Ärendetyp: 6 Diarienummer: 19FMV3581-49:1 Dokument ID 7DFAYPHQVZ4V- 1834444990-2008 Enligt säkerhetsskyddslagen (2018:585) SEKRETESS Enligt offentlighets- och Sekretesslagen (2009:400) 2020-05-25 Försvarets materielverk Swedish Defence Material Administration Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD Issue: 1.0, 2020-maj-25 Authorisation: Ulf Noring, Lead Certifier , CSEC Ärendetyp: 6 Diarienummer: 19FMV3581-49:1 Dokument ID 7DFAYPHQVZ4V- 1834444990-2008 Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 2 (21) Table of Contents 1 Executive Summary 3 2 Identification 5 3 Security Policy 6 3.1 User Management 6 3.2 Data Access 6 3.3 FAX Data Flow Control 6 3.4 Solid State Disk Encryption 6 3.5 Security Management 6 3.6 Network Protection 6 4 Assumptions and Clarification of Scope 7 4.1 Usage Assumptions 7 4.2 Clarification of Scope 7 5 Architectural Information 9 5.1 Physical Configuration of the TOE 9 5.2 Logical Configuration of the TOE 10 6 Documentation 11 7 IT Product Testing 12 7.1 Developer Testing 12 7.2 Evaluator Testing 12 7.3 Penetration Testing 13 8 Evaluated Configuration 14 8.1 Dependencies to Other Hardware, Firmware and Software 14 8.2 Excluded from the TOE Evaluated Configuration 14 9 Results of the Evaluation 15 10 Evaluator Comments and Recommendations 16 11 Glossary 17 12 Bibliography 18 12.1 General 18 12.2 Documentation 18 Appendix A Scheme Versions 20 A.1 Scheme/Quality Management System 20 A.2 Scheme Notes 20 Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 3 (21) 1 Executive Summary The Target of Evaluation (TOE) consists of the hardware and firmware of the follow- ing multifunction printer (MFP) models with Solid State Disk: KYOCERA: ECOSYS M3860idn ECOSYS M3860idnG TA Triumph-Adler: P-6038i MFP UTAX: P-6038i MFP The TSF and its execution environment are the same in all the listed models above. The only difference between them are sales destinations. The following firmware is used by the system: System firmware: 2X9_S0IS.C01.011 The above models provide copying, scanning, printing, faxing and box functionality. The evaluated security features include user management, data access control, fax data flow control, job authorization, solid state disk encryption, security management, and network protection (IPSec and TLS). The following functionality is excluded from the evaluation: - The maintenance interface - Network authentication - The installation of Java applications on the MFP The TOE is delivered to the customer by a courier trusted by KYOCERA Document Solutions Inc. The main MFP printer unit is delivered separately from the SSD add- on. The TOE can be purchased from a KYOCERA Document Solutions Inc. group corporation directly or from a dealer. A service person from the organisation that sold the TOE will set it up for the customer. The evaluation has been performed by Combitech AB in their premises in Sundbyberg and Bromma, Sweden with testing done in the developer's premises in Osaka, Japan and was completed on the 20th of April, 2020. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 4 (21) The evaluation was conducted in accordance with the requirements of Common Crite- ria, version 3.1, revision 5, and the Common Methodology for IT Security Evaluation, version 3.1, revision 5. The evaluation conforms to evaluation assurance level EAL 2, augmented by ALC_FLR.2. The evaluation does not claim conformance to any Pro- tection Profile. Combitech AB is a licensed evaluation facility for Common Criteria under the Swe- dish Common Critera Evaluation and Certification Scheme. Combitech AB is also ac- credited by the Swedish accreditation body SWEDAC according to ISO/IEC 17025:2018 for Common Criteria evaluation. The certifier monitored the activities of the evaluator by reviewing all successive ver- sions of the evaluation reports. The certifier determined that the evaluation results confirm the security claims in the Security Target [ST] and have been reached in agreement with the requirements of the Common Criteria and the Common Methodol- ogy for the evaluation assurance level EAL 2 + ALC_FLR.2. The technical information in this report is based on the Security Target [ST] and the Final Evaluation Report [FER] produced by Combitech AB. The certification results only apply to the version of the product indicated in the cer- tificate, and on the condition that all the stipulations in the Security Target are met. This certificate is not an endorsement of the IT product by CSEC or any other organ- isation that recognises or gives effect to this certificate, and no warranty of the IT product by CSEC or any other organisation that recognises or gives effect to this certificate is either expressed or implied. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 5 (21) 2 Identification Certification Identification Certification ID CSEC2019006 Name and version of the certified IT product KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG TA Triumph-Adler P-6038i MFP UTAX P-6038i MFP The SSD option HD-7 for the above printer models System Firmware: 2X9_S0IS.C01.011 Security Target Identification ECOSYS M3860idn Series with SSD Security Tar- get EAL EAL 2 + ALC_FLR.2 Sponsor Kyocera Document Solutions Inc. Developer Kyocera Document Solutions Inc. ITSEF Combitech AB Common Criteria version 3.1 revision 5 CEM version 3.1 revision 5 QMS version 1.23.1 Scheme Notes Release 14.0 Recognition Scope CCRA, SOGIS and EA/MLA Certification date 2020-05-26 Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 6 (21) 3 Security Policy The TOE consists of six security functions, listed below together with a short descrip- tion of each function.Summary of the security services the TOE provides. 3.1 User Management Identifies and authenticates whether persons are authorized users when users intend to operate the TOE from the operation panel or client PCs. When the TOE is used from the Operation Panel or a Web browser, the login screen is displayed and a user is re- quired to enter his or her login user name and login password. When the TOE is ac- cessed from the printer driver or TWAIN driver, the TOE identifies and authenticates if the person is authorized by referring to the login user name and login user password obtained from the job sent by the user. If the logon procedure fails consecutively for a certain amount of times, the user is locked out of their account for an amount of time set by the administrator. Users are automatically logged out after a certain period of inactivity. 3.2 Data Access Allows authorized users to only access their own image and job data stored in the TOE using each of the TOE basic function such as copy, scan to send, print, fax and box function. Users who own boxes can give other users permission to view the con- tents of a particular box, and also set a password to further protect the box. 3.3 FAX Data Flow Control Makes sure that data received on the fax line interface is forwarded on to the internal network that the TOE is connected to. 3.4 Solid State Disk Encryption A function that encrypts information assets stored in the SSDD in order to prevent leakage of data stored in the SSD inside the TOE. 3.5 Security Management The security management function allows only authorized users to edit user infor- mation, set the TOE security functions, and manage TSF. The Security management function can be performed from the Operation Panel and Client PCs. A web browser is used for operation from Client PCs. 3.6 Network Protection The network protection function verifies the propriety of the destination to connect to and protects targeted information assets against leaking and altering by applying en- cryption when using the Scan to Send Function, Print Function, Box Function, the Box Function from a Client PC (web browser), or the Security Management Function from a Client PC (web browser). Communication with a computer directly connected with the MFP is not encrypted. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 7 (21) 4 Assumptions and Clarification of Scope 4.1 Usage Assumptions The Security Target [ST] makes four assumptions on the usage of the TOE. A.ACCESS The hardware and software that the TOE is composed of are located in a protected en- vironment from security invasion such as illegal analysis and alteration. A.NETWORK The TOE is connected to the internal network that is protected from illegal access from the external network. A.USER_EDUCATION The TOE users are aware of the security policies and procedures of their organization, and are educated to follow those policies and procedures. A.DADMIN_TRUST The TOE's administrators are competent to manage devices properly as a device ad- ministrator and have a reliability not to use their privileged access rights for malicious purposes. 4.2 Clarification of Scope The Security Target contains three threats which have been considered during the evaluation. T.SETTING_DATA Malicious person may have unauthorized access to, to change, or to leak TOE setting data via the operation panel or client PCs. T.IMAGE_DATA Malicious person may illegally access not authorized box document data via the op- eration panel or Client PC and leak or alter them. T.NETWORK Malicious person may illegally eavesdrop or alter document data or TOE setting data on the internal network. The Security Target contains two Organisational Security Policies (OSPs) which have been considered during the evaluation. P.SSD_ENCRYPTION TOE must encrypt document data and TOE setting data stored on SSD. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 8 (21) P.FAX_CONTROL TOE must control not to forward the data received from a public line to the internal network that the TOE is connected. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 9 (21) 5 Architectural Information 5.1 Physical Configuration of the TOE The TOE consists of an Operation Panel, a Scanner Unit, a Printer Unit, a Control Board, a solid state disk (SSD), the system firmware, and the guidance documents. The different parts (except for the guidance documentation) are depicted in the dia- gram below. The Operation Panel is the hardware that displays status and results upon receipt of input by the TOE user. The Scanner and Printer units are the hardware that input doc- uments into the TOE and output documents as printed material. The Control Board is the circuit board that controls the entire TOE. A system firm- ware is installed on a NAND which is positioned on the Control Board. The Control Board has a Network Interface (NIC), a Local Interface (USB Port), and a Public Line for sending and receiving faxes (NCU). There is also an ASIC on the Main Board. The ASIC includes a Security Chip which implements security arithmetic processing for the SSD encryption function. The NAND stores device settings while the Volatile Memory is used as a working ar- ea. The SSD that stores image data and job data is connected to the Control Board. Any of the above memory mediums are not removable. Device setting data related to Box functionality is stored in the SSD. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 10 (21) 5.2 Logical Configuration of the TOE The below diagram illustrates the logical scope of the TOE: Please see section 1.4.3 in the [ST] for a more detailed description of the functionality shown in the diagram. There is no interface for any user or administrator to directly in- teract with the TOE operating system, all interactions must be made via one of the standard application functions or the hardware interfaces of the TOE. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 11 (21) 6 Documentation The following guidance documents are available: [NOTICE] Notice [QG] ECOSYS M3860idnf / ECOSYS M3860idn First Steps Quick Guide [OG] ECOSYS M3860idnf / ECOSYS M3860idn Operation Guide [SG] ECOSYS M3860idnf / ECOSYS M3860idn Safety Guide [OG-FAX] ECOSYS M3860idnf / ECOSYS M3860idn FAX Operation Guide [OG-DE] Data Encryption/Overwrite Operation Guide [UG-CCRX] Command Center RX User Guide [UG-PD] ECOSYS M3860idnf / ECOSYS M3860idn Printer Driver User Guide [UG-NDP] KYOCERA Net Direct Print User Guide Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 12 (21) 7 IT Product Testing 7.1 Developer Testing The developer performed extensive manual tests on the following printer models: ECOSYS M3860idn Since the TSF and its execution environment are the same in the model listed above and the other TOE models listed in chapter 1, and the only differences between them are sales destinations, this covers all of the TOE models listed in chapter 1. The developer testing was done on the following firmware: 2X9_S0IS.C01.011 The developer's testing covers the security functional behaviour of all TSFIs and most SFRs. Some gaps to the SFRs were identified and covered by evaluator independent testing. All test results were as expected. The testing was performed on the developer's premises in Osaka, Japan. 7.2 Evaluator Testing The evaluator's independent tests were chosen to complement the developer's manual tests in order to complement the cover of the security functional behaviour of the SFRs. The evaluator repeated a sample of the developer's test cases and performed in- dividual and penetration test cases. The tests included: TOE Installation Identification and Authentication Data Access Control Security Management Network Protection 7.2.1 Test Environment The evaluator performed the tests on the developer's premises in Osaka, Japan using the same test environment as the developer. This was accepted since the only differ- ence between the different TOE models is the sales destination. The test environment was set up according to the below diagram: Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 13 (21) 7.3 Penetration Testing The evaluators penetration tested the TOE using the same test environment as de- scribed above in chapter 7.2.1. The following types of penetration tests were per- formed: - Port scan - Vulnerability scan including web application vulnerability scan - JPG fuzzing - TLS scanning Port scans were run after installation and configuration had been done according the guidance documentation. The purpose was to check that no unexpected ports were opened unfiltered and no unexpected services available. The Nmap (www.nmap.org) port scan tool was used. Four different modes were used: TCP Connect, TCP SYN, UDP, and IP protocol scans. All possible 65535 ports were scanned for TCP/UDP. Nessus (www.tenable.com) basic network vulnerability scans were run. No high, me- dium, or low severity issues concerning the evaluated configuration were found. A JPG picture were fuzzed approximate 110 times using the Peach fuzzing tool. All penetration testing had negative outcome, i.e. no vulnerabilities were found. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 14 (21) 8 Evaluated Configuration A notice [NOTICE] included with the TOE details verification procedures of the TOE, explains that use of applications on the TOE is not allowed in the evaluated configura- tion, and guides users to follow the Data Encryption/Overwrite Operation Guide [OG- DE] to configure the TOE. The Data Encryption/Overwrite Operation Guide [OG-DE] describes how to configure the TOE to reach evaluated configuration in the chapter named "Installing the Security Functions", in the subchapter "After Installation". The in-structions need to be followed in order to use the evaluated configuration. 8.1 Dependencies to Other Hardware, Firmware and Soft- ware The TOE is the hardware and firmware of the various MFP models listed in chapter 1 as well as the guidance needed to configure and operate the TOE. To be fully operational, any combination of the following items may be connected to the MFP: - A LAN for network connectivity. - A telephone line for fax capability. - IT systems that submit print jobs to the TOE via the network using standard print protocols. - IT systems that send/and or receive faxes via the telephone line - An SMTP server/FTP server/client PC/other FAX system/USB memory that will re- ceive any input sent to the MFP if the MFP is configured to send it to them. - A USB memory that can be used as an input source for print jobs (i.e. print from USB), or to copy documents to from a box. 8.2 Excluded from the TOE Evaluated Configuration The following features of the TOE are outside of the evaluated configuration: - The maintenance interface - Networked user authentication such as LDAP Expanding functionality by installing Java applications is not allowed in the TOE evaluated configuration. The user manual [OG] calls the Java applications "applica- tions". More information can be found in chapter 5-11, "Application", in [OG]. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 15 (21) 9 Results of the Evaluation The evaluators applied each work unit of the Common Methodology [CEM] within the scope of the evaluation, and concluded that the TOE meets the security objectives stated in the Security Target [ST] for an attack potential of Basic. The certifier reviewed the work of the evaluators and determined that the evaluation was conducted in accordance with the Common Criteria [CC]. The evaluators' overall verdict is PASS. The verdicts for the assurance classes and components are summarised in the follow- ing table: Assurance Class Name / Assurance Family Name Short name (includ- ing component iden- tifier for assurance families) Verdict Security Target Evaluation ST Introduction Conformance claims Security Problem Definition Security objectives Extended components definition Derived security requirements TOE summary specification ASE ASE_INT.1 ASE_CCL.1 ASE_SPD.1 ASE_OBJ.2 ASE_ECD.1 ASE_REQ.2 ASE_TSS.1 PASS PASS PASS PASS PASS PASS PASS PASS Life-cycle support Use of a CM system Parts of the TOE CM Coverage Delivery procedures Flaw reporting procedures ALC ALC_CMC.2 ALC_CMS.2 ALC_DEL.1 ALC_FLR.2 PASS PASS PASS PASS PASS Development Security architecture description Security-enforcing functional specification Basic design ADV ADV_ARC.1 ADV_FSP.2 ADV_TDS.1 PASS PASS PASS PASS Guidance documents Operational user guidance Preparative procedures AGD AGD_OPE.1 AGD_PRE.1 PASS PASS PASS Tests Evidence of coverage Functional testing Independent testing - sample ATE ATE_COV.1 ATE_FUN.1 ATE_IND.2 PASS PASS PASS PASS Vulnerability Assessment Vulnerability analysis AVA AVA_VAN.2 PASS PASS Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 16 (21) 10 Evaluator Comments and Recommendations None. Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 17 (21) 11 Glossary CEM Common Methodology for Information Technology Security, document describing the methodology used in Common Criteria evaluations CM Configuration Management EAL Evaluation Assurance Level HDD Hard Disk Drive IPSec Internet Protocol Security ISO International Organization for Standardization IT Information Technology ITSEF IT Security Evaluation Facility, test laboratory licensed to operate with- in an evaluation and certification scheme LAN Local Area Network MFP Multi-Function Printer NCU Network Control Unit OSP Organizational Security Policy PP Protection Profile SMTP Simple Mail Transport Protocol SSD Solid State Disk ST Security Target, document containing security requirements and speci- fications , used as the basis of a TOE evaluation TLS Transport Layer Security TOE Target of Evaluation TSF TOE Security Functionality TSFI TSF Interface Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 18 (21) 12 Bibliography 12.1 General CCp1 Common Criteria for Information Technology Security Evaluation, Part 1, version 3.1, revision 5, April 2017, CCMB-2017-04-001 CCp2 Common Criteria for Information Technology Security Evaluation, Part 2, version 3.1, revision 5, April 2017, CCMB-2017-04-002 CCp3 Common Criteria for Information Technology Security Evaluation, Part 3:, version 3.1, revision 5, April 2017, CCMB-2017-04-003 CEM Common Methodology for Information Technology Security Evaluation, version 3.1, revision 5, April 2017, CCMB-2017-04-004 ST ECOSYS M3860idnf Series with HDD Security Target, KYOCERA Doc- ument Solutions Inc., 2019-03-31, document version 1.02 SP-002 SP-002 Evaluation and Certification, CSEC, 2019-09-24, document ver- sion 31.0 SP-188 SP-188 Scheme Crypto Policy, CSEC, 2019-09-25, document version 9.0 12.2 Documentation NOTICE Notice, ECOSYS M3860idnf, ECOSYS M3860idnfG, P-6038if MFP, KYOCERA Document Solutions Inc., 2020-01, document version 303MS5641003 QG FIRST STEPS QUICK GUIDE, ECOSYS 3860idnf, ECOSYS M3860idn, KYOCERA Document Solutions Inc., 2019-04, document version 3V2WF5601001 OG OPERATION GUIDE, ECOSYS 3860idnf, ECOSYS M3860idn, KYOCERA Document Solutions Inc., 2019-04, document version 2WDFDEN000 SG ECOSYS M3860idnf / ECOSYS M3860idn Safety Guide, KYOCERA Document Solutions Inc., 2019-04, document version 3V2WF5621001 OG-FAX FAX Operation Guide, ECOSYS 3860idnf, ECOSYS M3860idn, KYOCERA Document Solutions Inc., 2019-04, document version 2WFKDEN500 OG-DE Data Encryption/Overwrite, Operation Guide, ECOSYS M3860idnf, ECOSYS M3860idn, KYOCERA Document Solutions Inc., 2019-11, Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 19 (21) document version 3MT2WFKDEN003 UG-CCRX Command Center RX, User Guide, KYOCERA Document Solutions Inc., 2017-10, document version CCRXKDEN13 UG-PD Printer Driver, User Guide, ECOSYS 3860idnf, ECOSYS M3860idn, KYOCERA Document Solutions Inc., 2019-04, document version 2WFBWKDEN740 UG-NDP KYOCERA Net Direct Print, User Guide, KYOCERA Document Solut- ions Inc., 2019-02, document version DirectPrintKDEN2.2019.02 Swedish Certification Body for IT Security Certification Report - KYOCERA ECOSYS M3860idn, ECOSYS M3860idnG, TA Triumph- Adler/UTAX P-6038i MFP, with SSD 19FMV3581-49:1 1.0 2020-05-25 7DFAYPHQVZ4V- 1834444990-2008 20 (21) Appendix A Scheme Versions During the certification the following versions of the Swedish Common Criteria Eval- uation and Certification scheme have been used. A.1 Scheme/Quality Management System Version Introduced Impact of changes 1.23.1 2020-03-06 None 1.23 Application Original version A.2 Scheme Notes Scheme Note Version Title Applicability SN-15 3.0 Demonstration of test coverage Clarify demonstration of test cover- age at EAL2: evaluator + developer tests together provide full coverage of the TSFI. SN-18 1.0 Highlighted Re- quirements on the Security Tar- get Clarifications on the content of the ST. SN-22 1.0 Vulnerability Assessment Vulnerability assessment needs to be redone if 30 days or more has passed between AVA and the final version of the final evaluation report.