{"_id": "572478fcd6b79542", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "572478fcd6b79542", "status": "archived", "category": "Boundary Protection Devices and Systems", "name": "Valari Web Application Firewall v10.3.11", "manufacturer": "Kaapagam Technologies Sdn. Bhd.", "scheme": "MY", "security_level": {"_type": "Set", "elements": ["EAL2"]}, "not_valid_before": "2017-11-24", "not_valid_after": "2022-11-24", "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C083-CR-v1.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Valari_Security_Target_0.5.pdf", "cert_link": null, "manufacturer_web": "https://www.kaapagamtech.com/", "protection_profile_links": {"_type": "Set", "elements": []}, "maintenance_updates": {"_type": "Set", "elements": []}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "bad0e524291745b6c4d01d520dbc4cd1c7c9c96aebbe777e6e2c98621630194a", "txt_hash": "52f98b501949ecdd65aa489aeb000ddae184022453b470bab247ff97c489a2a5", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "40037552bb1ed2335629b5fc6412cfcd8ddf766c8224d302f97914d714f40ad2", "txt_hash": "1a1ad96eda29a1a9f24a11ef9e2a861d17859996b90ba699444e84e2a16d5ef7", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null, "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 983010, "pdf_is_encrypted": false, "pdf_number_of_pages": 34, "/Title": "C083 Certification Report", "/Author": "ISCB Department", "/Subject": "Valari Web Application Firewall v10.3.11", "/Keywords": "MyCB_TMP_002", "/Creator": "Microsoft Word", "/CreationDate": "D:20171204082900+00'00'", "/ModDate": "D:20171204082900+00'00'", "pdf_hyperlinks": {"_type": "Set", "elements": ["mailto:mycc@cybersecurity.my", "http://www.cybersecurity.my/mycc"]}}, "st_metadata": {"pdf_file_size_bytes": 525664, "pdf_is_encrypted": false, "pdf_number_of_pages": 35, "/Author": "AD", "/Subject": "Valari Security Target", "/Producer": "Mac OS X 10.11.4 Quartz PDFContext", "/Creator": "Microsoft\u00ae Word 2010", "/CreationDate": "D:20171102074055Z00'00'", "/ModDate": "D:20171102074055Z00'00'", "pdf_hyperlinks": {"_type": "Set", "elements": []}}, "cert_metadata": null, "report_frontpage": {}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {"MY": {"ISCB-3-RPT-C083-CR-v1": 33}}, "cc_protection_profile_id": {}, "cc_security_level": {"EAL": {"EAL2": 7}}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {"SSH": {"SSH": 10}, "TLS": {"SSL": {"SSL": 1}}}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"ISO": {"ISO/IEC15408": 2, "ISO/IEC 18045": 2}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "st_keywords": {"cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {"EAL": {"EAL2": 3}}, "cc_sar": {"ADV": {"ADV_ARC.1": 1, "ADV_FSP.2": 1, "ADV_TDS.1": 1}, "AGD": {"AGD_OPE.1": 1, "AGD_PRE.1": 1}, "ALC": {"ALC_CMC.2": 1, "ALC_CMS.2": 1, "ALC_DEL.1": 1}, "ATE": {"ATE_COV.1": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1}, "AVA": {"AVA_VAN.2": 1}, "ASE": {"ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.2": 1, "ASE_REQ.2": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1}}, "cc_sfr": {"FAU": {"FAU_GEN.3": 15, "FAU_SAR.1": 7, "FAU_SAR.3": 6, "FAU_STG.1": 7, "FAU_GEN": 3, "FAU_GEN.1.1": 1, "FAU_GEN.1": 3, "FAU_GEN.3.1": 2, "FAU_GEN.3.2": 2, "FAU_SAR.1.1": 1, "FAU_SAR.1.2": 1, "FAU_SAR.3.1": 1, "FAU_STG.1.1": 1, "FAU_STG.1.2": 1}, "FCS": {"FCS_COP.1": 1}, "FDP": {"FDP_IFC.1": 9, "FDP_IFF.1": 8, "FDP_IFC.1.1": 1, "FDP_IFF.1.1": 2, "FDP_IFF.1.2": 1, "FDP_IFF.1.3": 1, "FDP_IFF.1.4": 1, "FDP_IFF.1.5": 1, "FDP_ACC.1": 2}, "FIA": {"FIA_ATD.1": 6, "FIA_UAU.2": 7, "FIA_UID.2": 11, "FIA_ATD.1.1": 1, "FIA_UAU.1": 1, "FIA_UID.1": 6, "FIA_UAU.2.1": 1, "FIA_UID.2.1": 1}, "FMT": {"FMT_MSA.5": 12, "FMT_MOF.1": 6, "FMT_MTD.1": 6, "FMT_SMF.1": 11, "FMT_SMR.1": 14, "FMT_MSA.1": 8, "FMT_MSA": 3, "FMT_MSA.3": 3, "FMT_MSA.5.1": 2, "FMT_MOF.1.1": 2, "FMT_MTD.1.1": 1, "FMT_SMF.1.1": 1, "FMT_SMR.1.1": 1, "FMT_SMR.1.2": 1, "FMT_MSA.1.1": 1}, "FPT": {"FPT_STM.2": 1, "FPT_STM.1": 3}}, "cc_claims": {"O": {"O.ACCESSLOG": 3, "O.AUDIT": 3, "O.EXPLOIT": 3, "O.CONFIG": 4, "O.NOAUTH": 3}, "T": {"T.ACCESSLOG": 2, "T.AUDIT": 2, "T.EXPLOIT": 2, "T.REMOTE": 2, "T.CONFIG": 2, "T.NOAUTH": 2}, "A": {"A.PHY": 2, "A.FLOW": 2, "A.CONFIGRULE": 2, "A.KEY": 2, "A.TIME": 1, "A.CONN": 2, "A.ADMIN": 2, "A.TIMEBACK": 1}, "OE": {"OE.PHY": 2, "OE.FLOW": 2, "OE.CONFIGRULE": 2, "OE.KEY": 3, "OE.TIMEBACK": 2, "OE.CONN": 3, "OE.ADMIN": 2}}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {"SSH": {"SSH": 15}, "TLS": {"SSL": {"SSL": 1}}}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "cert_keywords": null, "report_filename": "ISCB-5-RPT-C083-CR-v1.pdf", "st_filename": "Valari_Security_Target_0.5.pdf", "cert_filename": null}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["10.3.11"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": "ISCB-3-RPT-C083-CR-v1", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 2}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": {"cert_no": "2017-009-C083", "developer": "Kaapagam Technologies Sdn Bhd.", "level": "EAL2", "product": "Valari Web Application Firewall v10.3.11", "certification_date": "2017-11-24", "expiration_date": "2022-11-24", "recognition": "CCRA", "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/58", "enhanced": {"developer": "B15-15, I-SOVO@I-City No. 6, Persiaran Multimedia, Section 7 40000 Shah Alam, Selangor Darul Ehsan URL: Valari Web Application Firewall Email: sales@kaapagamtech.com Phone: +603 8992 3172", "status": "Archive", "scope": "The TOE is designed to secure web applications from the attacks and provide a security layer by proxy-ing all HTTP(S) traffic and shield web servers and databases from direct access of the attackers irrespective of the underlying application vulnerabilities. The TOE primary features include: Identification and Authentication: The TOE enables audit functionality to tracks all activities within the TOE boundary network inclusive of its own operations as TOE Application Server. User Data Protection: The TOE protects the web application from external network intrusions by using information flow control between internal and external network. The TOE will log all HTTP requests and responses before allowing or rejecting the HTTP requests. Security Management: TOE functions can be managed through command-line interface. The TOE only allows limited user access to run a limited set of commands. These do not affect the running mode of the TOE. Security Audit: The TOE will generate audit records for HTTP Request and responses. Each audited events will be recorded along with date and time of event, source IP, account user who performed the event, event name, system filename related to event and other event details.", "cert_id": "C083", "category": "Boundary Protection Devices and Systems", "assurance_level": "EAL2", "product": "Valari Web Application Firewall v10.3.11", "certification_date": "2017-11-24", "expiration_date": "2022-11-24", "mutual_recognition": "CCRA", "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/Valari_Security_Target_0.5.pdf", "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/ISCB-5-RPT-C083-CR-v1.pdf", "type": "Boundary Protection Devices and Systems"}}, "protection_profiles": null, "eal": "EAL2"}}