Arkoon Fast Firewall v3.0/11 (configurations A200, A500, A2000 et A5000)
CSV information ?
Status | archived |
---|---|
Valid from | 23.11.2004 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Arkoon Network security |
Category | Boundary Protection Devices and Systems |
Security level | ALC_FLR.3, EAL2+, ALC_DVS.1, ADV_HLD.2, AVA_MSU.1, AVA_VLA.2 |
Maintenance updates | Rapport de maintenance M-2007/11 (07.06.2007) Certification report |
Rapport de maintenance DCSSI-2004/33-M02 (11.06.2008) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESProtocols
VPNSecurity level
EAL7, EAL4, EAL21, EAL1, EAL3, EAL5, ITSEC E6 etClaims
OE.PHYSEC, OE.LOCATE, OE.SINUSE, OE.GENPUR, OE.PUBLIC, OE.NOEVIL, OE.ADMTRA, OE.GUIDAN, OE.SINGEN, OE.NOREMOSecurity Assurance Requirements (SAR)
ACM_CAP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.1, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_HLD.2, ADV_FSP.1, ADV_RCR.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR, ALC_DVS.1, ALC_FLR.3, ALC_DVS, ALC_TAT, ATE_COV.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.1, AVA_VLA.2, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.3, FAU_STG.1, FAU_STG.4, FDP_IFC.1, FDP_IFC.2, FDP_IFF.1, FDP_RIP.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FPR_PSE.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1Certificates
Rapport de certification 2004/33Evaluation facilities
OPPIDAStandards
ISO/IEC 15408:1999, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title | Rapport de certification 2004/33 |
---|---|
Subject | Arkoon Fast Firewall v3.0/11 avec certification-eal2-qualification package (configurations A200, A500, A2000 et A5000) |
Keywords | CER/F/07.3 |
Author | Patrick REDON |
Creation date | D:20041125180420+01'00' |
Modification date | D:20041125180532+01'00' |
Pages | 25 |
Creator | Acrobat PDFMaker 5.0 pour Word |
Producer | Acrobat Distiller 5.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AESProtocols
VPNVendor
STMSecurity level
EAL2, EAL 2, EAL2 augmentedClaims
O.IDAUTH, O.MEDIAT, O.MEDIATAPP, O.SECSTA, O.SELFPRO, O.AUDREC, O.ACCOUN, O.SECFUN, O.PRIVACY, O.SELPRO, T.NOAUTH, T.REPEAT, T.ASPOOF, T.MEDIAT, T.PROT_MIS, T.PRIVACY, T.OLDINF, T.AUDACC, T.SELPRO, T.AUDFUL, T.NODETECT, T.SYNFLOOD, T.SELFPRO, A.PHYSEC, A.GENPUR, A.PUBLIC, A.NOEVIL, A.SINGEN, A.DIRECT, A.NOREMO, A.LOCATE, A.OSVER, A.SINUSE, OE.PHYSEC, OE.GENPUR, OE.PUBLIC, OE.NOEVIL, OE.SINGEN, OE.DIRECT, OE.NOREMO, OE.LOCATE, OE.OSVER, OE.SINUSE, OE.GUIDAN, OE.ADMTRASecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_HLD.2, ADV_FSP.1, ADV_RCR.1, ADV_HLD.1, ADV_IMP.1, ADV_LLD.1, ADV_RCR, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ALC_FLR, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.3, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FDP_IFC.2, FDP_IFF.1, FDP_IFC.1, FDP_IFF.2, FDP_RIP.1, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_IFC.1.1, FDP_RIP.1.1, FDP_IFC, FIA_UAU.1, FIA_UID.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_PSE.1, FPR_PSE.1.1, FPR_PSE.1.2, FPR_PSE.1.3, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_STM.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2Side-channel analysis
physical tamperingStandards
PKCS#12, ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title | Microsoft Word - OMEGA-ST-2_7p.doc |
---|---|
Author | bbrodard |
Creation date | D:20041108183054+01'00' |
Modification date | D:20041108183054+01'00' |
Pages | 56 |
Creator | PScript5.dll Version 5.2 |
Producer | Acrobat Distiller 6.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.2Scheme data ?
Product | Arkoon Fast Firewall v3.0/11 avec certification-eal2-qualification package (configurations A200, A500, A2000 et A5000) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/arkoon-fast-firewall-v3011-avec-certification-eal2-qualification-package | |
Description | Le produit évalué est le pare-feu de Arkoon Network Security dans sa version 3.0/11 avec le correctif certification-eal2-qualifcation package, dans quatre configurations matérielles (A200, A500, A2000, A5000). Il est composé des éléments suivants : les composants logiciels du pare-feu, mettant en œuvre les fonctions de sécurité ; une station d'administration et de supervision ; un boîtier par | |
Sponsor | Arkoon | |
Developer | Arkoon | |
Cert Id | ANSSI-CC-2004/33 | |
Level | EAL2+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2004/33 | |
Certification Date | 23.11.2004 | |
Category | Produits réseau | |
Cc Version | Critères Communs version 2.1 | |
Developer | Arkoon | |
Sponsor | Arkoon | |
Evaluation Facility | Oppida | |
Level | EAL2+ | |
Protection Profile | ||
Mutual Recognition | SOG-IS CCRA | |
Augmented | ADV_HLD.2, ALC_DVS.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-33en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-33fr.pdf |
References ?
No references are available for this certificate.
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Arkoon Fast Firewall v3.0/11 avec certification-eal2-qualification package (configurations A200, A500, A2000 et A5000)', 'url': 'https://cyber.gouv.fr/produits-certifies/arkoon-fast-firewall-v3011-avec-certification-eal2-qualification-package', 'description': 'Le produit évalué est le pare-feu de Arkoon Network Security dans sa version 3.0/11 avec le correctif certification-eal2-qualifcation package, dans quatre configurations matérielles (A200, A500, A2000, A5000). Il est composé des éléments suivants : les composants logiciels du pare-feu, mettant en œuvre les fonctions de sécurité ; une station d'administration et de supervision ; un boîtier par', 'sponsor': 'Arkoon', 'developer': 'Arkoon', 'cert_id': 'ANSSI-CC-2004/33', 'level': 'EAL2+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/33', 'certification_date': '2004-11-23', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Arkoon', 'sponsor': 'Arkoon', 'evaluation_facility': 'Oppida', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_HLD.2, ALC_DVS.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-33en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-33fr.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est le pare-feu de Arkoon Network Security dans sa version 3.0/11 avec le correctif certification-eal2-qualifcation package, dans quatre configurations matérielles (A200, A500, A2000, A5000). Il est composé des éléments suivants : les composants logiciels du pare-feu, mettant en œuvre les fonctions de sécurité ; une station d'administration et de supervision ; un boîtier par', 'cert_id': 'ANSSI-CC-2004/33', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2004/33', 'certification_date': '2004-11-23', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Arkoon Fast Firewall v3.0/11 avec certification-eal2-qualification package (configurations A200, A500, A2000 et A5000)', 'url': 'https://cyber.gouv.fr/produits-certifies/arkoon-fast-firewall-v3011-avec-certification-eal2-qualification-package', 'description': 'Le produit évalué est le pare-feu de Arkoon Network Security dans sa version 3.0/11 avec le correctif certification-eal2-qualifcation package, dans quatre configurations matérielles (A200, A500, A2000, A5000).\nIl est composé des éléments suivants : les composants logiciels du pare-feu, mettant en œuvre les fonctions de sécurité ; une station d'administration et de supervision ; un boîtier par', 'sponsor': 'Arkoon', 'developer': 'Arkoon', 'cert_id': '2004/33', 'level': 'EAL2+', 'enhanced': {'cert_id': '2004/33', 'certification_date': '23/11/2004', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Arkoon', 'sponsor': 'Arkoon', 'evaluation_facility': 'Oppida', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_HLD.2, ALC_DVS.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-33en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-33fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bcda06e92ec9ca2efc7d70ad268382eaac4eaf8e3ca85eeb0dcc654034a51fc3', 'txt_hash': '10851a61bbb31abd6f64985f540e88648064fceb24a841cab6b394c6544e9958'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e6ea1d40ed5cbb2e9b05cfab5a4f10d6a3720d6086b10b93a37d240c225f81fc', 'txt_hash': '520f59a6bdd2cd38a884c83edd1cf4eaeef37d850b044d777deee4aa54e2be51'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 833793, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 25, '/Author': 'Patrick REDON', '/CreationDate': "D:20041125180420+01'00'", '/Creator': 'Acrobat PDFMaker 5.0 pour Word', '/Keywords': 'CER/F/07.3', '/ModDate': "D:20041125180532+01'00'", '/Producer': 'Acrobat Distiller 5.0 (Windows)', '/Subject': 'Arkoon Fast Firewall v3.0/11 avec certification-eal2-qualification package (configurations A200, A500, A2000 et A5000)', '/Title': 'Rapport de certification 2004/33', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 244544, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 56, '/ModDate': "D:20041108183054+01'00'", '/CreationDate': "D:20041108183054+01'00'", '/Title': 'Microsoft Word - OMEGA-ST-2_7p.doc', '/Creator': 'PScript5.dll Version 5.2', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'bbrodard', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'Rapport de certification 2004/33': 13}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL7': 2, 'EAL4': 1, 'EAL21': 1, 'EAL1': 1, 'EAL3': 1, 'EAL5': 1}, 'ITSEC': {'ITSEC E6 et': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 1, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_HLD.2': 2, 'ADV_FSP.1': 1, 'ADV_RCR.1': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_FLR': 2, 'ALC_DVS.1': 3, 'ALC_FLR.3': 3, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.1': 2, 'AVA_VLA.2': 2, 'AVA_SOF.1': 1, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 2, 'FAU_SAR.1': 2, 'FAU_SAR.3': 2, 'FAU_STG.1': 2, 'FAU_STG.4': 2}, 'FDP': {'FDP_IFC.1': 2, 'FDP_IFC.2': 2, 'FDP_IFF.1': 2, 'FDP_RIP.1': 2}, 'FIA': {'FIA_ATD.1': 2, 'FIA_UAU.1': 2, 'FIA_UID.2': 2}, 'FMT': {'FMT_MOF.1': 2, 'FMT_MSA.1': 2, 'FMT_MSA.3': 2, 'FMT_MTD.1': 2, 'FMT_SMR.1': 2}, 'FPR': {'FPR_PSE.1': 2}, 'FPT': {'FPT_RVM.1': 3, 'FPT_SEP.1': 2, 'FPT_STM.1': 2}}, 'cc_claims': {'OE': {'OE.PHYSEC': 1, 'OE.LOCATE': 1, 'OE.SINUSE': 1, 'OE.GENPUR': 1, 'OE.PUBLIC': 1, 'OE.NOEVIL': 1, 'OE.ADMTRA': 1, 'OE.GUIDAN': 1, 'OE.SINGEN': 1, 'OE.NOREMO': 1}}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 9, 'EAL 2': 1, 'EAL2 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 14}, 'ADO': {'ADO_DEL.1': 8, 'ADO_IGS.1': 9}, 'ADV': {'ADV_HLD.2': 19, 'ADV_FSP.1': 19, 'ADV_RCR.1': 8, 'ADV_HLD.1': 2, 'ADV_IMP.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR': 1}, 'AGD': {'AGD_ADM.1': 18, 'AGD_USR.1': 14}, 'ALC': {'ALC_DVS.1': 12, 'ALC_FLR.3': 18, 'ALC_FLR': 1}, 'ATE': {'ATE_COV.1': 7, 'ATE_FUN.1': 13, 'ATE_IND.2': 10}, 'AVA': {'AVA_VLA.2': 17, 'AVA_MSU.1': 15, 'AVA_SOF.1': 10, 'AVA_VLA.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_SAR.1': 8, 'FAU_SAR.3': 10, 'FAU_STG.1': 7, 'FAU_STG.4': 7, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1}, 'FDP': {'FDP_IFC.2': 6, 'FDP_IFF.1': 18, 'FDP_IFC.1': 10, 'FDP_IFF.2': 1, 'FDP_RIP.1': 7, 'FDP_IFC.2.1': 1, 'FDP_IFC.2.2': 1, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2, 'FDP_IFC.1.1': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC': 1}, 'FIA': {'FIA_UAU.1': 10, 'FIA_UID.2': 9, 'FIA_ATD.1': 7, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MSA.1': 16, 'FMT_MSA.3': 9, 'FMT_MTD.1': 10, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 4, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_PSE.1': 15, 'FPR_PSE.1.1': 2, 'FPR_PSE.1.2': 2, 'FPR_PSE.1.3': 2}, 'FPT': {'FPT_RVM.1': 7, 'FPT_SEP.1': 7, 'FPT_STM.1': 8, 'FPT_STM.1.1': 3, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 7, 'O.MEDIAT': 7, 'O.MEDIATAPP': 6, 'O.SECSTA': 6, 'O.SELFPRO': 2, 'O.AUDREC': 7, 'O.ACCOUN': 6, 'O.SECFUN': 10, 'O.PRIVACY': 6, 'O.SELPRO': 7}, 'T': {'T.NOAUTH': 8, 'T.REPEAT': 2, 'T.ASPOOF': 4, 'T.MEDIAT': 5, 'T.PROT_MIS': 5, 'T.PRIVACY': 3, 'T.OLDINF': 3, 'T.AUDACC': 6, 'T.SELPRO': 3, 'T.AUDFUL': 4, 'T.NODETECT': 4, 'T.SYNFLOOD': 2, 'T.SELFPRO': 1}, 'A': {'A.PHYSEC': 2, 'A.GENPUR': 4, 'A.PUBLIC': 2, 'A.NOEVIL': 3, 'A.SINGEN': 2, 'A.DIRECT': 3, 'A.NOREMO': 3, 'A.LOCATE': 2, 'A.OSVER': 3, 'A.SINUSE': 2}, 'OE': {'OE.PHYSEC': 3, 'OE.GENPUR': 3, 'OE.PUBLIC': 3, 'OE.NOEVIL': 3, 'OE.SINGEN': 3, 'OE.DIRECT': 3, 'OE.NOREMO': 3, 'OE.LOCATE': 3, 'OE.OSVER': 3, 'OE.SINUSE': 3, 'OE.GUIDAN': 3, 'OE.ADMTRA': 3}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#12': 4}, 'ISO': {'ISO/IEC 15408-1': 1, 'ISO/IEC 15408-2': 1, 'ISO/IEC 15408-3': 1}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
2004_33.pdf
. - The st_filename property was set to
cible2004_33.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2004/33
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2004_33.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2004_33.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]}
values discarded. - The scheme_data property was set to
{'product': 'Arkoon Fast Firewall v3.0/11 avec certification-eal2-qualification package (configurations A200, A500, A2000 et A5000)', 'url': 'https://cyber.gouv.fr/produits-certifies/arkoon-fast-firewall-v3011-avec-certification-eal2-qualification-package', 'description': 'Le produit évalué est le pare-feu de Arkoon Network Security dans sa version 3.0/11 avec le correctif certification-eal2-qualifcation package, dans quatre configurations matérielles (A200, A500, A2000, A5000).\nIl est composé des éléments suivants : les composants logiciels du pare-feu, mettant en œuvre les fonctions de sécurité ; une station d'administration et de supervision ; un boîtier par', 'sponsor': 'Arkoon', 'developer': 'Arkoon', 'cert_id': '2004/33', 'level': 'EAL2+', 'enhanced': {'cert_id': '2004/33', 'certification_date': '23/11/2004', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Arkoon', 'sponsor': 'Arkoon', 'evaluation_facility': 'Oppida', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_HLD.2, ALC_DVS.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-33en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-33fr.pdf'}}
.
- The st property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Arkoon Fast Firewall v3.0/11 (configurations A200, A500, A2000 et A5000) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Boundary Protection Devices and Systems",
"cert_link": null,
"dgst": "8d299be0c3c2c590",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2004/33",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2004/33",
"description": "Le produit \u00e9valu\u00e9 est le pare-feu de Arkoon Network Security dans sa version 3.0/11 avec le correctif certification-eal2-qualifcation package, dans quatre configurations mat\u00e9rielles (A200, A500, A2000, A5000). Il est compos\u00e9 des \u00e9l\u00e9ments suivants : les composants logiciels du pare-feu, mettant en \u0153uvre les fonctions de s\u00e9curit\u00e9 ; une station d\u0026#39;administration et de supervision ; un bo\u00eetier par",
"developer": "Arkoon",
"enhanced": {
"augmented": "ADV_HLD.2, ALC_DVS.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2",
"category": "Produits r\u00e9seau",
"cc_version": "Crit\u00e8res Communs version 2.1",
"cert_id": "ANSSI-CC-2004/33",
"certification_date": "2004-11-23",
"developer": "Arkoon",
"evaluation_facility": "Oppida",
"level": "EAL2+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-33fr.pdf",
"sponsor": "Arkoon",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-33en.pdf"
},
"level": "EAL2+",
"product": "Arkoon Fast Firewall v3.0/11 avec certification-eal2-qualification package (configurations A200, A500, A2000 et A5000)",
"sponsor": "Arkoon",
"url": "https://cyber.gouv.fr/produits-certifies/arkoon-fast-firewall-v3011-avec-certification-eal2-qualification-package"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2007-06-07",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/M-2007_11fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance M-2007/11"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2008-06-11",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi_2004-33-m02fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance DCSSI-2004/33-M02"
}
]
},
"manufacturer": "Arkoon Network security",
"manufacturer_web": "https://www.arkoon.net/",
"name": "Arkoon Fast Firewall v3.0/11 (configurations A200, A500, A2000 et A5000)",
"not_valid_after": "2019-09-01",
"not_valid_before": "2004-11-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "2004_33.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"Rapport de certification 2004/33": 13
}
},
"cc_claims": {
"OE": {
"OE.ADMTRA": 1,
"OE.GENPUR": 1,
"OE.GUIDAN": 1,
"OE.LOCATE": 1,
"OE.NOEVIL": 1,
"OE.NOREMO": 1,
"OE.PHYSEC": 1,
"OE.PUBLIC": 1,
"OE.SINGEN": 1,
"OE.SINUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_CAP.2": 2,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_DEL.1": 2,
"ADO_IGS": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_HLD": 1,
"ADV_HLD.2": 2,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_RCR.1": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 1,
"AGD_USR": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.1": 3,
"ALC_FLR": 2,
"ALC_FLR.3": 3,
"ALC_TAT": 1
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.1": 2,
"AVA_SOF": 1,
"AVA_SOF.1": 1,
"AVA_VLA": 1,
"AVA_VLA.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL1": 1,
"EAL21": 1,
"EAL3": 1,
"EAL4": 1,
"EAL5": 1,
"EAL7": 2
},
"ITSEC": {
"ITSEC E6 et": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 2,
"FAU_SAR.1": 2,
"FAU_SAR.3": 2,
"FAU_STG.1": 2,
"FAU_STG.4": 2
},
"FDP": {
"FDP_IFC.1": 2,
"FDP_IFC.2": 2,
"FDP_IFF.1": 2,
"FDP_RIP.1": 2
},
"FIA": {
"FIA_ATD.1": 2,
"FIA_UAU.1": 2,
"FIA_UID.2": 2
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MSA.1": 2,
"FMT_MSA.3": 2,
"FMT_MTD.1": 2,
"FMT_SMR.1": 2
},
"FPR": {
"FPR_PSE.1": 2
},
"FPT": {
"FPT_RVM.1": 3,
"FPT_SEP.1": 2,
"FPT_STM.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
},
"ISO": {
"ISO/IEC 15408:1999": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Patrick REDON",
"/CreationDate": "D:20041125180420+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 pour Word",
"/Keywords": "CER/F/07.3",
"/ModDate": "D:20041125180532+01\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0 (Windows)",
"/Subject": "Arkoon Fast Firewall v3.0/11 avec certification-eal2-qualification package (configurations A200, A500, A2000 et A5000)",
"/Title": "Rapport de certification 2004/33",
"pdf_file_size_bytes": 833793,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 25
},
"st_filename": "cible2004_33.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DIRECT": 3,
"A.GENPUR": 4,
"A.LOCATE": 2,
"A.NOEVIL": 3,
"A.NOREMO": 3,
"A.OSVER": 3,
"A.PHYSEC": 2,
"A.PUBLIC": 2,
"A.SINGEN": 2,
"A.SINUSE": 2
},
"O": {
"O.ACCOUN": 6,
"O.AUDREC": 7,
"O.IDAUTH": 7,
"O.MEDIAT": 7,
"O.MEDIATAPP": 6,
"O.PRIVACY": 6,
"O.SECFUN": 10,
"O.SECSTA": 6,
"O.SELFPRO": 2,
"O.SELPRO": 7
},
"OE": {
"OE.ADMTRA": 3,
"OE.DIRECT": 3,
"OE.GENPUR": 3,
"OE.GUIDAN": 3,
"OE.LOCATE": 3,
"OE.NOEVIL": 3,
"OE.NOREMO": 3,
"OE.OSVER": 3,
"OE.PHYSEC": 3,
"OE.PUBLIC": 3,
"OE.SINGEN": 3,
"OE.SINUSE": 3
},
"T": {
"T.ASPOOF": 4,
"T.AUDACC": 6,
"T.AUDFUL": 4,
"T.MEDIAT": 5,
"T.NOAUTH": 8,
"T.NODETECT": 4,
"T.OLDINF": 3,
"T.PRIVACY": 3,
"T.PROT_MIS": 5,
"T.REPEAT": 2,
"T.SELFPRO": 1,
"T.SELPRO": 3,
"T.SYNFLOOD": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 14
},
"ADO": {
"ADO_DEL.1": 8,
"ADO_IGS.1": 9
},
"ADV": {
"ADV_FSP.1": 19,
"ADV_HLD.1": 2,
"ADV_HLD.2": 19,
"ADV_IMP.1": 2,
"ADV_LLD.1": 2,
"ADV_RCR": 1,
"ADV_RCR.1": 8
},
"AGD": {
"AGD_ADM.1": 18,
"AGD_USR.1": 14
},
"ALC": {
"ALC_DVS.1": 12,
"ALC_FLR": 1,
"ALC_FLR.3": 18
},
"ATE": {
"ATE_COV.1": 7,
"ATE_FUN.1": 13,
"ATE_IND.2": 10
},
"AVA": {
"AVA_MSU.1": 15,
"AVA_SOF.1": 10,
"AVA_VLA.1": 1,
"AVA_VLA.2": 17
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 9,
"EAL2 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 10,
"FAU_SAR.3.1": 2,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 7,
"FAU_STG.4.1": 1
},
"FDP": {
"FDP_IFC": 1,
"FDP_IFC.1": 10,
"FDP_IFC.1.1": 1,
"FDP_IFC.2": 6,
"FDP_IFC.2.1": 1,
"FDP_IFC.2.2": 1,
"FDP_IFF.1": 18,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 2,
"FDP_IFF.1.3": 2,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_IFF.1.6": 2,
"FDP_IFF.2": 1,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 3,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 16,
"FMT_MSA.1.1": 4,
"FMT_MSA.3": 9,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 2,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_PSE.1": 15,
"FPR_PSE.1.1": 2,
"FPR_PSE.1.2": 2,
"FPR_PSE.1.3": 2
},
"FPT": {
"FPT_RVM.1": 7,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 8,
"FPT_STM.1.1": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
},
"ISO": {
"ISO/IEC 15408-1": 1,
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1
},
"PKCS": {
"PKCS#12": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STM": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "bbrodard",
"/CreationDate": "D:20041108183054+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20041108183054+01\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "Microsoft Word - OMEGA-ST-2_7p.doc",
"pdf_file_size_bytes": 244544,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 56
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2004_33.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ADV_HLD.2",
"ALC_DVS.1",
"EAL2+",
"AVA_VLA.2",
"ALC_FLR.3",
"AVA_MSU.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2004_33.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bcda06e92ec9ca2efc7d70ad268382eaac4eaf8e3ca85eeb0dcc654034a51fc3",
"txt_hash": "10851a61bbb31abd6f64985f540e88648064fceb24a841cab6b394c6544e9958"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e6ea1d40ed5cbb2e9b05cfab5a4f10d6a3720d6086b10b93a37d240c225f81fc",
"txt_hash": "520f59a6bdd2cd38a884c83edd1cf4eaeef37d850b044d777deee4aa54e2be51"
}
},
"status": "archived"
}