This page was not yet optimized for use on mobile devices.
Kaspersky Endpoint Security for Windows (version 11.0.0. 6499 AES256)
CSV information ?
Status | archived |
---|---|
Valid from | 01.05.2019 |
Valid until | 01.05.2024 |
Scheme | 🇪🇸 ES |
Manufacturer | Kaspersky Lab UK Ltd. |
Category | Other Devices and Systems |
Security level | EAL2+, ALC_FLR.1 |
Heuristics summary ?
Certificate ID: 2018-37-INF-2718
Certificate ?
Extracted keywords
Symmetric Algorithms
AES256Security level
EAL 4, EAL 2, EAL2Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.1File metadata
Pages | 2 |
---|
Certification report ?
Extracted keywords
Symmetric Algorithms
AES256, HMACVendor
MicrosoftSecurity level
EAL2, EAL 1, EAL 4, EAL 2, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FDP_ACC.1, FDP_IFC.1, FDP_ACF.1, FDP_IFF.1, FIA_UAU.2, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1Certificates
2018-37-INF-2718-v2File metadata
Pages | 17 |
---|
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES256, HMACHash functions
SHA256, SHA-256, PBKDF, PBKDF2Protocols
SSL, TLSBlock cipher modes
ECB, XTSVendor
MicrosoftSecurity level
EAL 2+, EAL2, EAL2 augmentedClaims
O.ACCESS_DV, O.LAUNCH, O.WEBACC, O.SECURE_DATA, O.SECURE_MANAGEMENT, O.VIRUS, O.SECURE_, O.ACCESS_, T.ACCESS_DD, T.ACCESS_CD, T.ACCESS_KD, T.KEY_DISCLOSURE, A.PROTECT_ACCESS, A.AUTHORISED_USER, A.SECURE_SERVER, A.SECURE_OPER, A.PROTECT_PASSWD, A.TRUST_ADMIN, OE.PROTECT_ACCESS, OE.AUTHORISED_USER, OE.SECURE_SERVER, OE.SECURE_OPER, OE.PROTECT_PASSWD, OE.TRUST_ADMINSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.4.1, FCS_CKM.2, FDP_ACC.1, FDP_IFC.1, FDP_ACF.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.2, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2Certification process
out of scope, this rule type is out of scope of evaluation, path, application properties, application`s digital signature parameters, application category (out of scope of evalutation), active user. P a g e | 43 This metadata then are compared to active Application, the one selected in the rule. Content categories are described in User Manual (this rule type is out of scope of evaluation). • By type of data. When object is being downloaded from network its source URL is, • By content categories and types of data. Two above mentioned checks together (this rule type is out of scope of evaluation). Multiple rules can be defined with relative priority, they will be applied based onCertification process
out of scope, this rule type is out of scope of evaluation, path, application properties, application`s digital signature parameters, application category (out of scope of evalutation), active user. P a g e | 43 This metadata then are compared to active Application, the one selected in the rule. Content categories are described in User Manual (this rule type is out of scope of evaluation). • By type of data. When object is being downloaded from network its source URL is, • By content categories and types of data. Two above mentioned checks together (this rule type is out of scope of evaluation). Multiple rules can be defined with relative priority, they will be applied based onStandards
FIPS 180-4, FIPS 197, FIPS PUB 197, FIPS 198-1, FIPS PUB 198-1, NIST SP 800-90A, SP 800-132, NIST SP 800-38E, NIST SP 800-38A, PKCS#1, PKCS #1, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001, CCMB-2017-04-004File metadata
Pages | 47 |
---|
Heuristics ?
Certificate ID: 2018-37-INF-2718
Extracted SARs
ASE_CCL.1, AGD_PRE.1, ASE_REQ.2, ASE_TSS.1, ATE_COV.1, ATE_IND.2, ADV_FSP.2, ASE_ECD.1, ALC_CMS.2, ASE_SPD.1, ALC_DEL.1, ADV_TDS.1, ASE_INT.1, ALC_CMC.2, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.2, ALC_FLR.1, ADV_ARC.1, AGD_OPE.1References ?
No references are available for this certificate.
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Kaspersky Endpoint Security for Windows (version 11.0.0. 6499 AES256) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-37-CCRA.pdf",
"dgst": "95aca571d3f6e474",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2018-37-INF-2718",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"11.0.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Kaspersky Lab UK Ltd.",
"manufacturer_web": "https://www.kaspersky.co.uk/",
"name": "Kaspersky Endpoint Security for Windows (version 11.0.0. 6499 AES256)",
"not_valid_after": "2024-05-01",
"not_valid_before": "2019-05-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2018-37-CCRA.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 2,
"ALC_FLR.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES256": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 900250,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "2018-37-INF-2718.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2018-37-INF-2718-v2": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 2,
"ALC_FLR.1": 6
},
"ASE": {
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 6
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 1,
"FCS_COP.1": 4
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_ACF.1": 3,
"FDP_IFC.1": 1,
"FDP_IFF.1": 1
},
"FIA": {
"FIA_UAU.2": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MSA.1": 4,
"FMT_MSA.3": 4,
"FMT_MTD.1": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES256": 10
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 10
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 856084,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "2018-37-ST_lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUTHORISED_USER": 4,
"A.PROTECT_ACCESS": 4,
"A.PROTECT_PASSWD": 4,
"A.SECURE_OPER": 4,
"A.SECURE_SERVER": 4,
"A.TRUST_ADMIN": 4
},
"O": {
"O.ACCESS_": 1,
"O.ACCESS_DV": 5,
"O.LAUNCH": 5,
"O.SECURE_": 2,
"O.SECURE_DATA": 7,
"O.SECURE_MANAGEMENT": 2,
"O.VIRUS": 5,
"O.WEBACC": 6
},
"OE": {
"OE.AUTHORISED_USER": 4,
"OE.PROTECT_ACCESS": 5,
"OE.PROTECT_PASSWD": 3,
"OE.SECURE_OPER": 3,
"OE.SECURE_SERVER": 6,
"OE.TRUST_ADMIN": 3
},
"T": {
"T.ACCESS_CD": 3,
"T.ACCESS_DD": 4,
"T.ACCESS_KD": 3,
"T.KEY_DISCLOSURE": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.1": 8
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2+": 1,
"EAL2": 7,
"EAL2 augmented": 3
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 25,
"FCS_CKM.2": 2,
"FCS_CKM.4": 18,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 33,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC.1": 37,
"FDP_ACF.1": 35,
"FDP_IFC.1": 13,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 8,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5
},
"FIA": {
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 40,
"FMT_MSA.3": 42,
"FMT_MTD.1": 16,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 24,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 3,
"path, application properties, application`s digital signature parameters, application category (out of scope of evalutation), active user. P a g e | 43 This metadata then are compared to active Application": 1,
"the one selected in the rule. Content categories are described in User Manual (this rule type is out of scope of evaluation). \u2022 By type of data. When object is being downloaded from network its source URL is": 1,
"this rule type is out of scope of evaluation": 2,
"\u2022 By content categories and types of data. Two above mentioned checks together (this rule type is out of scope of evaluation). Multiple rules can be defined with relative priority, they will be applied based on": 1
}
},
"cipher_mode": {
"ECB": {
"ECB": 1
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 5
},
"TLS": {
"TLS": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF": 1,
"PBKDF2": 3
},
"SHA": {
"SHA2": {
"SHA-256": 2,
"SHA256": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 197": 1,
"FIPS 198-1": 1,
"FIPS PUB 197": 1,
"FIPS PUB 198-1": 1
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38E": 1,
"NIST SP 800-90A": 2,
"SP 800-132": 1
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8,
"AES256": 1
}
},
"constructions": {
"MAC": {
"HMAC": 8
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 8
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 559657,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 47
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/2018-37-INF-2718.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/2018-37-ST_lite.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4f65141224053e782b81b1bae5c6818b9c20f473c4df790a962d87827d504d6a",
"txt_hash": "60fdcce2b9789d6e406b2f4db180b3e15bf654348e33de3acbc6fadea30eab23"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e5a8b0147f7511e5289d00614a5d6d995d5feff45c4940287196f91a838a669b",
"txt_hash": "d1d723fdb7b5b00d3ecfb8ecc43e2237c780d258c90fb4a948432b28b349f786"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5796774f5675675de9e6e19a06bc1d9a9421896c8486c49b8a6ea3aa98b73961",
"txt_hash": "7d5a735f3902f179ed3a809752c9b29e366c782952b49ae696300a53c49bf005"
}
},
"status": "archived"
}