Dell™ EqualLogic® PS Series Storage Array Firmware Version 7.1.1 with a Broadcom® XLP® 416, XLR® 716, XLS® 608 or XLS® 616 Processor
CSV information ?
Status | archived |
---|---|
Valid from | 07.02.2017 |
Valid until | 07.02.2022 |
Scheme | 🇩🇪 DE |
Manufacturer | Dell, Inc. |
Category | Other Devices and Systems |
Security level | EAL2+, ALC_FLR.1 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, TDES, 3DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSASSAPKCS1-v1_5, DHHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2, MD5Schemes
Key AgreementProtocols
SSH, IKE, IKEv1, IKEv2, IPsecRandomness
RNGBlock cipher modes
CBC, CTRVendor
BroadcomSecurity level
EAL 2, EAL 1, EAL 4, EAL 3, EAL 5, EAL 6, EAL 7, EAL 2 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FTP_ITCCertificates
BSI-DSZ-CC-0902-2017, BSI-DSZ-CC-0688-2013Evaluation facilities
atsecCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Dell Inc. [7] Evaluation Technical Report, Version 4, 2017-01-19, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, Version 7.1.1, 2017-01-13, Configuration Collection including, Configuration List (7.1.1-cm-lists-2017-01-13.zip) (confidential document) [9] Updating Firmware for Dell EqualLogic PS Series Storage Arrays and FS Series AppliancesCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Dell Inc. [7] Evaluation Technical Report, Version 4, 2017-01-19, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, Version 7.1.1, 2017-01-13, Configuration Collection including, Configuration List (7.1.1-cm-lists-2017-01-13.zip) (confidential document) [9] Updating Firmware for Dell EqualLogic PS Series Storage Arrays and FS Series AppliancesStandards
FIPS180-4, FIPS198-1, FIPS197, FIPS186-2, SP 800-38A, AIS 20, AIS 32, AIS 38, RFC3447, RFC2409, RFC5996, RFC3526, RFC5114, RFC4868, RFC4109, RFC4307, RFC4303, RFC2404, RFC3602, RFC2451, RFC4301, RFC4253, RFC4344, RFC4251, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0902-2017 |
---|---|
Subject | Zertifizierung |
Keywords | "Common Criteria, Certification, Zertifizierung, Dell, Storage Area Network, SAN, Equallogic" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20170314132558+01'00' |
Modification date | D:20170316105043+01'00' |
Pages | 37 |
Creator | Writer |
Producer | LibreOffice 4.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0902-2017 |
---|---|
Certified item | Dell™ EqualLogic® PS Series Storage Array Firmware Version 7.1.1 with a Broadcom® XLP® 416, XLR® 716, XLS® 608 or XLS® 616 Processor |
Certification lab | BSI |
Developer | Dell Inc |
References
Outgoing- BSI-DSZ-CC-0688-2013 - archived - Dell EqualLogic PS Series Storage Array Firmware Version 5.1.1-H2
- BSI-DSZ-CC-1008-2017 - archived - Dell EqualLogic PS 4000 Series Storage Firmware v7.1.1
Security target ?
Extracted keywords
Symmetric Algorithms
AES, TDEA, 3DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
Diffie-Hellman, DHHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2Schemes
MAC, Key ExchangeProtocols
SSH, IKE, IKEv1, IKEv2, IPsec, VPNRandomness
RNGLibraries
OpenSSLBlock cipher modes
CBC, CTRVendor
Broadcom, Microsoft Corporation, MicrosoftSecurity level
EAL2Claims
A.DNS, A.NTP, OE.DNS, OE.SNMP, OE.TOE, OE.NTPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_GEN, FAU_SAR, FCS_RNG.1, FCS_CKM, FCS_COP, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.3, FCS_CKM.1.1, FCS_CKM.2.1, FCS_COP.1.1, FCS_CKM.3.1, FCS_CKM.4, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_ACC, FDP_ACF, FDP_RIP, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD, FIA_UAU, FIA_UID, FIA_USB, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF, FMT_SMF, FMT_MSA, FMT_MTD, FMT_SMR, FPT_STM.1, FPT_ITT.1, FPT_STM.1.1, FPT_ITT.1.1, FPT_STM, FPT_ITT, FTA_SSL, FTA_TAB.1, FTA_SSL.3, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TAB, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Certificates
BSI-DSZ-CC-0902Evaluation facilities
atsecSide-channel analysis
physical tamperingStandards
FIPS198-1, FIPS180-4, FIPS197, FIPS186-2, AIS20, AIS31, RFC5048, RFC1994, RFC4301, RFC5996, RFC2409, RFC4868, RFC3526, RFC5114, RFC3447, RFC4109, RFC2404, RFC4253, RFC4344, RFC4251, X.509File metadata
Title | Dell™ EqualLogic® PS Series Storage Array Firmware Version 7.1.1 with a Broadcom® XLP®, XLR®, or XLS® Processor Security Target (version 3.27 as of 2016-09-19) |
---|---|
Subject | the Dell EqualLogic PS Series Storage Array Firmware |
Keywords | Dell, EqualLogic, SAN |
Author | Scott Chapman, Jeremy Powell (generated by CCTool version 2.8.1.13) |
Creation date | D:20160919205406Z |
Modification date | D:20160919205406Z |
Pages | 78 |
Creator | Unknown |
Producer | XEP 4.18 build 20100322 |
Heuristics ?
Extracted SARs
ALC_LCD.2, ADV_IMP.2, ALC_TAT.3, AGD_OPE.1, ALC_CMS.2, ALC_FLR.1, ALC_CMC.2, ATE_COV.1, APE_CCL.1, ATE_IND.2, ASE_SPD.1, ADV_TDS.1, APE_REQ.2, ATE_DPT.4, ASE_OBJ.2, APE_ECD.1, ATE_FUN.1, APE_INT.1, ADV_INT.3, AVA_VAN.2, ADV_ARC.1, ADV_FSP.2, APE_SPD.1, ASE_INT.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1, ALC_DEL.1, ASE_TSS.1, ALC_DVS.2, ASE_REQ.2, ADV_SPM.1, APE_OBJ.2References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '05862760610f79f01e42abd4bb2407eaf33399053a8f7904afe598b118780afe', 'txt_hash': '47710a47532844d1474e870858d17a0aeefefe72d2b5a5d2f902b10ccd41a39c'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b48a48f02db16ca6952bc400aabe3288e876c995bcc444f9141c64fad1445bae', 'txt_hash': '008a2eca9262c6d2618940adc4b5b8139164a96db2e722c67bb5a54c53f56034'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1155719, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20170314132558+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Dell, Storage Area Network, SAN, Equallogic"', '/ModDate': "D:20170316105043+01'00'", '/Producer': 'LibreOffice 4.2', '/Subject': 'Zertifizierung', '/Title': 'Certification Report BSI-DSZ-CC-0902-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS', 'http://www.sogisportal.eu/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 868331, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 78, '/Keywords': 'Dell, EqualLogic, SAN', '/Subject': 'the Dell EqualLogic PS Series Storage Array Firmware', '/Title': 'Dell™ EqualLogic® PS Series Storage Array Firmware Version 7.1.1 with a Broadcom® XLP®, XLR®, or XLS® Processor Security Target (version 3.27 as of 2016-09-19)', '/Creator': 'Unknown', '/Author': 'Scott Chapman, Jeremy Powell (generated by CCTool version 2.8.1.13)', '/Producer': 'XEP 4.18 build 20100322', '/application': 'CCTool version x.y', '/Trapped': '/False', '/CreationDate': 'D:20160919205406Z', '/ModDate': 'D:20160919205406Z', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc3447.txt', 'http://www.ietf.org/rfc/rfc4868.txt', 'http://www.ietf.org/rfc/rfc3526.txt', 'http://www.ietf.org/rfc/rfc5114.txt', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf', 'http://www.ietf.org/rfc/rfc4344.txt', 'http://www.ietf.org/rfc/rfc4253.txt', 'http://www.ietf.org/rfc/rfc5048.txt', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf', 'http://www.ietf.org/rfc/rfc2409.txt', 'http://www.ietf.org/rfc/rfc5996.txt', 'http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2.pdf', 'http://www.ietf.org/rfc/rfc4301.txt', 'http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf', 'http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf', 'http://tools.ietf.org/html/draft-mcgrew-tss-03', 'http://www.ietf.org/rfc/rfc4251.txt', 'http://www.ietf.org/rfc/rfc2404.txt', 'http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf', 'http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf', 'http://www.ietf.org/rfc/rfc1994.txt', 'http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf', 'http://www.ietf.org/rfc/rfc4109.txt']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0902-2017', 'cert_item': 'Dell™ EqualLogic® PS Series Storage Array Firmware Version 7.1.1 with a Broadcom® XLP® 416, XLR® 716, XLS® 608 or XLS® 616 Processor', 'developer': 'Dell Inc', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 2 augmented by ALC_FLR.1'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0902-2017': 19, 'BSI-DSZ-CC-0688-2013': 3}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 8, 'EAL 1': 7, 'EAL 4': 6, 'EAL 3': 4, 'EAL 5': 6, 'EAL 6': 3, 'EAL 7': 4, 'EAL 2 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 5, 'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 1, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FTP': {'FTP_ITC': 2}}, 'cc_claims': {}, 'vendor': {'Broadcom': {'Broadcom': 9}}, 'eval_facility': {'atsec': {'atsec': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'3DES': {'TDES': 3, '3DES': 1}}, 'constructions': {'MAC': {'HMAC': 19, 'HMAC-SHA-256': 2, 'HMAC-SHA-384': 2, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'RSA': {'RSASSAPKCS1-v1_5': 1}, 'FF': {'DH': {'DH': 10}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 2, 'SHA-384': 3, 'SHA-512': 3, 'SHA-2': 1}}, 'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'SSH': {'SSH': 10}, 'IKE': {'IKE': 3, 'IKEv1': 7, 'IKEv2': 8}, 'IPsec': {'IPsec': 16}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 13}, 'CTR': {'CTR': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-4': 10, 'FIPS198-1': 5, 'FIPS197': 2, 'FIPS186-2': 1}, 'NIST': {'SP 800-38A': 1}, 'BSI': {'AIS 20': 2, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC3447': 6, 'RFC2409': 7, 'RFC5996': 9, 'RFC3526': 2, 'RFC5114': 1, 'RFC4868': 3, 'RFC4109': 1, 'RFC4307': 2, 'RFC4303': 3, 'RFC2404': 1, 'RFC3602': 1, 'RFC2451': 1, 'RFC4301': 1, 'RFC4253': 9, 'RFC4344': 1, 'RFC4251': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Dell Inc. [7] Evaluation Technical Report, Version 4, 2017-01-19, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, Version 7.1.1, 2017-01-13, Configuration Collection including': 1, 'Configuration List (7.1.1-cm-lists-2017-01-13.zip) (confidential document) [9] Updating Firmware for Dell EqualLogic PS Series Storage Arrays and FS Series Appliances': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0902': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_GEN.2': 4, 'FAU_SAR.1': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_GEN': 4, 'FAU_SAR': 2}, 'FCS': {'FCS_RNG.1': 8, 'FCS_CKM': 49, 'FCS_COP': 14, 'FCS_RNG': 24, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 4, 'FCS_CKM.1': 9, 'FCS_CKM.2': 6, 'FCS_COP.1': 5, 'FCS_CKM.3': 1, 'FCS_CKM.1.1': 3, 'FCS_CKM.2.1': 3, 'FCS_COP.1.1': 2, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 9}, 'FDP': {'FDP_ACC.1': 8, 'FDP_ACF.1': 5, 'FDP_RIP.1': 5, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.1.1': 1, 'FDP_ACC': 2, 'FDP_ACF': 2, 'FDP_RIP': 2, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.2': 4, 'FIA_UAU.5': 6, 'FIA_UID.2': 7, 'FIA_USB.1': 4, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD': 4, 'FIA_UAU': 5, 'FIA_UID': 3, 'FIA_USB': 3, 'FIA_UID.1': 1}, 'FMT': {'FMT_MOF.1': 5, 'FMT_MSA.1': 7, 'FMT_MSA.3': 5, 'FMT_MTD.1': 5, 'FMT_SMF.1': 8, 'FMT_SMR.1': 9, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF': 2, 'FMT_SMF': 6, 'FMT_MSA': 3, 'FMT_MTD': 5, 'FMT_SMR': 2}, 'FPT': {'FPT_STM.1': 6, 'FPT_ITT.1': 5, 'FPT_STM.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_STM': 2, 'FPT_ITT': 2}, 'FTA': {'FTA_SSL': 12, 'FTA_TAB.1': 5, 'FTA_SSL.3': 2, 'FTA_SSL.3.1': 2, 'FTA_TAB.1.1': 1, 'FTA_TAB': 2}, 'FTP': {'FTP_ITC': 13, 'FTP_ITC.1': 2, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 2, 'FTP_ITC.1.3': 2}}, 'cc_claims': {'A': {'A.DNS': 3, 'A.NTP': 3}, 'OE': {'OE.DNS': 3, 'OE.SNMP': 3, 'OE.TOE': 3, 'OE.NTP': 5}}, 'vendor': {'Broadcom': {'Broadcom': 97}, 'Microsoft': {'Microsoft Corporation': 1, 'Microsoft': 2}}, 'eval_facility': {'atsec': {'atsec': 77}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 15}}, 'DES': {'3DES': {'TDEA': 14, '3DES': 2}}, 'constructions': {'MAC': {'HMAC': 18, 'HMAC-SHA-256': 2, 'HMAC-SHA-384': 2, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 14, 'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-256': 5, 'SHA-384': 5, 'SHA-512': 5, 'SHA-2': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 8}}, 'crypto_protocol': {'SSH': {'SSH': 26}, 'IKE': {'IKE': 28, 'IKEv1': 8, 'IKEv2': 7}, 'IPsec': {'IPsec': 90}, 'VPN': {'VPN': 4}}, 'randomness': {'RNG': {'RNG': 30}}, 'cipher_mode': {'CBC': {'CBC': 9}, 'CTR': {'CTR': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS198-1': 5, 'FIPS180-4': 6, 'FIPS197': 4, 'FIPS186-2': 2}, 'BSI': {'AIS20': 1, 'AIS31': 1}, 'RFC': {'RFC5048': 2, 'RFC1994': 2, 'RFC4301': 3, 'RFC5996': 8, 'RFC2409': 6, 'RFC4868': 4, 'RFC3526': 3, 'RFC5114': 2, 'RFC3447': 5, 'RFC4109': 2, 'RFC2404': 3, 'RFC4253': 8, 'RFC4344': 2, 'RFC4251': 2}, 'X509': {'X.509': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0902a_pdf.pdf
. - The st_filename property was set to
0902b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0902-2017
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1008-2017']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1008-2017']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0688-2013']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0688-2013']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0902a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0902b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data.
- The report_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Dell™ EqualLogic® PS Series Storage Array Firmware Version 7.1.1 with a Broadcom® XLP® 416, XLR® 716, XLS® 608 or XLS® 616 Processor was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "7dde7ce71f3f7105",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0902-2017",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.1.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1008-2017"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0688-2013"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1008-2017"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0688-2013"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Dell, Inc.",
"manufacturer_web": "https://www.dell.com",
"name": "Dell\u2122 EqualLogic\u00ae PS Series Storage Array Firmware Version 7.1.1 with a Broadcom\u00ae XLP\u00ae 416, XLR\u00ae 716, XLS\u00ae 608 or XLS\u00ae 616 Processor",
"not_valid_after": "2022-02-07",
"not_valid_before": "2017-02-07",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0902a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 2 augmented by ALC_FLR.1",
"cc_version": "Product specific Security Target Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0902-2017",
"cert_item": "Dell\u2122 EqualLogic\u00ae PS Series Storage Array Firmware Version 7.1.1 with a Broadcom\u00ae XLP\u00ae 416, XLR\u00ae 716, XLS\u00ae 608 or XLS\u00ae 616 Processor",
"cert_lab": "BSI",
"developer": "Dell Inc",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 10
}
},
"RSA": {
"RSASSAPKCS1-v1_5": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0688-2013": 3,
"BSI-DSZ-CC-0902-2017": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 5,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 8,
"EAL 2 augmented": 3,
"EAL 3": 4,
"EAL 4": 6,
"EAL 5": 6,
"EAL 6": 3,
"EAL 7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FTP": {
"FTP_ITC": 2
}
},
"certification_process": {
"ConfidentialDocument": {
"Configuration List (7.1.1-cm-lists-2017-01-13.zip) (confidential document) [9] Updating Firmware for Dell EqualLogic PS Series Storage Arrays and FS Series Appliances": 1,
"Dell Inc. [7] Evaluation Technical Report, Version 4, 2017-01-19, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, Version 7.1.1, 2017-01-13, Configuration Collection including": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 13
},
"CTR": {
"CTR": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 3,
"IKEv1": 7,
"IKEv2": 8
},
"IPsec": {
"IPsec": 16
},
"SSH": {
"SSH": 10
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-2": 1,
"SHA-256": 2,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1,
"AIS 38": 1
},
"FIPS": {
"FIPS180-4": 10,
"FIPS186-2": 1,
"FIPS197": 2,
"FIPS198-1": 5
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"NIST": {
"SP 800-38A": 1
},
"RFC": {
"RFC2404": 1,
"RFC2409": 7,
"RFC2451": 1,
"RFC3447": 6,
"RFC3526": 2,
"RFC3602": 1,
"RFC4109": 1,
"RFC4251": 1,
"RFC4253": 9,
"RFC4301": 1,
"RFC4303": 3,
"RFC4307": 2,
"RFC4344": 1,
"RFC4868": 3,
"RFC5114": 1,
"RFC5996": 9
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 19,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 9
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20170314132558+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Dell, Storage Area Network, SAN, Equallogic\"",
"/ModDate": "D:20170316105043+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Zertifizierung",
"/Title": "Certification Report BSI-DSZ-CC-0902-2017",
"pdf_file_size_bytes": 1155719,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 37
},
"st_filename": "0902b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 3,
"Diffie-Hellman": 14
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0902": 1
}
},
"cc_claims": {
"A": {
"A.DNS": 3,
"A.NTP": 3
},
"OE": {
"OE.DNS": 3,
"OE.NTP": 5,
"OE.SNMP": 3,
"OE.TOE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.1": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FCS": {
"FCS_CKM": 49,
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 6,
"FCS_CKM.2.1": 3,
"FCS_CKM.3": 1,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 9,
"FCS_COP": 14,
"FCS_COP.1": 5,
"FCS_COP.1.1": 2,
"FCS_RNG": 24,
"FCS_RNG.1": 8,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 4
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 8,
"FDP_ACC.1.1": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 5,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_RIP": 2,
"FDP_RIP.1": 5,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD": 4,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_UAU": 5,
"FIA_UAU.2": 4,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID": 3,
"FIA_UID.1": 1,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1,
"FIA_USB": 3,
"FIA_USB.1": 4,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 5,
"FMT_MOF.1.1": 1,
"FMT_MSA": 3,
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 5,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 5,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 1,
"FMT_SMF": 6,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT": 2,
"FPT_ITT.1": 5,
"FPT_ITT.1.1": 1,
"FPT_STM": 2,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1
},
"FTA": {
"FTA_SSL": 12,
"FTA_SSL.3": 2,
"FTA_SSL.3.1": 2,
"FTA_TAB": 2,
"FTA_TAB.1": 5,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC": 13,
"FTP_ITC.1": 2,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 2,
"FTP_ITC.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 9
},
"CTR": {
"CTR": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"IKE": {
"IKE": 28,
"IKEv1": 8,
"IKEv2": 7
},
"IPsec": {
"IPsec": 90
},
"SSH": {
"SSH": 26
},
"VPN": {
"VPN": 4
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 8
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 77
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 14
},
"SHA2": {
"SHA-2": 5,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 30
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 1,
"AIS31": 1
},
"FIPS": {
"FIPS180-4": 6,
"FIPS186-2": 2,
"FIPS197": 4,
"FIPS198-1": 5
},
"RFC": {
"RFC1994": 2,
"RFC2404": 3,
"RFC2409": 6,
"RFC3447": 5,
"RFC3526": 3,
"RFC4109": 2,
"RFC4251": 2,
"RFC4253": 8,
"RFC4301": 3,
"RFC4344": 2,
"RFC4868": 4,
"RFC5048": 2,
"RFC5114": 2,
"RFC5996": 8
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 15
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDEA": 14
}
},
"constructions": {
"MAC": {
"HMAC": 18,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 97
},
"Microsoft": {
"Microsoft": 2,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Scott Chapman, Jeremy Powell (generated by CCTool version 2.8.1.13)",
"/CreationDate": "D:20160919205406Z",
"/Creator": "Unknown",
"/Keywords": "Dell, EqualLogic, SAN",
"/ModDate": "D:20160919205406Z",
"/Producer": "XEP 4.18 build 20100322",
"/Subject": "the Dell EqualLogic PS Series Storage Array Firmware",
"/Title": "Dell\u2122 EqualLogic\u00ae PS Series Storage Array Firmware Version 7.1.1 with a Broadcom\u00ae XLP\u00ae, XLR\u00ae, or XLS\u00ae Processor Security Target (version 3.27 as of 2016-09-19)",
"/Trapped": "/False",
"/application": "CCTool version x.y",
"pdf_file_size_bytes": 868331,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ietf.org/rfc/rfc4344.txt",
"http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
"http://www.ietf.org/rfc/rfc4301.txt",
"http://www.ietf.org/rfc/rfc4868.txt",
"http://www.ietf.org/rfc/rfc5114.txt",
"http://www.ietf.org/rfc/rfc2409.txt",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf",
"http://www.ietf.org/rfc/rfc5996.txt",
"http://www.ietf.org/rfc/rfc5048.txt",
"http://www.ietf.org/rfc/rfc2404.txt",
"http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf",
"http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf",
"http://tools.ietf.org/html/draft-mcgrew-tss-03",
"http://www.ietf.org/rfc/rfc3526.txt",
"http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf",
"http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf",
"http://www.ietf.org/rfc/rfc3447.txt",
"http://www.ietf.org/rfc/rfc4109.txt",
"http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
"http://www.ietf.org/rfc/rfc1994.txt",
"http://www.ietf.org/rfc/rfc4253.txt",
"http://www.ietf.org/rfc/rfc4251.txt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 78
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0902a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0902b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "05862760610f79f01e42abd4bb2407eaf33399053a8f7904afe598b118780afe",
"txt_hash": "47710a47532844d1474e870858d17a0aeefefe72d2b5a5d2f902b10ccd41a39c"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b48a48f02db16ca6952bc400aabe3288e876c995bcc444f9141c64fad1445bae",
"txt_hash": "008a2eca9262c6d2618940adc4b5b8139164a96db2e722c67bb5a54c53f56034"
}
},
"status": "archived"
}