RSA Archer GRC Platform version 6.1

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 14.09.2016
Valid until 14.09.2021
Scheme 🇲🇾 MY
Manufacturer RSA, The Security Division of EMC
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.2, EAL2+

Heuristics summary ?

Certificate ID: ISCB-3-RPT-C073-CR-v1

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Security level
EAL 2+, EAL2+
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
ISCB-3-RPT-C073-CR-v1

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Title C073 Certification Report
Subject RSA Archer GRC Platform v6.1
Keywords MyCB_TMP_002
Author ISCB Department
Creation date D:20160919032647Z
Modification date D:20160919115230+08'00'
Pages 30
Creator Microsoft Word

Security target ?

Extracted keywords

Vendor
Microsoft

Security level
EAL2, EAL 2, EAL 2 augmented
Claims
O.ACCESS_CONTROL, O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.LOGON_BANNER, O.PASSWORD_CONTROLS, O.SECURITY_MANAGEMENT, O.SESSION_LIMITATION, O.SESSION_TERMINATION, O.THROTTLE, O.SECURITY_MANAGE, T.BRUTE_FORCE, T.DATA_COMPROMISE, T.INAPPROPRIATE_USE, T.NO_ACCOUNTABILITY, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, T.UNAUTHORIZED_ACTIVIT, T.INAPPRORIATE_USE, A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, OE.PHYSICAL, OE.PERSONNEL, OE.SECURE_COMMS, OE.TIME
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_FLR.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MSA, FMT_MTD, FMT_REV, FMT_SMF, FMT_SMR, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTA_TAB.1, FTA_TAB.1.1, FTA_TSE.1, FTA_TSE.1.1

File metadata

Title RSA Archer GRC
Subject Security Target
Author Apted, Tony J. [RA]
Creation date D:20160919034256+00'00'
Modification date D:20160919034256+00'00'
Pages 41
Creator Microsoft Word

Heuristics ?

Certificate ID: ISCB-3-RPT-C073-CR-v1

Extracted SARs

AVA_VAN.2, ASE_ECD.1, ADV_TDS.1, ALC_CMC.2, ALC_DEL.1, ALC_FLR.2, ADV_FSP.2, AGD_PRE.1, ALC_CMS.2, ATE_FUN.1, ASE_REQ.2, ASE_CCL.1, ASE_OBJ.2, ADV_ARC.1, ATE_COV.1, ATE_IND.2, ASE_SPD.1, AGD_OPE.1, ASE_INT.1, ASE_TSS.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2017-14369
C M N
MEDIUM 4.3 1.4 11.10.2017 19:29
CVE-2017-14370
C M N
MEDIUM 5.4 2.7 11.10.2017 19:29
CVE-2017-14371
C M N
MEDIUM 6.1 2.7 11.10.2017 19:29
CVE-2017-14372
C M N
MEDIUM 6.1 2.7 11.10.2017 19:29
CVE-2018-11059
C M N
MEDIUM 5.4 2.7 24.07.2018 19:29
CVE-2018-11060
C M N
HIGH 8.8 5.9 24.07.2018 19:29
CVE-2018-11065
C M N
MEDIUM 4.3 1.4 24.08.2018 15:29
CVE-2018-15780
C M N
MEDIUM 6.5 3.6 03.01.2019 21:29
CVE-2019-3715
C M N
MEDIUM 5.5 3.6 13.03.2019 21:29
CVE-2019-3716
C M N
HIGH 7.8 5.9 13.03.2019 21:29
CVE-2019-3756
C M N
MEDIUM 6.5 3.6 18.09.2019 23:15
CVE-2019-3758
C M N
CRITICAL 9.8 5.9 18.09.2019 23:15
CVE-2020-5331
C M N
MEDIUM 5.5 3.6 04.05.2020 19:15
CVE-2020-5332
C M N
HIGH 7.2 5.9 04.05.2020 19:15
CVE-2020-5333
C M N
MEDIUM 4.3 1.4 04.05.2020 19:15
CVE-2020-5334
C M N
MEDIUM 6.1 2.7 04.05.2020 19:15
CVE-2020-5335
C M N
HIGH 8.8 5.9 04.05.2020 19:15
CVE-2020-5336
C M N
MEDIUM 6.1 2.7 04.05.2020 19:15
CVE-2020-5337
C M N
MEDIUM 6.1 2.7 04.05.2020 19:15
CVE-2021-33615
C M N
HIGH 7.5 5.9 02.06.2022 14:15
CVE-2021-33616
C M N
MEDIUM 5.4 2.7 04.04.2022 12:15
CVE-2021-38362
C M N
MEDIUM 6.5 3.6 30.03.2022 22:15
CVE-2021-41594
C M N
MEDIUM 6.5 3.6 30.03.2022 00:15
CVE-2022-26947
C M N
MEDIUM 5.4 2.7 30.03.2022 00:15
CVE-2022-26948
C M N
HIGH 7.5 3.6 30.03.2022 00:15
CVE-2022-26949
C M N
MEDIUM 6.5 3.6 30.03.2022 00:15
CVE-2022-26950
C M N
MEDIUM 6.1 2.7 30.03.2022 00:15
CVE-2022-26951
C M N
MEDIUM 6.1 2.7 30.03.2022 00:15
CVE-2022-37317
C M N
MEDIUM 5.4 2.7 25.08.2022 23:15

Scheme data ?

Cert No 2016-003-C073
Developer RSA Security LLC
Level EAL2+ ALC_FLR.2
Product RSA Archer GRC Platform version 6.1
Certification Date 14-09-2016
Expiration Date 14-09-2021
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/114
Enhanced
Cert Id C073
Product RSA Archer GRC Platform version 6.1
Developer Jon L. GoodwinManager, Federal ProgramsRSA Security LLC10700 Parkridge Blvd.Suite 600Reston, VA 20191 URL: www.rsa.comEmail: [email protected]: 469-855-5658
Category Network and Network-Related Devices and Systems
Type Network and Network related Devices and Systems
Scope It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. The following security functions are implemented by the TOE: Security Audit User Data Protection Identification adn Authentication Security Management TOE Access
Assurance Level EAL2+ ALC_FLR.2
Certification Date 14-09-2016
Expiration Date 14-09-2021
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/RSA%20Archer%20ST%20v1.0%20-clean.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/ISCB-5-RPT-C073-CR-v1.pdf
Status Archive

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f493566f85e002e83324295aff98c227155123cea46ff73d9b92868685644059', 'txt_hash': '512fed3b69e4ecda51c3b41d6df2bc804833229db3d89125729673e6f4c9b57c'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '43f6befb48745f5208bd6286469b1b35f5b1a2e6038ceac83f2277b0c640fc2b', 'txt_hash': 'ae27d1e37f140bfbd680ec5f7151ca3be372120166ab540c516c6272a1b664ab'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 656895, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Author': 'ISCB Department', '/CreationDate': 'D:20160919032647Z', '/Creator': 'Microsoft Word', '/Keywords': 'MyCB_TMP_002', '/ModDate': "D:20160919115230+08'00'", '/Subject': 'RSA Archer GRC Platform v6.1', '/Title': 'C073 Certification Report', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cybersecurity.my/mycc', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1185222, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 41, '/Title': 'RSA Archer GRC', '/Author': 'Apted, Tony J. [RA]', '/Subject': 'Security Target', '/Creator': 'Microsoft Word', '/CreationDate': "D:20160919034256+00'00'", '/ModDate': "D:20160919034256+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-3-RPT-C073-CR-v1': 28}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 7, 'EAL2+': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 8}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 3, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 15, 'ALC_FLR.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_FLR': 1, 'ALC_CMC.2': 8, 'ALC_CMS.2': 6, 'ALC_DEL.1': 5}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 14, 'ASE_ECD.1': 10, 'ASE_INT.1': 12, 'ASE_OBJ.2': 10, 'ASE_REQ.2': 13, 'ASE_SPD.1': 7, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 6, 'FAU_SAR': 9, 'FAU_GEN.1': 10, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_SAR.1': 9, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 4, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 5, 'FAU_SAR.3.1': 1}, 'FCS': {'FCS_COP.1': 2, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC': 1, 'FDP_ACF': 3, 'FDP_ACC.1': 10, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_AFL': 3, 'FIA_ATD': 3, 'FIA_SOS': 3, 'FIA_UAU': 6, 'FIA_UID': 2, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UAU.6': 5, 'FIA_UAU.6.1': 1, 'FIA_UID.2': 9, 'FIA_UID.2.1': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 1}, 'FMT': {'FMT_MSA': 5, 'FMT_MTD': 1, 'FMT_REV': 3, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_MSA.1': 7, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 2, 'FMT_REV.1': 4, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMF.1': 10, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 12, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTA': {'FTA_SSL': 6, 'FTA_TAB': 3, 'FTA_TSE': 3, 'FTA_SSL.3': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4': 5, 'FTA_SSL.4.1': 1, 'FTA_TAB.1': 5, 'FTA_TAB.1.1': 1, 'FTA_TSE.1': 4, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 5, 'O.AUDIT': 4, 'O.AUDIT_REVIEW': 5, 'O.I_AND_A': 3, 'O.LOGON_BANNER': 5, 'O.PASSWORD_CONTROLS': 3, 'O.SECURITY_MANAGEMENT': 3, 'O.SESSION_LIMITATION': 5, 'O.SESSION_TERMINATION': 3, 'O.THROTTLE': 5, 'O.SECURITY_MANAGE': 2}, 'T': {'T.BRUTE_FORCE': 3, 'T.DATA_COMPROMISE': 2, 'T.INAPPROPRIATE_USE': 2, 'T.NO_ACCOUNTABILITY': 2, 'T.UNATTENDED_SESSION': 3, 'T.UNAUTHORIZED_ACCESS': 2, 'T.UNAUTHORIZED_ACTIVITY': 2, 'T.UNAUTHORIZED_ACTIVIT': 1, 'T.INAPPRORIATE_USE': 1}, 'A': {'A.MANAGE': 2, 'A.PROTECT': 2, 'A.SECURE_COMMS': 3, 'A.TIME': 2}, 'OE': {'OE.PHYSICAL': 2, 'OE.PERSONNEL': 2, 'OE.SECURE_COMMS': 2, 'OE.TIME': 3}}, 'vendor': {'Microsoft': {'Microsoft': 9}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C073-CR-v1.pdf.
    • The st_filename property was set to RSA Archer ST v1.0 -clean.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-3-RPT-C073-CR-v1.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C073-CR-v1.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%20ST%20v1.0%20-clean.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name RSA Archer GRC Platform version 6.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "71ffe2f11819ba1d",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-3-RPT-C073-CR-v1",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:rsa:archer_grc_platform:6.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:rsa:archer:6.1.0.0:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2018-11065",
        "CVE-2022-26951",
        "CVE-2020-5332",
        "CVE-2019-3716",
        "CVE-2021-38362",
        "CVE-2020-5334",
        "CVE-2018-11059",
        "CVE-2017-14371",
        "CVE-2019-3715",
        "CVE-2017-14369",
        "CVE-2022-37317",
        "CVE-2021-33615",
        "CVE-2020-5331",
        "CVE-2022-26948",
        "CVE-2020-5336",
        "CVE-2020-5337",
        "CVE-2018-11060",
        "CVE-2019-3758",
        "CVE-2019-3756",
        "CVE-2021-41594",
        "CVE-2020-5335",
        "CVE-2022-26950",
        "CVE-2018-15780",
        "CVE-2021-33616",
        "CVE-2017-14370",
        "CVE-2022-26949",
        "CVE-2017-14372",
        "CVE-2022-26947",
        "CVE-2020-5333"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2016-003-C073",
      "certification_date": "14-09-2016",
      "developer": "RSA Security LLC",
      "enhanced": {
        "assurance_level": "EAL2+ ALC_FLR.2",
        "category": "Network and Network-Related Devices and Systems",
        "cert_id": "C073",
        "certification_date": "14-09-2016",
        "developer": "Jon L. GoodwinManager, Federal ProgramsRSA Security LLC10700 Parkridge Blvd.Suite 600Reston, VA 20191\nURL: www.rsa.comEmail: [email protected]: 469-855-5658",
        "expiration_date": "14-09-2021",
        "mutual_recognition": "CCRA",
        "product": "RSA Archer GRC Platform version 6.1",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/ISCB-5-RPT-C073-CR-v1.pdf",
        "scope": "It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls.\nThe following security functions are implemented by the TOE:\n\nSecurity Audit\nUser Data Protection\nIdentification adn Authentication\nSecurity Management\nTOE Access",
        "status": "Archive",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/RSA%20Archer%20ST%20v1.0%20-clean.pdf",
        "type": "Network and Network related Devices and Systems"
      },
      "expiration_date": "14-09-2021",
      "level": "EAL2+ ALC_FLR.2",
      "product": "RSA Archer GRC Platform version 6.1",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/114"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "RSA, The Security Division of EMC",
  "manufacturer_web": "https://www.rsa.com/",
  "name": "RSA Archer GRC Platform version 6.1",
  "not_valid_after": "2021-09-14",
  "not_valid_before": "2016-09-14",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ISCB-5-RPT-C073-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-3-RPT-C073-CR-v1": 28
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2+": 7,
          "EAL2+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ISCB Department",
      "/CreationDate": "D:20160919032647Z",
      "/Creator": "Microsoft Word",
      "/Keywords": "MyCB_TMP_002",
      "/ModDate": "D:20160919115230+08\u002700\u0027",
      "/Subject": "RSA Archer GRC Platform v6.1",
      "/Title": "C073 Certification Report",
      "pdf_file_size_bytes": 656895,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.cybersecurity.my/mycc"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    },
    "st_filename": "RSA Archer ST v1.0 -clean.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.MANAGE": 2,
          "A.PROTECT": 2,
          "A.SECURE_COMMS": 3,
          "A.TIME": 2
        },
        "O": {
          "O.ACCESS_CONTROL": 5,
          "O.AUDIT": 4,
          "O.AUDIT_REVIEW": 5,
          "O.I_AND_A": 3,
          "O.LOGON_BANNER": 5,
          "O.PASSWORD_CONTROLS": 3,
          "O.SECURITY_MANAGE": 2,
          "O.SECURITY_MANAGEMENT": 3,
          "O.SESSION_LIMITATION": 5,
          "O.SESSION_TERMINATION": 3,
          "O.THROTTLE": 5
        },
        "OE": {
          "OE.PERSONNEL": 2,
          "OE.PHYSICAL": 2,
          "OE.SECURE_COMMS": 2,
          "OE.TIME": 3
        },
        "T": {
          "T.BRUTE_FORCE": 3,
          "T.DATA_COMPROMISE": 2,
          "T.INAPPROPRIATE_USE": 2,
          "T.INAPPRORIATE_USE": 1,
          "T.NO_ACCOUNTABILITY": 2,
          "T.UNATTENDED_SESSION": 3,
          "T.UNAUTHORIZED_ACCESS": 2,
          "T.UNAUTHORIZED_ACTIVIT": 1,
          "T.UNAUTHORIZED_ACTIVITY": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 10,
          "ADV_FSP": 1,
          "ADV_FSP.2": 11,
          "ADV_TDS": 1,
          "ADV_TDS.1": 11
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.2": 8,
          "ALC_CMS": 1,
          "ALC_CMS.2": 6,
          "ALC_DEL": 1,
          "ALC_DEL.1": 5,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 15
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 14,
          "ASE_ECD": 1,
          "ASE_ECD.1": 10,
          "ASE_INT": 1,
          "ASE_INT.1": 12,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 10,
          "ASE_REQ": 1,
          "ASE_REQ.2": 13,
          "ASE_SPD": 1,
          "ASE_SPD.1": 7,
          "ASE_TSS": 1,
          "ASE_TSS.1": 5
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 4,
          "ATE_FUN": 1,
          "ATE_FUN.1": 8,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.2": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 3,
          "EAL 2 augmented": 2,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 6,
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_SAR": 9,
          "FAU_SAR.1": 9,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 4,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 5,
          "FAU_SAR.3.1": 1
        },
        "FCS": {
          "FCS_COP.1": 2,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 10,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 3,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 3,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 3,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 6,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.6": 5,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 5,
          "FIA_UID.2": 9,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA": 5,
          "FMT_MSA.1": 7,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 6,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 2,
          "FMT_REV": 3,
          "FMT_REV.1": 4,
          "FMT_REV.1.1": 1,
          "FMT_REV.1.2": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 2
        },
        "FTA": {
          "FTA_SSL": 6,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 5,
          "FTA_SSL.4.1": 1,
          "FTA_TAB": 3,
          "FTA_TAB.1": 5,
          "FTA_TAB.1.1": 1,
          "FTA_TSE": 3,
          "FTA_TSE.1": 4,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 9
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Apted, Tony J. [RA]",
      "/CreationDate": "D:20160919034256+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20160919034256+00\u002700\u0027",
      "/Subject": "Security Target",
      "/Title": "RSA Archer GRC",
      "pdf_file_size_bytes": 1185222,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 41
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C073-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%20ST%20v1.0%20-clean.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f493566f85e002e83324295aff98c227155123cea46ff73d9b92868685644059",
      "txt_hash": "512fed3b69e4ecda51c3b41d6df2bc804833229db3d89125729673e6f4c9b57c"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "43f6befb48745f5208bd6286469b1b35f5b1a2e6038ceac83f2277b0c640fc2b",
      "txt_hash": "ae27d1e37f140bfbd680ec5f7151ca3be372120166ab540c516c6272a1b664ab"
    }
  },
  "status": "archived"
}