Security Threat Exclusion System SHIELD/ExLink-IA 1.0

CSV information ?

Status archived
Valid from 22.03.2007
Valid until 07.10.2013
Scheme 🇯🇵 JP
Manufacturer Hitachi Information Systems, Ltd
Category Network and Network-Related Devices and Systems
Security level EAL1

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0090

Certificate ?

Certification report ?

Extracted keywords

Security level
EAL1
Certificates
Certification No. C0090
Evaluation facilities
Information Technology Security Center

File metadata

Title untitled
Creation date D:20070323205523+09'00'
Modification date D:20070323205523+09'00'
Pages 1
Producer Acrobat Distiller 6.0 (Windows)

Security target ?

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0090

Similar certificates

Name Certificate ID
Security Threat Exclusion System SHIELD/ExLink-IA 1.0 JISEC-CC-CRP-C0090 Compare

Scheme data ?

Cert Id JISEC-CC-CRP-C0090
Supplier Hitachi Information Systems, Ltd
Toe Overseas Name -----
Expiration Date 01.10.2013
Claim EAL1
Certification Date 01.03.2007
Toe Overseas Link None
Toe Japan Name Security Threat Exclusion System SHIELD/ExLink-IA 1.0
Toe Japan Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0090_it6114.html
Enhanced
Product Security Threat Exclusion System SHIELD/ExLink-IA
Toe Version 1.0
Product Type IT Product (Security Management Software)
Assurance Level EAL1
Vendor Hitachi Information Systems, Ltd
Evaluation Facility Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)
Description PRODUCT DESCRIPTION This product is a network management software that collects security logs from monitored FWs (*1) and IPSs(*2), sends them to SOC(*3) for analysis, and changes the FW's settings based on the instructions from SOC. (*1) abbreviation of Firewall. Network server that protects internal network resources from external network. (*2) abbreviation of Intrusion Prevention System. Software tool that prevents unauthorized access to server and network. It extends a function of IDS to detect unauthorized access, and take countermeasures such as blocking connections in real-time when detected. (*3) abbreviation of Security Operation Center. Facilities that receives security logs from SHIELD/ExLink-IAs and maintains an application software called "i-Monitor" to issue instructions to change FW's settings to HIELD/ExLink-IAs.

References ?

No references are available for this certificate.

Updates ?

  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL1'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'JISEC-CC-CRP-C0090', 'supplier': 'Hitachi Information Systems, Ltd', 'expiration_date': '2013-10-01', 'certification_date': '2007-03-01', 'toe_japan_name': 'Security Threat Exclusion System SHIELD/ExLink-IA 1.0', 'enhanced': {'__update__': {'description': 'PRODUCT DESCRIPTION This product is a network management software that collects security logs from monitored FWs (*1) and IPSs(*2), sends them to SOC(*3) for analysis, and changes the FW\'s settings based on the instructions from SOC. (*1) abbreviation of Firewall. Network server that protects internal network resources from external network. (*2) abbreviation of Intrusion Prevention System. Software tool that prevents unauthorized access to server and network. It extends a function of IDS to detect unauthorized access, and take countermeasures such as blocking connections in real-time when detected. (*3) abbreviation of Security Operation Center. Facilities that receives security logs from SHIELD/ExLink-IAs and maintains an application software called "i-Monitor" to issue instructions to change FW\'s settings to HIELD/ExLink-IAs.'}, '__delete__': ['certification_date']}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0090', 'supplier': 'Hitachi Information Systems, Ltd', 'toe_overseas_name': '-----', 'expiration_date': '2013-10', 'claim': 'EAL1', 'certification_date': '2007-03', 'toe_overseas_link': None, 'toe_japan_name': 'Security Threat Exclusion\n System SHIELD/ExLink-IA\n 1.0', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0090_it6114.html', 'enhanced': {'product': 'Security Threat Exclusion System SHIELD/ExLink-IA', 'toe_version': '1.0', 'product_type': 'IT Product (Security Management Software)', 'certification_date': '2007-03-22', 'assurance_level': 'EAL1', 'vendor': 'Hitachi Information Systems, Ltd', 'evaluation_facility': 'Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)', 'description': 'PRODUCT DESCRIPTION This product is a network management software that collects security logs from monitored FWs (*1) and IPSs(*2), sends them to SOC(*3) for analysis, and changes the FW\'s settings based on the instructions from SOC. (*1) abbreviation of Firewall. Network server that protects internal network resources from external network. (*2) abbreviation of Intrusion Prevention System. Software tool that prevents unauthorized access to server and network. It extends a function of IDS to detect unauthorized access, and take countermeasures such as blocking connections in real-time when detected. (*3) abbreviation of Security Operation Center. Facilities that receives security logs from SHIELD/ExLink-IAs and maintains an application software called "i-Monitor" to issue instructions to change FW\'s settings to HIELD/ExLink-IAs.'}}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '166372c405bb530a8bd7cb0b70031719c0d03622771498515d18b283ec9b9bba', 'txt_hash': 'f75e12ef29347b004fb42a1c8f5e6d189a0568b19087b83c25e27a60d5b2f0ad'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 13145, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20070323205523+09'00'", '/CreationDate': "D:20070323205523+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'Certification No. C0090': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0090_ecvr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0090.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Security Threat Exclusion System SHIELD/ExLink-IA 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "977c07af0c4fe4e1",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0090",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL1",
    "extracted_sars": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0090",
      "certification_date": "2007-03-01",
      "claim": "EAL1",
      "enhanced": {
        "assurance_level": "EAL1",
        "description": "PRODUCT DESCRIPTION This product is a network management software that collects security logs from monitored FWs (*1) and IPSs(*2), sends them to SOC(*3) for analysis, and changes the FW\u0027s settings based on the instructions from SOC. (*1) abbreviation of Firewall. Network server that protects internal network resources from external network. (*2) abbreviation of Intrusion Prevention System. Software tool that prevents unauthorized access to server and network. It extends a function of IDS to detect unauthorized access, and take countermeasures such as blocking connections in real-time when detected. (*3) abbreviation of Security Operation Center. Facilities that receives security logs from SHIELD/ExLink-IAs and maintains an application software called \"i-Monitor\" to issue instructions to change FW\u0027s settings to HIELD/ExLink-IAs.",
        "evaluation_facility": "Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)",
        "product": "Security Threat Exclusion System SHIELD/ExLink-IA",
        "product_type": "IT Product (Security Management Software)",
        "toe_version": "1.0",
        "vendor": "Hitachi Information Systems, Ltd"
      },
      "expiration_date": "2013-10-01",
      "supplier": "Hitachi Information Systems, Ltd",
      "toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0090_it6114.html",
      "toe_japan_name": "Security Threat Exclusion System SHIELD/ExLink-IA 1.0",
      "toe_overseas_link": null,
      "toe_overseas_name": "-----"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Hitachi Information Systems, Ltd",
  "manufacturer_web": null,
  "name": "Security Threat Exclusion System SHIELD/ExLink-IA 1.0",
  "not_valid_after": "2013-10-07",
  "not_valid_before": "2007-03-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0090_ecvr.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "Certification No. C0090": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL1": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ITSC": {
          "Information Technology Security Center": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20070323205523+09\u002700\u0027",
      "/ModDate": "D:20070323205523+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 13145,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profile_links": null,
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0090_ecvr.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "166372c405bb530a8bd7cb0b70031719c0d03622771498515d18b283ec9b9bba",
      "txt_hash": "f75e12ef29347b004fb42a1c8f5e6d189a0568b19087b83c25e27a60d5b2f0ad"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "archived"
}