This page was not yet optimized for use on mobile
devices.
Check Point R82 for Gateway and Maestro Configurations, Version R82 from Check Point Software Technologies Ltd
CSV information
| Status | active |
|---|---|
| Valid from | 10.04.2025 |
| Valid until | 10.04.2030 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Check Point Software Technologies Ltd. |
| Category | Other Devices and Systems |
| Security level | EAL4+, ALC_FLR.1, AVA_VAN.4 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1207-2025
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, AVA_VAN.4Certificates
BSI-DSZ-CC-1207-2025Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Hash functions
SHA-256, SHA-384, SHA-512Protocols
TLS v1.3Randomness
DRBGBlock cipher modes
CTR, GCMSecurity level
EAL 4, EAL 2, EAL 1, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, AVA_VAN.4Certificates
BSI-DSZ-CC-1207-2025, BSI-DSZ-CC-1207Evaluation facilities
TÜV InformationstechnikSide-channel analysis
side-channelCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Evaluation Technical Report BSI-DSZ-CC-1207, Version 7, 2025-04-09, TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, 2024-11-23, R82_EAL4_files_list, Check Point Software, Ltd. (confidential document) [9] Guidance documentation for the TOE, Version 008, 2025-03-03, R82 CC Firmware for Gateway andStandards
FIPS PUB 186-4, FIPS 180-4, FIPS 197, FIPS 198-1, PKCS#1, PKCS#12, AIS 20, AIS 32, RFC 8446, RFC7292, RFC 7905, RFC 3447, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-1207-2025 |
|---|---|
| Subject | Common Criteria, Certification, Zertifizierung, Gateway, Firewall, Intrusion Detection, Check Point |
| Keywords | "Common Criteria, Certification, Zertifizierung, Gateway, Firewall, Intrusion Detection, Check Point" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Pages | 23 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1207-2025 |
|---|---|
| Certified item | Check Point R82 for Gateway and Maestro Configurations, Version R82 |
| Certification lab | BSI |
| Developer | Check Point Software Technologies Ltd |
Security target
Extracted keywords
Symmetric Algorithms
AES, Poly1305, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Hash functions
SHA-256, SHA-384, SHA-512Schemes
MACProtocols
SSH, TLS v1.3, TLSRandomness
DRBG, RNGLibraries
OpenSSLBlock cipher modes
CTR, GCMSecurity level
EAL 4, EAL4Claims
O.ADDRESS_FILTERING, O.PORT_FILTERING, O.INTRUSION_PREVENTION, O.TOE_ADMINISTRATION, O.AUTHENTICATION, O.SYSTEM_MONITORING, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.MALICIOUS_TRAFFIC, T.UNAUTHORIZED_ADMIN_ACCESS, T.UNDETECTED_ACTIVITY, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.TRUSTED_ADMINSTRATOR, A.CONNECTIONS, A.LOCAL_NETWORK_PROTECTION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TRUSTED_ADMIN, OE.CONNECTIONS, OE.LOCAL_NETWORKSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_ARC.1, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMS.4, ALC_CMC.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_EAS_EXT, FAU_GEN.1, FAU_GEN.2, FAU_EAS_EXT.1, FAU_STG.1, FAU_GEN, FAU_EAS_EXT.1.1, FAU_EAS_EXT.1.2, FAU_EAS_EXT.1.3, FAU_SAA.1, FAU_SAA.2, FAU_ARP.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_RNG, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FIA_UID.1, FIA_UAU.1, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID, FIA_UAU, FIA_AFL, FMT_SMR.1, FMT_SMF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_SMF, FMT_SMR, FPT_STM.1, FPT_ITT.2, FPT_STM.1.1, FPT_ITT.2.1, FPT_ITT.2.2, FPT_STM, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL.4.1, FTA_SSL, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certificates
BSI-DSZ-CC-1207Standards
FIPS PUB 186-4, FIPS 180-4, FIPS 198-1, FIPS 197, PKCS #1, PKCS#12, PKCS#1, AIS20, AIS 20, RFC 5735, RFC 3447, RFC7905, RFC 8439, RFC 1918, RFC 792, RFC 791, RFC 793, RFC 768, RFC 8446, RFC7292, RFC 7905, RFC8439File metadata
| Title | [ST]CheckPoint R82 BSI-DSZ-CC-1207 SecurityTarget _R015 |
|---|---|
| Author | Nils Tekampe |
| Pages | 69 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1207-2025Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4Scheme data
| Cert Id | BSI-DSZ-CC-1207-2025 | |
|---|---|---|
| Product | Check Point R82 for Gateway and Maestro Configurations, Version R82 | |
| Vendor | Check Point Software Technologies Ltd | |
| Certification Date | 10.04.2025 | |
| Category | Network and Network related Devices and Systems | |
| Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1207.html | |
| Enhanced | ||
| Product | Check Point R82 for Gateway and Maestro Configurations, Version R82 | |
| Applicant | Check Point Software Technologies Ltd Shlomo Kaplan St 5, 6789159 Tel Aviv-Yafo Israel | |
| Evaluation Facility | TÜV Informationstechnik GmbH | |
| Assurance Level | EAL4,ALC_FLR.1,AVA_VAN.4 | |
| Certification Date | 10.04.2025 | |
| Expiration Date | 09.04.2030 | |
| Entries | [frozendict({'id': 'BSI-DSZ-CC-1207-2025', 'description': 'Certificate'})] | |
| Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1207a_pdf.pdf?__blob=publicationFile&v=2 | |
| Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1207b_pdf.pdf?__blob=publicationFile&v=2 | |
| Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1207c_pdf.pdf?__blob=publicationFile&v=2 | |
| Description | The Target of Evaluation (TOE) is a combination of the firmware for Security Gateway Module(s), a Security Management Server and (when deployed in Scalable Platform configuration) the firmware for the Maestro Orchestrator appliance(s). The Security Gateway Module (SGM) is a managed packet filtering firewall application, with IPS pattern matching (software) blade. The TOE provides controlled connectivity between two or more network environments. It mediates information flows between clients and servers located on internal and external networks governed by the firewalls. The SGM can either be deployed using instances of a single Security Gateway appliance, which incorporates the SGM or a combination of Security Gateway Modules (SGM) operating in a cluster as part of a Scalable Platform (SP). The Security Management Server is used to manage and deploy the security policies and rules to SGM. When operating as part of a Scalable Platform (SP), the Orchestrator appliance provides load balancing services for the SGMs. | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1207c_pdf.pdf",
"dgst": "77971b85313e8e08",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1207-2025",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Network and Network related Devices and Systems",
"cert_id": "BSI-DSZ-CC-1207-2025",
"certification_date": "2025-04-10",
"enhanced": {
"applicant": "Check Point Software Technologies Ltd Shlomo Kaplan St 5, 6789159 Tel Aviv-Yafo Israel",
"assurance_level": "EAL4,ALC_FLR.1,AVA_VAN.4",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1207c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2025-04-10",
"description": "The Target of Evaluation (TOE) is a combination of the firmware for Security Gateway Module(s), a Security Management Server and (when deployed in Scalable Platform configuration) the firmware for the Maestro Orchestrator appliance(s). The Security Gateway Module (SGM) is a managed packet filtering firewall application, with IPS pattern matching (software) blade. The TOE provides controlled connectivity between two or more network environments. It mediates information flows between clients and servers located on internal and external networks governed by the firewalls. The SGM can either be deployed using instances of a single Security Gateway appliance, which incorporates the SGM or a combination of Security Gateway Modules (SGM) operating in a cluster as part of a Scalable Platform (SP). The Security Management Server is used to manage and deploy the security policies and rules to SGM. When operating as part of a Scalable Platform (SP), the Orchestrator appliance provides load balancing services for the SGMs.",
"entries": [
{
"description": "Certificate",
"id": "BSI-DSZ-CC-1207-2025"
}
],
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2030-04-09",
"product": "Check Point R82 for Gateway and Maestro Configurations, Version R82",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1207a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1207b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "Check Point R82 for Gateway and Maestro Configurations, Version R82",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1207.html",
"vendor": "Check Point Software Technologies Ltd"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Check Point Software Technologies Ltd.",
"manufacturer_web": "https://www.checkpoint.com/",
"name": "Check Point R82 for Gateway and Maestro Configurations, Version R82 from Check Point Software Technologies Ltd",
"not_valid_after": "2030-04-10",
"not_valid_before": "2025-04-10",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1207c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1207-2025": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 2,
"EAL 4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1207a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4 valid until: 09. April 2030",
"cc_version": "Product specific Security Target Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1207-2025",
"cert_item": "Check Point R82 for Gateway and Maestro Configurations, Version R82",
"cert_lab": "BSI",
"developer": "Check Point Software Technologies Ltd",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "none"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1207": 1,
"BSI-DSZ-CC-1207-2025": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 3,
"ALC_FLR.1": 4
},
"AVA": {
"AVA_VAN.4": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 8,
"EAL 4 augmented": 3
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Evaluation Technical Report BSI-DSZ-CC-1207, Version 7, 2025-04-09, T\u00dcV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, 2024-11-23, R82_EAL4_files_list, Check Point Software": 1,
"Ltd. (confidential document) [9] Guidance documentation for the TOE, Version 008, 2025-03-03, R82 CC Firmware for Gateway and": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS v1.3": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 6,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
}
},
"side_channel_analysis": {
"SCA": {
"side-channel": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 32": 1
},
"FIPS": {
"FIPS 180-4": 2,
"FIPS 197": 1,
"FIPS 198-1": 1,
"FIPS PUB 186-4": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 3,
"PKCS#12": 2
},
"RFC": {
"RFC 3447": 1,
"RFC 7905": 1,
"RFC 8446": 2,
"RFC7292": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"constructions": {
"MAC": {
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Gateway, Firewall, Intrusion Detection, Check Point\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Gateway, Firewall, Intrusion Detection, Check Point",
"/Title": "Certification Report BSI-DSZ-CC-1207-2025",
"pdf_file_size_bytes": 364499,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 23
},
"st_filename": "1207b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1207": 1
}
},
"cc_claims": {
"A": {
"A.CONNECTIONS": 3,
"A.LIMITED_FUNCTIONALITY": 3,
"A.LOCAL_NETWORK_PROTECTION": 3,
"A.PHYSICAL_PROTECTION": 4,
"A.TRUSTED_ADMINSTRATOR": 3
},
"O": {
"O.ADDRESS_FILTERING": 5,
"O.AUTHENTICATION": 4,
"O.INTRUSION_PREVENTION": 5,
"O.PORT_FILTERING": 5,
"O.SYSTEM_MONITORING": 4,
"O.TOE_ADMINISTRATION": 5
},
"OE": {
"OE.CONNECTIONS": 2,
"OE.LOCAL_NETWORK": 2,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.PHYSICAL": 2,
"OE.TRUSTED_ADMIN": 2
},
"T": {
"T.MALICIOUS_TRAFFIC": 4,
"T.NETWORK_ACCESS": 3,
"T.NETWORK_DISCLOSURE": 4,
"T.UNAUTHORIZED_ADMIN_ACCESS": 3,
"T.UNDETECTED_ACTIVITY": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL4": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1,
"FAU_EAS_EXT": 3,
"FAU_EAS_EXT.1": 7,
"FAU_EAS_EXT.1.1": 2,
"FAU_EAS_EXT.1.2": 2,
"FAU_EAS_EXT.1.3": 2,
"FAU_GEN": 6,
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAA.1": 1,
"FAU_SAA.2": 1,
"FAU_STG.1": 1
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 8,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 4,
"FCS_CKM.4.1": 1,
"FCS_COP": 14,
"FCS_COP.1": 5,
"FCS_COP.1.1": 6,
"FCS_RNG": 4,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ITC.1": 3,
"FDP_ITC.2": 3
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 5,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID": 1,
"FIA_UID.1": 8,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_SMF": 1,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 5,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.2": 6,
"FPT_ITT.2.1": 1,
"FPT_ITT.2.2": 1,
"FPT_STM": 1,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1
},
"FTA": {
"FTA_SSL": 4,
"FTA_SSL.3": 4,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1
},
"FTP": {
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS": 5,
"TLS v1.3": 13
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 6,
"SHA-384": 4,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RNG": 10
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS20": 1
},
"FIPS": {
"FIPS 180-4": 3,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS PUB 186-4": 3
},
"PKCS": {
"PKCS #1": 2,
"PKCS#1": 2,
"PKCS#12": 2
},
"RFC": {
"RFC 1918": 1,
"RFC 3447": 2,
"RFC 5735": 2,
"RFC 768": 1,
"RFC 7905": 1,
"RFC 791": 1,
"RFC 792": 1,
"RFC 793": 1,
"RFC 8439": 1,
"RFC 8446": 2,
"RFC7292": 1,
"RFC7905": 1,
"RFC8439": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"constructions": {
"MAC": {
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 1
}
},
"djb": {
"Poly": {
"Poly1305": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Nils Tekampe",
"/Title": "[ST]CheckPoint R82 BSI-DSZ-CC-1207 SecurityTarget _R015",
"pdf_file_size_bytes": 1023006,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 69
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1207a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.4",
"EAL4+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1207b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "44032bdd99ead021d355e866d8a0160676d6846d232e2ada7aae9ae66cf7a706",
"txt_hash": "94c5b84f08435d58550a1f145c3045b5f961585719bdf726120dce149b39b3bb"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "ea4a0a2c6df4f9d482c9f0355d6eabbc8110eb446bf35246130a1870dedcfe2f",
"txt_hash": "d83420e0cd11ca6db2ebd1dc5e12d142af939fe9b454bae05e91f7bd130930d6"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "177c3801b8e3cb552fbb2f763990ee693d8317daae1f56db95609c3c247884c0",
"txt_hash": "7dec963f230142a568462644350bd80166386b311bbc5c279352f463653ec468"
}
},
"status": "active"
}