V3Pro2004 and AhnLab Policy Center 3.0

CSV information ?

Status archived
Valid from 17.09.2007
Valid until 01.06.2019
Scheme 🇰🇷 KR
Manufacturer AhnLab, Inc.
Category Other Devices and Systems
Security level EAL4

Heuristics summary ?

Certificate ID: KECS-ISIS-0073-2007

Certificate ?

Certification report ?

Extracted keywords

Vendor
Microsoft

Security level
EAL4
Claims
O.ADMIN_ROLE, O.MANAGE, O.SELF_PROTECTION, O.VIRUS, O.AUDIT, O.ALARM, O.TSFDATA_PROTECT, O.INA, O.SECURE_UPDATE, O.STRENGTHENOS, A.NO_EVIL, A.PHYSICAL, A.SAFEITENTITY, A.TIMESTAMP, A.CERT, A.GUARD, A.INTERNALENTITY, A.AVCONFILICT, OE.AUDIT_STORAGE, OE.NO_EVIL, OE.PHYSICAL, OE.CERT, OE.SAFEITENTITY, OE.TIMESTAMP, OE.TOE_ACCESS, OE.GUARD, OE.INTERNALENTITY, OE.AVCONFLICT, OE.AUDIT_SEARCH, OE.RESIDUAL_INFO, OE.DOM_SEPARATION, OE.NO_BYPASS
Security Assurance Requirements (SAR)
ATE_COV, ATE_DPT
Certificates
KECS-ISIS-0073-2007
Evaluation facilities
KISA

Certification process
out of scope, If the administrator does not set the V3 security lock with Policy Agent in passive mode, it is out of scope of the evaluation because it is not enterprise environment, the TOE operating environment

File metadata

Title ISIS-73-EN.hwp
Author KYH
Creation date D:20071203103449+09'00'
Modification date D:20071203103449+09'00'
Pages 26
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 7.0.5 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
SEED
Schemes
MAC
Block cipher modes
CBC

Trusted Execution Environments
SE
Vendor
Microsoft

Security level
EAL4
Claims
O.ADMIN_ROLE, O.MANAGE, O.SELF_PROTECTION, O.VIRUS, O.AUDIT, O.ALARM, O.TSFDATA_PROTECT, O.INA, O.SECURE_UPDATE, O.STRENGTHENOS, O.AUIDT, T.AUDIT_COMPROMISE, T.MASQUERADE, T.TSF_COMPROMISE, T.UNATTEND_SESS, T.UNIDENTIFIED_ACTIONS, T.VIRUS, T.DOWN_INTERFERENCE, T.TRANS_DESTORY, T.RESIDUAL_DATA, A.NO_EVIL, A.SAFEITENTITY, A.TIMESTAMP, A.CERT, A.GUARD, A.INTERNALENTITY, A.AVCONFLICT, A.PHISICAL, OE.AUDIT_STORAGE, OE.NO_EVIL, OE.PHYSICAL, OE.CERT, OE.SAFEITENTITY, OE.TIMESTAMP, OE.TOE_ACCESS, OE.GAURD, OE.INTERNALENTITY, OE.AVCONFLICT, OE.AUDIT_SEARCH, OE.RESIDUAL_INFO, OE.DOM_SEPARATION, OE.NO_BYPASS, OE.PHISICAL, OE.GUARD
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.4, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.3, FAU_STG.1, FAU_STG.4.1, FAU_STG.1.1, FAU_STG.1.2, FAU_APR.1, FAU_SSA.1, FDP_ACF, FDP_IFC, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.6, FIA_UID.2, FIA_UID.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID.2.1, FMT_MOF.1, FMT_MTD.1, FMT_MTD.2, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_AMT.1, FPT_ITI.1, FPT_ITT.1, FPT_TST.1, FPT_STM.1, FPT_AMT.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_ITT.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_STM.1.1, FPT_SSL.3, FTA_SSL.4, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4.1, FTA_SSL.1, FTA_SSL.1.1, FTA_SSL.1.2

Side-channel analysis
malfunction
Certification process
out of scope, updates itself by the policy server’s command. 2.2.3 Out of Coverage 88 The following functions are out of scope of V3 Run as a Update Server 89 Without APC, V3 runs as an update server for the other V3s. V3 +, files for support of V3+ Neo. Since the operating system of the TOE is Windows XP, This is out of scope. 91 The following functions are out of scope for policy server. Hierarchical Domain Management , 98 APC uses SMS for notification on the situation that authorized administrator is set. This is out of scope because additional contract with a mobile service provider is necessary for this function. APC, 99 APC creates reports with pre-defined formats and audit records. This function is out of scope since it is independent with generating and storing audit records. AhnLab, Korea 24/109 APC, system in case that the system has been registered on the APC. 101 The following functions are out of scope for policy agent. User Information Input 102 An additional feature for the Policy Agent user

File metadata

Title Microsoft Word - ISIS-73-ST_EN.doc
Author KYH
Creation date D:20071203103747+09'00'
Modification date D:20071203103747+09'00'
Pages 109
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 7.0.5 (Windows)

Heuristics ?

Certificate ID: KECS-ISIS-0073-2007

Extracted SARs

AVA_SOF.1, ALC_TAT.1, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, ADV_LLD.1, ATE_IND.2, AGD_USR.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ADV_IMP.1, ATE_COV.2, ALC_DVS.1, ADV_FSP.2, ADV_HLD.2, ADV_SPM.1, AVA_VLA.2

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f514435e26cc9c8dff5803d25eb1fd8d7d27a01a2b3e531ec7501cc849660ba7', 'txt_hash': 'bf3dd12dff82550b2a7513473e0753d0acd73b2f4852b72b0d2f6d4a72eb66dd'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '189efb752d3feab5f82a62c288e1de6c72d9f815ab7d872a4617c1f23a7215be', 'txt_hash': '9dd24d6488691b91c2b4a0d3f172c58049d69cfe0c81ec6928c6dc9fb154c627'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 330437, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 26, '/CreationDate': "D:20071203103449+09'00'", '/Author': 'KYH', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20071203103449+09'00'", '/Title': 'ISIS-73-EN.hwp', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 796288, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 109, '/CreationDate': "D:20071203103747+09'00'", '/Author': 'KYH', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20071203103747+09'00'", '/Title': 'Microsoft Word - ISIS-73-ST_EN.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'KR': {'KECS-ISIS-0073-2007': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3}}, 'cc_sar': {'ATE': {'ATE_COV': 1, 'ATE_DPT': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 1, 'O.MANAGE': 1, 'O.SELF_PROTECTION': 1, 'O.VIRUS': 1, 'O.AUDIT': 1, 'O.ALARM': 1, 'O.TSFDATA_PROTECT': 1, 'O.INA': 1, 'O.SECURE_UPDATE': 1, 'O.STRENGTHENOS': 1}, 'A': {'A.NO_EVIL': 1, 'A.PHYSICAL': 1, 'A.SAFEITENTITY': 1, 'A.TIMESTAMP': 1, 'A.CERT': 1, 'A.GUARD': 1, 'A.INTERNALENTITY': 1, 'A.AVCONFILICT': 1}, 'OE': {'OE.AUDIT_STORAGE': 1, 'OE.NO_EVIL': 1, 'OE.PHYSICAL': 1, 'OE.CERT': 1, 'OE.SAFEITENTITY': 1, 'OE.TIMESTAMP': 1, 'OE.TOE_ACCESS': 1, 'OE.GUARD': 1, 'OE.INTERNALENTITY': 1, 'OE.AVCONFLICT': 1, 'OE.AUDIT_SEARCH': 1, 'OE.RESIDUAL_INFO': 1, 'OE.DOM_SEPARATION': 1, 'OE.NO_BYPASS': 1}}, 'vendor': {'Microsoft': {'Microsoft': 4}}, 'eval_facility': {'KISA': {'KISA': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'If the administrator does not set the V3 security lock with Policy Agent in passive mode, it is out of scope of the evaluation because it is not enterprise environment, the TOE operating environment': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 6}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.2': 3}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.2': 2, 'ADV_HLD.2': 2, 'ADV_IMP.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.1': 2, 'ADV_SPM.1': 2}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 2}, 'ALC': {'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 3, 'ATE_FUN.1': 2, 'ATE_IND.2': 3}, 'AVA': {'AVA_MSU.2': 4, 'AVA_SOF.1': 2, 'AVA_VLA.2': 3}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 10, 'FAU_GEN.1': 17, 'FAU_GEN.2': 9, 'FAU_SAA.1': 13, 'FAU_SAR.1': 20, 'FAU_SAR.2': 12, 'FAU_SAR.3': 13, 'FAU_STG.4': 11, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 2, 'FAU_STG.3': 1, 'FAU_STG.1': 6, 'FAU_STG.4.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_APR.1': 2, 'FAU_SSA.1': 1}, 'FDP': {'FDP_ACF': 4, 'FDP_IFC': 4}, 'FIA': {'FIA_AFL.1': 10, 'FIA_SOS.1': 10, 'FIA_UAU.2': 16, 'FIA_UAU.6': 14, 'FIA_UID.2': 18, 'FIA_UID.1': 8, 'FIA_UAU.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 2, 'FIA_UAU.6.1': 2, 'FIA_UID.2.1': 2}, 'FMT': {'FMT_MOF.1': 27, 'FMT_MTD.1': 32, 'FMT_MTD.2': 12, 'FMT_SMF.1': 31, 'FMT_SMR.1': 27, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_AMT.1': 10, 'FPT_ITI.1': 10, 'FPT_ITT.1': 16, 'FPT_TST.1': 13, 'FPT_STM.1': 7, 'FPT_AMT.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_ITT.1.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_STM.1.1': 1, 'FPT_SSL.3': 1}, 'FTA': {'FTA_SSL.4': 14, 'FTA_SSL.3': 15, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_SSL.1': 5, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 5, 'O.MANAGE': 14, 'O.SELF_PROTECTION': 5, 'O.VIRUS': 10, 'O.AUDIT': 10, 'O.ALARM': 6, 'O.TSFDATA_PROTECT': 8, 'O.INA': 16, 'O.SECURE_UPDATE': 6, 'O.STRENGTHENOS': 5, 'O.AUIDT': 2}, 'T': {'T.AUDIT_COMPROMISE': 8, 'T.MASQUERADE': 5, 'T.TSF_COMPROMISE': 9, 'T.UNATTEND_SESS': 5, 'T.UNIDENTIFIED_ACTIONS': 5, 'T.VIRUS': 4, 'T.DOWN_INTERFERENCE': 3, 'T.TRANS_DESTORY': 3, 'T.RESIDUAL_DATA': 3}, 'A': {'A.NO_EVIL': 3, 'A.SAFEITENTITY': 3, 'A.TIMESTAMP': 3, 'A.CERT': 3, 'A.GUARD': 3, 'A.INTERNALENTITY': 3, 'A.AVCONFLICT': 3, 'A.PHISICAL': 2}, 'OE': {'OE.AUDIT_STORAGE': 7, 'OE.NO_EVIL': 3, 'OE.PHYSICAL': 1, 'OE.CERT': 3, 'OE.SAFEITENTITY': 4, 'OE.TIMESTAMP': 7, 'OE.TOE_ACCESS': 13, 'OE.GAURD': 1, 'OE.INTERNALENTITY': 3, 'OE.AVCONFLICT': 3, 'OE.AUDIT_SEARCH': 5, 'OE.RESIDUAL_INFO': 2, 'OE.DOM_SEPARATION': 5, 'OE.NO_BYPASS': 5, 'OE.PHISICAL': 2, 'OE.GUARD': 2}}, 'vendor': {'Microsoft': {'Microsoft': 21}}, 'eval_facility': {}, 'symmetric_crypto': {'miscellaneous': {'SEED': {'SEED': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 6, 'updates itself by the policy server’s command. 2.2.3 Out of Coverage 88 The following functions are out of scope of V3 Run as a Update Server 89 Without APC, V3 runs as an update server for the other V3s. V3 +': 1, 'files for support of V3+ Neo. Since the operating system of the TOE is Windows XP, This is out of scope. 91 The following functions are out of scope for policy server. Hierarchical Domain Management ': 1, '98 APC uses SMS for notification on the situation that authorized administrator is set. This is out of scope because additional contract with a mobile service provider is necessary for this function. APC': 1, '99 APC creates reports with pre-defined formats and audit records. This function is out of scope since it is independent with generating and storing audit records. AhnLab, Korea 24/109 APC': 1, 'system in case that the system has been registered on the APC. 101 The following functions are out of scope for policy agent. User Information Input 102 An additional feature for the Policy Agent user': 1}}}.
    • The report_filename property was set to ISIS-73-EN.pdf.
    • The st_filename property was set to ISIS-73-ST-EN.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to KECS-ISIS-0073-2007.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-EN.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-ST-EN.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name V3Pro2004 and AhnLab Policy Center 3.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "a8f7a4c49c242ddc",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "KECS-ISIS-0073-2007",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "AhnLab, Inc.",
  "manufacturer_web": "https://www.ahnlab.com/",
  "name": "V3Pro2004 and AhnLab Policy Center 3.0",
  "not_valid_after": "2019-06-01",
  "not_valid_before": "2007-09-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ISIS-73-EN.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "KR": {
          "KECS-ISIS-0073-2007": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.AVCONFILICT": 1,
          "A.CERT": 1,
          "A.GUARD": 1,
          "A.INTERNALENTITY": 1,
          "A.NO_EVIL": 1,
          "A.PHYSICAL": 1,
          "A.SAFEITENTITY": 1,
          "A.TIMESTAMP": 1
        },
        "O": {
          "O.ADMIN_ROLE": 1,
          "O.ALARM": 1,
          "O.AUDIT": 1,
          "O.INA": 1,
          "O.MANAGE": 1,
          "O.SECURE_UPDATE": 1,
          "O.SELF_PROTECTION": 1,
          "O.STRENGTHENOS": 1,
          "O.TSFDATA_PROTECT": 1,
          "O.VIRUS": 1
        },
        "OE": {
          "OE.AUDIT_SEARCH": 1,
          "OE.AUDIT_STORAGE": 1,
          "OE.AVCONFLICT": 1,
          "OE.CERT": 1,
          "OE.DOM_SEPARATION": 1,
          "OE.GUARD": 1,
          "OE.INTERNALENTITY": 1,
          "OE.NO_BYPASS": 1,
          "OE.NO_EVIL": 1,
          "OE.PHYSICAL": 1,
          "OE.RESIDUAL_INFO": 1,
          "OE.SAFEITENTITY": 1,
          "OE.TIMESTAMP": 1,
          "OE.TOE_ACCESS": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "If the administrator does not set the V3 security lock with Policy Agent in passive mode, it is out of scope of the evaluation because it is not enterprise environment, the TOE operating environment": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "KISA": {
          "KISA": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "KYH",
      "/CreationDate": "D:20071203103449+09\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20071203103449+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Title": "ISIS-73-EN.hwp",
      "pdf_file_size_bytes": 330437,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    },
    "st_filename": "ISIS-73-ST-EN.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AVCONFLICT": 3,
          "A.CERT": 3,
          "A.GUARD": 3,
          "A.INTERNALENTITY": 3,
          "A.NO_EVIL": 3,
          "A.PHISICAL": 2,
          "A.SAFEITENTITY": 3,
          "A.TIMESTAMP": 3
        },
        "O": {
          "O.ADMIN_ROLE": 5,
          "O.ALARM": 6,
          "O.AUDIT": 10,
          "O.AUIDT": 2,
          "O.INA": 16,
          "O.MANAGE": 14,
          "O.SECURE_UPDATE": 6,
          "O.SELF_PROTECTION": 5,
          "O.STRENGTHENOS": 5,
          "O.TSFDATA_PROTECT": 8,
          "O.VIRUS": 10
        },
        "OE": {
          "OE.AUDIT_SEARCH": 5,
          "OE.AUDIT_STORAGE": 7,
          "OE.AVCONFLICT": 3,
          "OE.CERT": 3,
          "OE.DOM_SEPARATION": 5,
          "OE.GAURD": 1,
          "OE.GUARD": 2,
          "OE.INTERNALENTITY": 3,
          "OE.NO_BYPASS": 5,
          "OE.NO_EVIL": 3,
          "OE.PHISICAL": 2,
          "OE.PHYSICAL": 1,
          "OE.RESIDUAL_INFO": 2,
          "OE.SAFEITENTITY": 4,
          "OE.TIMESTAMP": 7,
          "OE.TOE_ACCESS": 13
        },
        "T": {
          "T.AUDIT_COMPROMISE": 8,
          "T.DOWN_INTERFERENCE": 3,
          "T.MASQUERADE": 5,
          "T.RESIDUAL_DATA": 3,
          "T.TRANS_DESTORY": 3,
          "T.TSF_COMPROMISE": 9,
          "T.UNATTEND_SESS": 5,
          "T.UNIDENTIFIED_ACTIONS": 5,
          "T.VIRUS": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 2,
          "ACM_CAP.4": 2,
          "ACM_SCP.2": 3
        },
        "ADO": {
          "ADO_DEL.2": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP.2": 2,
          "ADV_HLD.2": 2,
          "ADV_IMP.1": 2,
          "ADV_LLD.1": 2,
          "ADV_RCR.1": 2,
          "ADV_SPM.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 3,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS.1": 2,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 2
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 3
        },
        "AVA": {
          "AVA_MSU.2": 4,
          "AVA_SOF.1": 2,
          "AVA_VLA.2": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 6
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_APR.1": 2,
          "FAU_ARP.1": 10,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 17,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 9,
          "FAU_GEN.2.1": 1,
          "FAU_SAA.1": 13,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 20,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 2,
          "FAU_SAR.2": 12,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 13,
          "FAU_SAR.3.1": 2,
          "FAU_SSA.1": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 11,
          "FAU_STG.4.1": 1
        },
        "FDP": {
          "FDP_ACF": 4,
          "FDP_IFC": 4
        },
        "FIA": {
          "FIA_AFL.1": 10,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_SOS.1": 10,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 6,
          "FIA_UAU.2": 16,
          "FIA_UAU.2.1": 2,
          "FIA_UAU.6": 14,
          "FIA_UAU.6.1": 2,
          "FIA_UID.1": 8,
          "FIA_UID.2": 18,
          "FIA_UID.2.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 27,
          "FMT_MOF.1.1": 1,
          "FMT_MTD.1": 32,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.2": 12,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_SMF.1": 31,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 27,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 10,
          "FPT_AMT.1.1": 1,
          "FPT_ITI.1": 10,
          "FPT_ITI.1.1": 1,
          "FPT_ITI.1.2": 1,
          "FPT_ITT.1": 16,
          "FPT_ITT.1.1": 2,
          "FPT_SSL.3": 1,
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 13,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.1": 5,
          "FTA_SSL.1.1": 1,
          "FTA_SSL.1.2": 1,
          "FTA_SSL.3": 15,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 14,
          "FTA_SSL.4.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "98 APC uses SMS for notification on the situation that authorized administrator is set. This is out of scope because additional contract with a mobile service provider is necessary for this function. APC": 1,
          "99 APC creates reports with pre-defined formats and audit records. This function is out of scope since it is independent with generating and storing audit records. AhnLab, Korea 24/109 APC": 1,
          "files for support of V3+ Neo. Since the operating system of the TOE is Windows XP, This is out of scope. 91 The following functions are out of scope for policy server. Hierarchical Domain Management ": 1,
          "out of scope": 6,
          "system in case that the system has been registered on the APC. 101 The following functions are out of scope for policy agent. User Information Input 102 An additional feature for the Policy Agent user": 1,
          "updates itself by the policy server\u2019s command. 2.2.3 Out of Coverage 88 The following functions are out of scope of V3 Run as a Update Server 89 Without APC, V3 runs as an update server for the other V3s. V3 +": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {
        "miscellaneous": {
          "SEED": {
            "SEED": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 21
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "KYH",
      "/CreationDate": "D:20071203103747+09\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20071203103747+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Title": "Microsoft Word - ISIS-73-ST_EN.doc",
      "pdf_file_size_bytes": 796288,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 109
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-EN.pdf",
  "scheme": "KR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-ST-EN.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f514435e26cc9c8dff5803d25eb1fd8d7d27a01a2b3e531ec7501cc849660ba7",
      "txt_hash": "bf3dd12dff82550b2a7513473e0753d0acd73b2f4852b72b0d2f6d4a72eb66dd"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "189efb752d3feab5f82a62c288e1de6c72d9f815ab7d872a4617c1f23a7215be",
      "txt_hash": "9dd24d6488691b91c2b4a0d3f172c58049d69cfe0c81ec6928c6dc9fb154c627"
    }
  },
  "status": "archived"
}