Certification No. C0303": 1
}
},
"cc_claims": {
"A": {
"A.ADMINISTRATORS": 1,
"A.CLIENTS": 1,
"A.NETWORKS": 1,
"A.PASSWORD": 1,
"A.PHYSICAL": 1,
"A.SECURE_CHANNEL": 1,
"A.SRV_MGMT": 1,
"A.VERSION": 1
},
"T": {
"T.ILLEGAL_ACCESS": 2,
"T.UNAUTHORISED_ACCESS": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 3,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4,
"EAL2 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 6
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "IPA/JISEC",
"/Company": "IPA",
"/CreationDate": "D:20110928100804+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
"/Manager": "IPA",
"/ModDate": "D:20110928100931+09\u002700\u0027",
"/Producer": "Acrobat Distiller 8.3.0 (Windows)",
"/Title": "CRP-e",
"pdf_file_size_bytes": 345195,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 38
},
"st_filename": "c0303_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMINISTRATORS": 3,
"A.ADMINISTROTORS": 1,
"A.CLIENTS": 4,
"A.NETWORKS": 3,
"A.PASSWORD": 3,
"A.PHYSICAL": 4,
"A.SECURE_CHANNEL": 3,
"A.SRV_MGMT": 3,
"A.VERSION": 4
},
"O": {
"O.BANNER": 6,
"O.MGMT": 9,
"O.PASSWORD": 7
},
"OE": {
"OE.BANNER": 4,
"OE.PASSWORD": 4,
"OE.SECURE_CHANNEL": 4
},
"T": {
"T.ILLEGAL_ACCESS": 4,
"T.UNAUTHORISED_ACCESS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.1": 6
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 7,
"EAL2 augmented": 3
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 15,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 11,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID": 1,
"FIA_UID.1": 11,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 1,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 2,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 9,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FTA": {
"FTA_TAB": 1,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 4,
"Microsoft Corporation": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Hitachi, Ltd. Software Division",
"/CreationDate": "D:20110926112144",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20110926112144",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "HSCC-ST",
"/Title": "Hitachi Command Suite Common Component ST",
"pdf_file_size_bytes": 455862,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 58
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6d53e443a9a706ec6d2e7b63ae3f23c093d26086e54354c4eefe2da8e5c35e90",
"txt_hash": "5715eac33217710ca2e388d2a9cce5fe32f1a65cadc3bd0580d39d458f1a50ce"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f2f4098ecaac915ebf4b427ba932a01c2beb24bae1c44387fefb470a713cfb0e",
"txt_hash": "4e4e716e35185a7b2c3ddb981dbc6ac44b0e4f5b4d197685712c314bb84a98ad"
}
},
"status": "archived"
}