Crunchy Certified PostgreSQL 12.5

CSV information ?

Status active
Valid from 16.03.2021
Valid until 16.03.2026
Scheme 🇨🇦 CA
Manufacturer Crunchy Data Solutions Inc.
Category Databases
Security level ALC_FLR.2, EAL2+
Protection profiles

Heuristics summary ?

Certificate ID: 516-LSS

Certificate ?

Extracted keywords

Certificates
516-LSS
Evaluation facilities
Lightship Security

File metadata

Title cyber-centre-product-evaluation-certificate-e-bg
Creation date D:20190122115136-04'00'
Modification date D:20210325160326-05'00'
Pages 1
Creator Adobe Illustrator CC 22.0 (Windows)
Producer Adobe PDF library 15.00

Certification report ?

Extracted keywords

Protocols
SSL

Security level
EAL 2+
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
516-LSS
Evaluation facilities
Lightship Security

Standards
ISO/IEC 17025

File metadata

Author White, Debra E.
Creation date D:20210326143039-04'00'
Modification date D:20210326143039-04'00'
Pages 16
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Security target ?

Extracted keywords

Hash functions
MD5
Protocols
SSL
Libraries
OpenSSL

Security level
EAL2, EAL2 augmented
Claims
O.ADMIN_ROLE, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.TOEACCESS, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED_SYSTEM
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FIA_USB.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1

Certification process
Out of Scope, Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide, methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is, platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional Dependencies

Standards
RFC 1413, RFC 2743, RFC 1964, RFC 7677, RFC 1321, RFC 4510

File metadata

Author Paul Laurence
Creation date D:20210316110349-04'00'
Modification date D:20210316110349-04'00'
Pages 79
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

Certificate ID: 516-LSS

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ALC_FLR.2, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2

Scheme data ?

Product Crunchy Certified PostgreSQL 12.5
Vendor Crunchy Data Solutions, Inc.
Level DBMS PP Base Package, V2.12
Certification Date 16.03.2021

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2021-03-16'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a', 'txt_hash': 'ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '62dcccf374de788629d4d52afdf5702a3c275fe34f5b9ff8a92df0ac185ffc9d', 'txt_hash': 'da9aa84738e5ea013feef3cac77a0af37e0c6c9ddeb93d3d4ac5f80fe7448b89'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1146452, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 79, '/Author': 'Paul Laurence', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20210316110349-04'00'", '/ModDate': "D:20210316110349-04'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 1640422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20210325160326-05'00'", '/Producer': 'Adobe PDF library 15.00', '/Title': 'cyber-centre-product-evaluation-certificate-e-bg', '/Creator': 'Adobe Illustrator CC 22.0 (Windows)', '/CreationDate': "D:20190122115136-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 4, 'FAU_GEN.2': 4, 'FAU_SEL.1': 7, 'FAU_GEN.1.1': 3, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 3, 'FAU_SEL.1.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 6, 'FDP_RIP.1': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_USB.1': 5, 'FIA_ATD.1': 10, 'FIA_UAU.1': 4, 'FIA_UID.1': 5, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 3, 'FIA_UAU.1.2': 2, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MSA.1': 6, 'FMT_MSA.3': 5, 'FMT_MTD.1': 5, 'FMT_REV.1': 13, 'FMT_SMF.1': 5, 'FMT_SMR.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 3, 'FMT_REV.1.1': 7, 'FMT_REV.1.2': 8, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPT': {'FPT_TRC.1': 7, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1}, 'FTA': {'FTA_MCS.1': 5, 'FTA_TSE.1': 4, 'FTA_MCS.1.1': 3, 'FTA_MCS.1.2': 2, 'FTA_TSE.1.1': 3}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 8, 'O.AUDIT_GENERATION': 6, 'O.DISCRETIONARY_ACCESS': 6, 'O.MANAGE': 10, 'O.MEDIATE': 8, 'O.RESIDUAL_INFORMATION': 8, 'O.TOE_ACCESS': 17, 'O.TOEACCESS': 1}, 'T': {'T.ACCESS_TSFDATA': 2, 'T.ACCESS_TSFFUNC': 2, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 2, 'T.TSF_COMPROMISE': 3, 'T.UNAUTHORIZED_ACCESS': 3}, 'A': {'A.PHYSICAL': 2, 'A.AUTHUSER': 2, 'A.MANAGE': 2, 'A.TRAINEDUSER': 2, 'A.NO_GENERAL_PURPOSE': 2, 'A.SUPPORT': 2, 'A.CONNECT': 2}, 'OE': {'OE.ADMIN': 11, 'OE.INFO_PROTECT': 19, 'OE.NO_GENERAL_PURPOSE': 7, 'OE.PHYSICAL': 7, 'OE.IT_REMOTE': 9, 'OE.IT_TRUSTED_SYSTEM': 9}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 5}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 1413': 2, 'RFC 2743': 1, 'RFC 1964': 1, 'RFC 7677': 4, 'RFC 1321': 4, 'RFC 4510': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of Scope': 2, 'Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide': 1, 'methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is': 1, 'platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional Dependencies': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'CA': {'516-LSS': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Lightship': {'Lightship Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf.
    • The cert_filename property was set to 516-LSS CT no sig Eng.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/516%20LSS%20CR.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target%20-%20Crunchy%20Certified%20PostgreSQL%2012%20-%20v1.8%20-%20515-LSS.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Crunchy Certified PostgreSQL 12.5 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Databases",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/516-LSS%20CT%20no%20sig%20Eng.pdf",
  "dgst": "514db6064d93b43b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "516-LSS",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "12.5"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "certification_date": "2021-03-16",
      "level": "DBMS PP Base Package, V2.12",
      "product": "Crunchy Certified PostgreSQL 12.5",
      "vendor": "Crunchy Data Solutions, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Crunchy Data Solutions Inc.",
  "manufacturer_web": "https://crunchydata.com/",
  "name": "Crunchy Certified PostgreSQL 12.5",
  "not_valid_after": "2026-03-16",
  "not_valid_before": "2021-03-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "516-LSS CT no sig Eng.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "516-LSS": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Lightship": {
          "Lightship Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20190122115136-04\u002700\u0027",
      "/Creator": "Adobe Illustrator CC 22.0 (Windows)",
      "/ModDate": "D:20210325160326-05\u002700\u0027",
      "/Producer": "Adobe PDF library 15.00",
      "/Title": "cyber-centre-product-evaluation-certificate-e-bg",
      "pdf_file_size_bytes": 1640422,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "516 LSS CR.pdf",
    "report_frontpage": {
      "CA": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "516-LSS": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Lightship": {
          "Lightship Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "White, Debra E.",
      "/CreationDate": "D:20210326143039-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20210326143039-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 596553,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.packetstormsecurity.org/",
          "http://www.google.com/",
          "http://www.kb.cert.org/vuls/",
          "https://www.cvedetails.com/",
          "https://www.postgresql.org/docs/9.5/libpq.html",
          "http://nvd.nist.gov/",
          "https://www.crunchydata.com/",
          "https://www.pgaudit.org/#section_three",
          "https://www.postgresql.org/support/security/",
          "http://cve.mitre.org/",
          "mailto:[email protected]",
          "https://postgis.net/documentation/",
          "https://jdbc.postgresql.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AUTHUSER": 2,
          "A.CONNECT": 2,
          "A.MANAGE": 2,
          "A.NO_GENERAL_PURPOSE": 2,
          "A.PHYSICAL": 2,
          "A.SUPPORT": 2,
          "A.TRAINEDUSER": 2
        },
        "O": {
          "O.ADMIN_ROLE": 8,
          "O.AUDIT_GENERATION": 6,
          "O.DISCRETIONARY_ACCESS": 6,
          "O.MANAGE": 10,
          "O.MEDIATE": 8,
          "O.RESIDUAL_INFORMATION": 8,
          "O.TOEACCESS": 1,
          "O.TOE_ACCESS": 17
        },
        "OE": {
          "OE.ADMIN": 11,
          "OE.INFO_PROTECT": 19,
          "OE.IT_REMOTE": 9,
          "OE.IT_TRUSTED_SYSTEM": 9,
          "OE.NO_GENERAL_PURPOSE": 7,
          "OE.PHYSICAL": 7
        },
        "T": {
          "T.ACCESS_TSFDATA": 2,
          "T.ACCESS_TSFFUNC": 2,
          "T.IA_MASQUERADE": 3,
          "T.IA_USER": 2,
          "T.RESIDUAL_DATA": 2,
          "T.TSF_COMPROMISE": 3,
          "T.UNAUTHORIZED_ACCESS": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 4
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL2 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 4,
          "FAU_GEN.1.1": 3,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 3,
          "FAU_SEL.1": 7,
          "FAU_SEL.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 3,
          "FDP_ACF.1.4": 2,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 3,
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 3,
          "FIA_UAU.1.2": 2,
          "FIA_UID.1": 5,
          "FIA_UID.1.1": 3,
          "FIA_UID.1.2": 2,
          "FIA_USB.1": 5
        },
        "FMT": {
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 5,
          "FMT_MSA.3.1": 3,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 3,
          "FMT_REV.1": 13,
          "FMT_REV.1.1": 7,
          "FMT_REV.1.2": 8,
          "FMT_SMF.1": 5,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPT": {
          "FPT_TRC.1": 7,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1
        },
        "FTA": {
          "FTA_MCS.1": 5,
          "FTA_MCS.1.1": 3,
          "FTA_MCS.1.2": 2,
          "FTA_TSE.1": 4,
          "FTA_TSE.1.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Audit Extension \u2022 PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide": 1,
          "Out of Scope": 2,
          "methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 \u201cTrust\u201d authentication option (not in TOE) When the trust authentication option is": 1,
          "platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: \u2022 Authenticator servers, if configured; and \u2022 Terminal emulator 1.5.9.4.3 Functional Dependencies": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 3
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 5
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 1321": 4,
          "RFC 1413": 2,
          "RFC 1964": 1,
          "RFC 2743": 1,
          "RFC 4510": 1,
          "RFC 7677": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Paul Laurence",
      "/CreationDate": "D:20210316110349-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20210316110349-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 1146452,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 79
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL2+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "DBMS_PPV2.12"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf",
        "pp_name": "Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/516%20LSS%20CR.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target%20-%20Crunchy%20Certified%20PostgreSQL%2012%20-%20v1.8%20-%20515-LSS.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "62dcccf374de788629d4d52afdf5702a3c275fe34f5b9ff8a92df0ac185ffc9d",
      "txt_hash": "da9aa84738e5ea013feef3cac77a0af37e0c6c9ddeb93d3d4ac5f80fe7448b89"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "522a896a3bd1386b7347ed32abf58950d4dbf8cac2fce7b48ee1205116621b69",
      "txt_hash": "8c9c3ab3dfce2272e80a885de7bc3479b5f45d8fd090ae68ccf084fa92cfbdb5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a",
      "txt_hash": "ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5"
    }
  },
  "status": "active"
}