This page was not yet optimized for use on mobile
devices.
SUSE Linux Enterprise Server, Version 15 SP7
CSV information
| Status | active |
|---|---|
| Valid from | 24.02.2026 |
| Valid until | 24.02.2031 |
| Scheme | 🇩🇪 DE |
| Manufacturer | SUSE LLC |
| Category | Other Devices and Systems |
| Security level | |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1230-2026
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Protocols
SSH, TLSSecurity level
EAL 4, EAL 2Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_FLR, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Certificates
BSI-DSZ-CC-1230-2026Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES, AES-, HMAC, HMAC-SHA-256, HMAC-SHA-512Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-256, SHA-384, SHA-512, SHA-2, PBKDF2Schemes
Key Exchange, KEX, Key agreementProtocols
SSH, SSHv2, TLS, TLS v1.2, TLS 1.3, TLS 1.2, IKE, IKEv2Randomness
DRBG, RNGLibraries
OpenSSLElliptic Curves
P-384, P-521, NIST P-384Block cipher modes
CBC, CTR, GCM, XTSSecurity level
EAL 4, EAL 2, EAL 1Claims
OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_FLR, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FTP_ITC_EXT.1Certificates
BSI-DSZ-CC-1230-2026Evaluation facilities
atsecCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Evaluation Technical Report, Version 5, Date 23 February 2026, atsec information security GmbH (confidential document) [7] Protection Profile for General Purpose Operating Systems, Version 4.3, 27 September 2022, March 2019, NIAP [10] Configuration list for the TOE, Master Configuration List, as of 2026-02-23 (confidential document) [11] Guidance documentation for the TOE, Common Criteria Evaluated Configuration Guide for SUSEStandards
FIPS180-4, FIPS186-5, FIPS197, FIPS 186-5, FIPS198-1, PKCS#1, AIS 20, AIS 32, RFC8017, RFC4253, RFC4252, RFC8332, RFC5903, RFC5656, RFC4419, RFC8268, RFC5647, RFC2104, RFC4251, RFC6668, RFC2898, RFC5246, RFC5288, RFC8446, RFC5289, RFC84468, RFC 8446, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509Technical reports
BSI TR-02102File metadata
| Title | Certification Report BSI-DSZ-CC-1230-2026 |
|---|---|
| Subject | Common Criteria, Certification, Zertifizierung, Protection Profile for General Purpose Operating Systems, Linux-based, SSH, TLS |
| Keywords | "Common Criteria, Certification, Zertifizierung, Protection Profile for General Purpose Operating Systems, Linux-based, SSH, TLS" |
| Author | Federal Office for Information Security |
| Pages | 29 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1230-2026 |
|---|---|
| Certified item | SUSE Linux Enterprise Server Version 15 SP7 |
| Certification lab | BSI |
| Developer | SUSE LLC |
Security target
Extracted keywords
Symmetric Algorithms
AES, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CBC-MACAsymmetric Algorithms
ECDH, ECDHE, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-256, SHA-384, SHA-512, PBKDFSchemes
MAC, Key AgreementProtocols
SSH, SSHv2, SSL, TLS, TLSv1.2, TLS v1.2, TLS 1.1, TLS 1.2, TLSv1.0, TLSv1.1, DTLS, PGPRandomness
PRNG, DRBG, RNG, RBGLibraries
OpenSSL, libgcryptElliptic Curves
P-384, P-521, secp384r1, secp521r1Block cipher modes
CBC, CTR, GCM, CCM, XTSTLS cipher suites
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384Vendor
MicrosoftClaims
O.ACCOUNTABILITY, O.INTEGRITY, O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.LOCAL_ATTACK, T.LIMITED_PHYSICAL_ACCESS, A.PLATFORM, A.PROPER_USER, A.PROPER_ADMIN, OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMINSecurity Assurance Requirements (SAR)
ALC_TSU_EXT.1, ALC_TSU_EXTSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_COP, FCS_RBG_EXT.1, FCS_STO_EXT.1, FCS_TLS_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSC_EXT.5, FCS_SSH_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_RBG_EXT.1.2, FCS_TLSS_EXT.1.1, FCS_SSHS_EXT.1.3, FCS_COP.1, FCS_SSH_EXT, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_RBG_EXT.1.1, FCS_RNG.1, FCS_RNG.1.2, FCS_STO_EXT.1.1, FCS_TLS_EXT.1.1, FCS_TLSC_EXT, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_SSH_EXT.1.8, FCS_SSHC_EXT, FCS_SSHS_EXT, FCS_STO_EXT, FCS_RBG_EXT, FCS_CKM, FCS_CKM_EXT, FDP_ACF_EXT.1, FDP_ACF_EXT.1.1, FDP_ACF_EXT, FIA_AFL.1, FIA_UAU.5, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_AFL, FIA_UAU, FMT_MOF_EXT.1, FMT_SMF_EXT.1, FMT_SMF_EXT.1.1, FMT_MOF_EXT, FMT_SMF_EXT, FPT_ACF_EXT.1, FPT_ASLR_EXT.1, FPT_SBOP_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_ACF_EXT.1.1, FPT_ACF_EXT.1.2, FPT_ASLR_EXT, FPT_SBOP_EXT, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_TUD_EXT, FPT_ACF_EXT, FPT_TST_EXT, FTA_TAB.1, FTA_TAB.1.1, FTA_TAB, FTP_ITC_EXT.1, FTP_TRP.1, FTP_TRP.1.3, FTP_ITC_EXT.1.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_ITC_EXT, FTP_TRPCertificates
BSI-DSZ-CC-1230Evaluation facilities
atsecSide-channel analysis
Bleichenbacher AttackCertification process
out of scope, The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER PP Origin: OSPP The user of the OS is not willfully negligent or hostileStandards
FIPS 186-4, FIPS 186-5, FIPS PUB 186-5, FIPS 140, NIST SP 800-38A, NIST SP 800-38E, NIST SP 800-38D, NIST SP 800-57, NIST SP 800-56A, RFC 5246, RFC 5288, RFC 5289, RFC 6125, RFC 4252, RFC 8332, RFC 5656, RFC 4253, RFC 5647, RFC 6668, RFC 8268, RFC 4251, RFC 5280, RFC 8603, RFC4253, RFC5656, RFC4252, RFC5280, RFC8603, X.509File metadata
| Title | SUSE Linux Enterprise Server 15 SP7 Security Target (version 1.0 as of 2026-02-23) |
|---|---|
| Subject | SUSE Linux Enterprise Server |
| Keywords | SLES, operating system |
| Author | SUSE supported by atsec consultants (generated by CCTool version 2.8.4.66) |
| Pages | 65 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1230-2026Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1Scheme data
| Cert Id | BSI-DSZ-CC-1230-2026 | |
|---|---|---|
| Product | SUSE Linux Enterprise Server, Version 15 SP7 | |
| Vendor | SUSE LLC | |
| Certification Date | 24.02.2026 | |
| Category | Operating systems | |
| Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1230.html | |
| Enhanced | ||
| Product | SUSE Linux Enterprise Server, Version 15 SP7 | |
| Applicant | SUSE LLC 1221 S Valley Grove Way #500, Pleasant Grove UT 84062 United States | |
| Evaluation Facility | atsec information security GmbH | |
| Protection Profile | U.S. Government Approved Protection Profile - Protection Profile for General Purpose Operating Systems, Version 4.3, 27 September 2022, CCEVS-VR-PP-0091; Functional Package for Transport Layer Security (TLS), Version 1.1, 12 Februar 2019, NIAP; Functional Package for Secure Shell (SSH), Version 1.0, 13 May 2021, CCEVS-VR-PP-0075, NIAP; | |
| Certification Date | 24.02.2026 | |
| Expiration Date | 23.02.2031 | |
| Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1230a_pdf.pdf?__blob=publicationFile&v=2 | |
| Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1230b_pdf.pdf?__blob=publicationFile&v=2 | |
| Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1230c_pdf.pdf?__blob=publicationFile&v=2 | |
| Description | SUSE Linux Enterprise Server 15 SP17 is a highly-configurable Linux-based operating system that has been developed to provide a good level of security as required in commercial environments. It also meets all requirements of the General Purpose Operating System Protection Profile together with the Functional Package for SSH Version 1.0 as well as the Functional Package for TLS Version 1.1. | |
References
No references are available for this certificate.
Updates Feed
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1230c_pdf.pdf",
"dgst": "553481e36a435b41",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1230-2026",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL1",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TSU_EXT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"15"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"3d6ad6fde534f6c6",
"ed9c9d74c3710878",
"c40ae795865a0dba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Operating systems",
"cert_id": "BSI-DSZ-CC-1230-2026",
"certification_date": "2026-02-24",
"enhanced": {
"applicant": "SUSE LLC 1221 S Valley Grove Way #500, Pleasant Grove UT 84062 United States",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1230c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2026-02-24",
"description": "SUSE Linux Enterprise Server 15 SP17 is a highly-configurable Linux-based operating system that has been developed to provide a good level of security as required in commercial environments. It also meets all requirements of the General Purpose Operating System Protection Profile together with the Functional Package for SSH Version 1.0 as well as the Functional Package for TLS Version 1.1.",
"evaluation_facility": "atsec information security GmbH",
"expiration_date": "2031-02-23",
"product": "SUSE Linux Enterprise Server, Version 15 SP7",
"protection_profile": "U.S. Government Approved Protection Profile - Protection Profile for General Purpose Operating Systems, Version 4.3, 27 September 2022, CCEVS-VR-PP-0091; Functional Package for Transport Layer Security (TLS), Version 1.1, 12 Februar 2019, NIAP; Functional Package for Secure Shell (SSH), Version 1.0, 13 May 2021, CCEVS-VR-PP-0075, NIAP;",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1230a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1230b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "SUSE Linux Enterprise Server, Version 15 SP7",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1230.html",
"vendor": "SUSE LLC"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SUSE LLC",
"manufacturer_web": "https://www.suse.com",
"name": "SUSE Linux Enterprise Server, Version 15 SP7",
"not_valid_after": "2031-02-24",
"not_valid_before": "2026-02-24",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1230c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1230-2026": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_FLR": 1,
"ALC_TSU_EXT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
},
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1230a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 extended ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1 valid until: 23 February 2031",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1230-2026",
"cert_item": "SUSE Linux Enterprise Server Version 15 SP7",
"cert_lab": "BSI",
"developer": "SUSE LLC",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "U.S. Government Approved Protection Profile - Protection Profile for General Purpose Operating Systems, Version 4.3, 27 September 2022, CCEVS-VR-PP-0091, Functional Package for Transport Layer Security (TLS), Version 1.1, 12 Februar 2019, NIAP, Functional Package for Secure Shell (SSH), Version 1.0, 13 May 2021, CCEVS-VR-PP-0075, NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 7
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1230-2026": 16
}
},
"cc_claims": {
"OE": {
"OE.PLATFORM": 1,
"OE.PROPER_ADMIN": 1,
"OE.PROPER_USER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.1": 2,
"ALC_CMS.1": 2,
"ALC_FLR": 3,
"ALC_TSU_EXT.1": 3
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND.1": 2
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 3
}
},
"cc_sfr": {
"FTP": {
"FTP_ITC_EXT.1": 2
}
},
"certification_process": {
"ConfidentialDocument": {
"Evaluation Technical Report, Version 5, Date 23 February 2026, atsec information security GmbH (confidential document) [7] Protection Profile for General Purpose Operating Systems, Version 4.3, 27 September 2022": 1,
"March 2019, NIAP [10] Configuration list for the TOE, Master Configuration List, as of 2026-02-23 (confidential document) [11] Guidance documentation for the TOE, Common Criteria Evaluated Configuration Guide for SUSE": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 10
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKE": 1,
"IKEv2": 1
},
"SSH": {
"SSH": 21,
"SSHv2": 1
},
"TLS": {
"TLS": {
"TLS": 17,
"TLS 1.2": 1,
"TLS 1.3": 1,
"TLS v1.2": 2
}
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"KEX": {
"KEX": 1,
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-384": 3,
"P-384": 7,
"P-521": 10
}
},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {
"PBKDF": {
"PBKDF2": 2
},
"SHA": {
"SHA2": {
"SHA-2": 6,
"SHA-256": 2,
"SHA-384": 1,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1
},
"FIPS": {
"FIPS 186-5": 2,
"FIPS180-4": 10,
"FIPS186-5": 6,
"FIPS197": 3,
"FIPS198-1": 4
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC 8446": 1,
"RFC2104": 2,
"RFC2898": 2,
"RFC4251": 2,
"RFC4252": 3,
"RFC4253": 6,
"RFC4419": 2,
"RFC5246": 5,
"RFC5288": 3,
"RFC5289": 2,
"RFC5647": 3,
"RFC5656": 3,
"RFC5903": 2,
"RFC6668": 2,
"RFC8017": 4,
"RFC8268": 2,
"RFC8332": 2,
"RFC8446": 1,
"RFC84468": 1
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 10,
"AES-": 1
}
},
"constructions": {
"MAC": {
"HMAC": 6,
"HMAC-SHA-256": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile for General Purpose Operating Systems, Linux-based, SSH, TLS\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Protection Profile for General Purpose Operating Systems, Linux-based, SSH, TLS",
"/Title": "Certification Report BSI-DSZ-CC-1230-2026",
"pdf_file_size_bytes": 381708,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1230b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 3,
"ECDHE": 2
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1230": 1
}
},
"cc_claims": {
"A": {
"A.PLATFORM": 4,
"A.PROPER_ADMIN": 4,
"A.PROPER_USER": 4
},
"O": {
"O.ACCOUNTABILITY": 7,
"O.INTEGRITY": 18,
"O.MANAGEMENT": 9,
"O.PROTECTED_COMMS": 23,
"O.PROTECTED_STORAGE": 8
},
"OE": {
"OE.PLATFORM": 3,
"OE.PROPER_ADMIN": 2,
"OE.PROPER_USER": 3
},
"T": {
"T.LIMITED_PHYSICAL_ACCESS": 3,
"T.LOCAL_ATTACK": 2,
"T.NETWORK_ATTACK": 10,
"T.NETWORK_EAVESDROP": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_TSU_EXT": 5,
"ALC_TSU_EXT.1": 4
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 9,
"FCS_CKM.2.1": 1,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 10,
"FCS_CKM_EXT.4.1": 2,
"FCS_CKM_EXT.4.2": 1,
"FCS_COP": 49,
"FCS_COP.1": 5,
"FCS_RBG_EXT": 2,
"FCS_RBG_EXT.1": 10,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 2,
"FCS_RNG.1": 2,
"FCS_RNG.1.2": 1,
"FCS_SSHC_EXT": 1,
"FCS_SSHC_EXT.1": 8,
"FCS_SSHS_EXT": 1,
"FCS_SSHS_EXT.1": 9,
"FCS_SSHS_EXT.1.3": 1,
"FCS_SSH_EXT": 1,
"FCS_SSH_EXT.1": 14,
"FCS_SSH_EXT.1.1": 1,
"FCS_SSH_EXT.1.2": 1,
"FCS_SSH_EXT.1.3": 1,
"FCS_SSH_EXT.1.4": 1,
"FCS_SSH_EXT.1.5": 1,
"FCS_SSH_EXT.1.6": 1,
"FCS_SSH_EXT.1.7": 1,
"FCS_SSH_EXT.1.8": 1,
"FCS_STO_EXT": 1,
"FCS_STO_EXT.1": 8,
"FCS_STO_EXT.1.1": 1,
"FCS_TLSC_EXT": 5,
"FCS_TLSC_EXT.1": 11,
"FCS_TLSC_EXT.2": 9,
"FCS_TLSC_EXT.5": 9,
"FCS_TLSS_EXT.1.1": 1,
"FCS_TLS_EXT.1": 9,
"FCS_TLS_EXT.1.1": 1
},
"FDP": {
"FDP_ACF_EXT": 1,
"FDP_ACF_EXT.1": 8,
"FDP_ACF_EXT.1.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1
},
"FMT": {
"FMT_MOF_EXT": 2,
"FMT_MOF_EXT.1": 8,
"FMT_SMF_EXT": 1,
"FMT_SMF_EXT.1": 9,
"FMT_SMF_EXT.1.1": 2
},
"FPT": {
"FPT_ACF_EXT": 1,
"FPT_ACF_EXT.1": 8,
"FPT_ACF_EXT.1.1": 1,
"FPT_ACF_EXT.1.2": 1,
"FPT_ASLR_EXT": 2,
"FPT_ASLR_EXT.1": 8,
"FPT_SBOP_EXT": 1,
"FPT_SBOP_EXT.1": 10,
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 8,
"FPT_TST_EXT.1.1": 1,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 9,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.2": 8,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 1
},
"FTA": {
"FTA_TAB": 1,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC_EXT": 3,
"FTP_ITC_EXT.1": 8,
"FTP_ITC_EXT.1.1": 1,
"FTP_TRP": 1,
"FTP_TRP.1": 8,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 2
}
},
"certification_process": {
"OutOfScope": {
"The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER PP Origin: OSPP The user of the OS is not willfully negligent or hostile": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 1
},
"CTR": {
"CTR": 2
},
"GCM": {
"GCM": 2
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 9
},
"libgcrypt": {
"libgcrypt": 2
}
},
"crypto_protocol": {
"PGP": {
"PGP": 1
},
"SSH": {
"SSH": 106,
"SSHv2": 3
},
"TLS": {
"DTLS": {
"DTLS": 1
},
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 107,
"TLS 1.1": 2,
"TLS 1.2": 2,
"TLS v1.2": 1,
"TLSv1.0": 1,
"TLSv1.1": 1,
"TLSv1.2": 4
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-384": 16,
"P-521": 16,
"secp384r1": 2,
"secp521r1": 2
}
},
"eval_facility": {
"atsec": {
"atsec": 1
}
},
"hash_function": {
"PBKDF": {
"PBKDF": 1
},
"SHA": {
"SHA2": {
"SHA-256": 6,
"SHA-384": 6,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 5,
"PRNG": 1
},
"RNG": {
"RBG": 2,
"RNG": 6
}
},
"side_channel_analysis": {
"other": {
"Bleichenbacher Attack": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 186-4": 2,
"FIPS 186-5": 1,
"FIPS PUB 186-5": 5
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38D": 2,
"NIST SP 800-38E": 2,
"NIST SP 800-56A": 1,
"NIST SP 800-57": 1
},
"RFC": {
"RFC 4251": 1,
"RFC 4252": 6,
"RFC 4253": 5,
"RFC 5246": 11,
"RFC 5280": 3,
"RFC 5288": 2,
"RFC 5289": 4,
"RFC 5647": 1,
"RFC 5656": 9,
"RFC 6125": 2,
"RFC 6668": 2,
"RFC 8268": 2,
"RFC 8332": 6,
"RFC 8603": 1,
"RFC4252": 4,
"RFC4253": 4,
"RFC5280": 1,
"RFC5656": 2,
"RFC8603": 1
},
"X509": {
"X.509": 14
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"HMAC": 4,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "SUSE supported by atsec consultants (generated by CCTool version 2.8.4.66)",
"/Keywords": "SLES, operating system",
"/Subject": "SUSE Linux Enterprise Server",
"/Title": "SUSE Linux Enterprise Server 15 SP7 Security Target (version 1.0 as of 2026-02-23)",
"pdf_file_size_bytes": 883405,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.niap-ccevs.org/technical-decisions/TD0712",
"https://www.suse.com/support/security/",
"https://www.niap-ccevs.org/technical-decisions/TD0739",
"https://www.niap-ccevs.org/technical-decisions/TD0789",
"https://www.niap-ccevs.org/technical-decisions/TD0696",
"https://www.niap-ccevs.org/technical-decisions/TD0693",
"https://www.niap-ccevs.org/technical-decisions/TD0844",
"https://www.niap-ccevs.org/protectionprofiles/439",
"https://www.niap-ccevs.org/technical-decisions/TD0469",
"https://www.niap-ccevs.org/technical-decisions/TD0695",
"https://www.niap-ccevs.org/technical-decisions/TD0726",
"https://www.niap-ccevs.org/technical-decisions/TD0904",
"https://www.niap-ccevs.org/technical-decisions/TD0777",
"https://www.suse.com/support/update/",
"https://www.niap-ccevs.org/technical-decisions/TD0955",
"http://tools.ietf.org/html/rfc5656",
"https://www.niap-ccevs.org/technical-decisions/TD0839",
"https://www.niap-ccevs.org/technical-decisions/TD0770",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf",
"https://www.niap-ccevs.org/technical-decisions/TD0442",
"http://tools.ietf.org/html/rfc4253",
"https://www.niap-ccevs.org/technical-decisions/TD0821",
"https://www.niap-ccevs.org/protectionprofiles/459",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf",
"https://www.niap-ccevs.org/technical-decisions/TD0812",
"https://www.niap-ccevs.org/technical-decisions/TD0773",
"https://www.suse.com/support/security/contact/",
"https://www.niap-ccevs.org/technical-decisions/TD0713",
"https://www.niap-ccevs.org/technical-decisions/TD0930",
"https://www.niap-ccevs.org/technical-decisions/TD0906",
"https://www.niap-ccevs.org/technical-decisions/TD0512",
"https://www.niap-ccevs.org/technical-decisions/TD0691",
"https://www.niap-ccevs.org/technical-decisions/TD0732",
"http://tools.ietf.org/html/rfc4252",
"https://www.niap-ccevs.org/technical-decisions/TD0779",
"https://www.niap-ccevs.org/technical-decisions/TD0499",
"https://www.niap-ccevs.org/technical-decisions/TD0682",
"https://www.niap-ccevs.org/protectionprofiles/469",
"https://www.niap-ccevs.org/technical-decisions/TD0873",
"https://www.niap-ccevs.org/technical-decisions/TD0675",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf",
"https://www.niap-ccevs.org/technical-decisions/TD0701"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 65
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1230a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1230b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "1ab7c93189b7ec797ceeb448302cf2544873cf9fb215505cd092b5123b954a12",
"txt_hash": "417f3b36cdfd4f3e0a586aeab86a84f328df7dbe2aa0a6e45786f257d6744d58"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "156481d76f32afcaa543bdb7a73f2272b00d738ad28bf916bf1740847c1e7be8",
"txt_hash": "ab8648a8e526fc4eb4d5f0617a2a478742d1afbeb5dd26cb5a62b1a5ed2d7bbd"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "420a77e5b3ece2a0f85b6d5d013d3cb15f49249b57e3a24735f2baa34219e355",
"txt_hash": "361bdbbdf48b5df79fdee0eb409df522f6ac46cd65e93dbb63c97556646d2272"
}
},
"status": "active"
}