This page was not yet optimized for use on mobile
devices.
Cryptographic Security Platform (CSP) | PKI Hub, Version 1.2
CSV information
| Status | active |
|---|---|
| Valid from | 24.01.2026 |
| Valid until | 24.01.2031 |
| Scheme | 🇪🇸 ES |
| Manufacturer | Entrust EU, SL |
| Category | Other Devices and Systems |
| Security level | ALC_FLR.2, EAL4+ |
Heuristics summary
Certificate ID: 2024-51-INF-4692
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 2Claims
T.I, A.USecurity Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2Certification report
Extracted keywords
Security level
EAL 4, EAL4, EAL 1, EAL 2, EAL2, ITSEC EvaluationClaims
A.USecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_FLR, ATE_IND.2, ATE_FUN.1, ATE_COV.2, ATE_DPT.1, AVA_VAN.3, ASE_INT.1, ASE_CCL.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.3, FAU_STG.4, FCS_CKM.1, FCS_CKM.3, FCS_COP.1, FCS_TLSC_EXT, FCS_TLSS_EXT, FDP_ACC, FDP_ACF, FDP_ITC, FDP_ETC, FDP_IFC, FDP_IFF, FDP_OCSP_EXT.1.1, FDP_TST_EXT.1.1, FIA_UID.2, FMT_MSA, FMT_SMF, FMT_MTD, FMT_SMR.1, FPT_TDC, FPT_STM.1, FTP_TRP, FTP_ITCCertificates
2024-51-INF-4692- v1Evaluation facilities
DEKRA Testing and CertificationStandards
RFC 6960File metadata
| Pages | 14 |
|---|
Security target
Extracted keywords
Asymmetric Algorithms
RSA-PSS, ECDSA, ECC, DSAHash functions
SHA256, SHA-256Protocols
SSH, TLS, TLS 1.3, TLS 1.2Randomness
RNG, RBGElliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521, secp256r1, secp384r1, secp521r1, prime256v1, prime384v1, prime521v1, Curve25519TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305JavaCard API constants
X25519Vendor
MicrosoftSecurity level
EAL4, EAL 4, EAL4+Claims
O.AUDIT, O.USER_AUTHENTICATION, O.RBAC, O.PUBLIC_KEY_MANAGEMENT, O.SYNCHRONISATION, O.AUDIT_PROTECTION, O.CRYPTO, O.OCSP_R, O.TST, O.USER_AUTHENTICATI, O.PUBLIC_KEY_MANAG, O.USER_AUTHENTIC, O.PUBLIC_KEY_MAN, O.AUDIT_PROTECTI, O.TXT, T.CONTEXT_ALTERATION, T.DATE_AND_TIME_ALTERATION, T.PRIVATE_KEY_ALTERATION, T.PUBLIC_KEY_ALTERATION, T.PRIVATE_KEY_DERIVATION, T.PRIVATE_KEY_DISCLOSURE, T.CRYPTO, T.MISUSE, T.INSECURE_INITIALISATION, T.AUDIT_ALTERATION, T.UNRELIABLE_OCSP_RESPONSE, T.UNRELIABLE_TST, T.EXTERNAL, T.INSIDER, A.VAS, A.ACCESS_PROTECTED, A.REF_TIME, A.OCSPRESPONSE_VERIFICATION, A.TIMESTAMP_VERIFICATION, A.AUDIT_REVIEW, A.CA, A.CERTIFIED_CM, A.SECURE_BACKUP, A.OCSPESPONSE_VERIFICATION, R.OCSP_REQUEST, R.OCSP_RESPONSE, R.OCSP_CONTEXT, R.OCSP_KEY_PAIR_PUB, R.OCSP_KEY_PAIR_PRIV, R.TST_REQUEST, R.TST_TOKEN, R.TST_CONTEXT, R.DATE_AND_TIME, R.TST_KEY_PAIR_PUB, R.TST_KEY_PAIR_PRIV, R.TLS_CONTEXT, R.AUDIT_DATA, R.TSF_DATA, R.KEY_PAIR_PRIV, R.KEY_PAIR_PUB, R.DATA_AND_TIME, OP.OCSP_CONTEXT_CREATION, OP.OCSP_CONTEXT_MODIFICATION, OP.OCSP_CONTEXT_DESTRUCTION, OP.OCSP_CONTEXT_CONSULTATION, OP.TST_CONTEXT_CREATION, OP.TST_CONTEXT_MODIFICATION, OP.TST_CONTEXT_DESTRUCTION, OP.TST_CONTEXT_CONSULTATION, OP.TIMESTAMPCONTEXT_MODIFICATION, OP.OCSP_PUBLIC_KEY_EXPORT, OP.OCSP_UNIT_CERTIFICATE_IMPORT, OP.TST_PUBLIC_KEY_EXPORT, OP.TST_UNIT_CERTIFICATE_IMPORT, OP.OCSP_RESPONSE_CREATION, OP.OCSP_RESPONSE, OP.OCSP_RESPONSE_SIGNATURE, OP.TST_TOKEN_CREATION, OP.TST_TOKEN_RESPONSE, OP.TST_TOKEN_SIGNATURE, OP.INIT_DATE_AND_TIME, OP.TIMESATMP_CONTEXT_CONSULTATION, OE.ORS, OE.TSS, OE.KEY_PAIR_GENERATION, OE.PRIVATE_KEY_MANAGEMENT, OE.PROTECT_ACCESS, OE.PERSONNEL, OE.SECURE_INIT, OE.SECURE_OPER, OE.OCSPRESPONSE_VERIFICATION, OE.TIMESTAMP_VERIFICATION, OE.AUDIT_REVIEW, OE.CA, OE.CERTIFIED_CM, OE.SECURE_BACKUP, OE.KEY_PAIR_GENERAT, OE.PRIVATE_KEY_, OE.OCSPRESPONSE_VE, OE.KEY_PAIR_GENE, OE.PROTECT_ACCES, OSP.ALGORITHMS, OSP.OCSP_SERVICE, OSP.TIMESTAMP_SERVICE, OSP.OCSP_REQUEST_MGMT, OSP.TIMESTAMP_REQUEST_MGMT, OSP.CLOCKSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP, ADV_TDS.1, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ALC_CMS.3, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3, FAU_SAR.3.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.4, FAU_STG.1, FAU_STG.4.1, FAU_STG, FCS_TLSC_EXT, FCS_TLSC_EXT.1, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSS_EXT, FCS_TLSS_EXT.1, FCS_TLSS_EXT.1.1, FCS_TLSS_EXT.1.2, FCS_TLSS_EXT.1.3, FCS_CKM.1, FCS_CKM.2, FCS_CKM.5, FCS_COP.1, FCS_CKM.3, FCS_RBG.1, FCS_RNG.1, FCS_CKM.6, FCS_CKM.1.1, FCS_CKM.3.1, FCS_CKM.6.1, FCS_CKM.6.2, FCS_COP.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FDP_OCSP_EXT, FDP_OCSP_EXT.1, FDP_OCSP_EXT.1.1, FDP_TST_EXT, FDP_TST_EXT.1, FDP_TST_EXT.1.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF, FDP_ACC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ETC, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_TST_TST.1.1, FDP_ITC.1, FDP_ITC.2, FIA_UID.1, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FMT_MSA.3, FMT_MSA, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF, FMT_SMF.1.1, FMT_MTD, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_ACF.1, FPT_TDC.1, FPT_TDC, FPT_TDC.1.1, FPT_TDC.1.2, FPT_STM.1, FPT_STM.1.1, FTP_ITC.1, FTP_TRP.1, FTP_TRP, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Side-channel analysis
side channelStandards
FIPS PUB 140-2, FIPS 140-3, FIPS 186-4, PKCS#1, AIS 31, AIS31, RFC 6960, RFC 3161, RFC 8446, RFC 5246, RFC 3268, RFC 8422, RFC 5288, RFC 5289, RFC 7748, RFC 3447, ISO/IEC 15408, ISO/IEC 19790, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 19790:2006, X.509File metadata
| Pages | 118 |
|---|
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2024-51-INF-4692Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-51_Certificado.pdf",
"dgst": "b18868570082052a",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "2024-51-INF-4692",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Entrust EU, SL",
"manufacturer_web": "https://www.entrust.com/",
"name": "Cryptographic Security Platform (CSP) | PKI Hub, Version 1.2",
"not_valid_after": "2031-01-24",
"not_valid_before": "2026-01-24",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "2024-51_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.U": 1
},
"T": {
"T.I": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "2024-51_INF-4692.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2024-51-INF-4692- v1": 1
}
},
"cc_claims": {
"A": {
"A.U": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR": 3,
"ALC_FLR.2": 4,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 4,
"EAL2": 1,
"EAL4": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAR.3": 1,
"FAU_STG.4": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.3": 1,
"FCS_COP.1": 1,
"FCS_TLSC_EXT": 3,
"FCS_TLSS_EXT": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACF": 3,
"FDP_ETC": 1,
"FDP_IFC": 1,
"FDP_IFF": 1,
"FDP_ITC": 4,
"FDP_OCSP_EXT.1.1": 1,
"FDP_TST_EXT.1.1": 1
},
"FIA": {
"FIA_UID.2": 1
},
"FMT": {
"FMT_MSA": 5,
"FMT_MTD": 1,
"FMT_SMF": 3,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_STM.1": 1,
"FPT_TDC": 2
},
"FTP": {
"FTP_ITC": 4,
"FTP_TRP": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DEKRA": {
"DEKRA Testing and Certification": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 6960": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 331640,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "2024-51_ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA-PSS": 2
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS_PROTECTED": 4,
"A.AUDIT_REVIEW": 2,
"A.CA": 3,
"A.CERTIFIED_CM": 2,
"A.OCSPESPONSE_VERIFICATION": 1,
"A.OCSPRESPONSE_VERIFICATION": 2,
"A.REF_TIME": 1,
"A.SECURE_BACKUP": 3,
"A.TIMESTAMP_VERIFICATION": 2,
"A.VAS": 3
},
"O": {
"O.AUDIT": 12,
"O.AUDIT_PROTECTI": 1,
"O.AUDIT_PROTECTION": 4,
"O.CRYPTO": 7,
"O.OCSP_R": 5,
"O.PUBLIC_KEY_MAN": 1,
"O.PUBLIC_KEY_MANAG": 1,
"O.PUBLIC_KEY_MANAGEMENT": 4,
"O.RBAC": 8,
"O.SYNCHRONISATION": 5,
"O.TST": 4,
"O.TXT": 1,
"O.USER_AUTHENTIC": 1,
"O.USER_AUTHENTICATI": 1,
"O.USER_AUTHENTICATION": 5
},
"OE": {
"OE.AUDIT_REVIEW": 11,
"OE.CA": 4,
"OE.CERTIFIED_CM": 4,
"OE.KEY_PAIR_GENE": 1,
"OE.KEY_PAIR_GENERAT": 1,
"OE.KEY_PAIR_GENERATION": 3,
"OE.OCSPRESPONSE_VE": 1,
"OE.OCSPRESPONSE_VERIFICATION": 3,
"OE.ORS": 5,
"OE.PERSONNEL": 11,
"OE.PRIVATE_KEY_": 2,
"OE.PRIVATE_KEY_MANAGEMENT": 4,
"OE.PROTECT_ACCES": 1,
"OE.PROTECT_ACCESS": 5,
"OE.SECURE_BACKUP": 6,
"OE.SECURE_INIT": 3,
"OE.SECURE_OPER": 5,
"OE.TIMESTAMP_VERIFICATION": 1,
"OE.TSS": 3
},
"OP": {
"OP.INIT_DATE_AND_TIME": 2,
"OP.OCSP_CONTEXT_CONSULTATION": 7,
"OP.OCSP_CONTEXT_CREATION": 9,
"OP.OCSP_CONTEXT_DESTRUCTION": 8,
"OP.OCSP_CONTEXT_MODIFICATION": 8,
"OP.OCSP_PUBLIC_KEY_EXPORT": 2,
"OP.OCSP_RESPONSE": 1,
"OP.OCSP_RESPONSE_CREATION": 2,
"OP.OCSP_RESPONSE_SIGNATURE": 2,
"OP.OCSP_UNIT_CERTIFICATE_IMPORT": 4,
"OP.TIMESATMP_CONTEXT_CONSULTATION": 1,
"OP.TIMESTAMPCONTEXT_MODIFICATION": 1,
"OP.TST_CONTEXT_CONSULTATION": 5,
"OP.TST_CONTEXT_CREATION": 8,
"OP.TST_CONTEXT_DESTRUCTION": 7,
"OP.TST_CONTEXT_MODIFICATION": 6,
"OP.TST_PUBLIC_KEY_EXPORT": 2,
"OP.TST_TOKEN_CREATION": 2,
"OP.TST_TOKEN_RESPONSE": 1,
"OP.TST_TOKEN_SIGNATURE": 2,
"OP.TST_UNIT_CERTIFICATE_IMPORT": 4
},
"OSP": {
"OSP.ALGORITHMS": 2,
"OSP.CLOCK": 1,
"OSP.OCSP_REQUEST_MGMT": 2,
"OSP.OCSP_SERVICE": 3,
"OSP.TIMESTAMP_REQUEST_MGMT": 1,
"OSP.TIMESTAMP_SERVICE": 1
},
"R": {
"R.AUDIT_DATA": 11,
"R.DATA_AND_TIME": 2,
"R.DATE_AND_TIME": 9,
"R.KEY_PAIR_PRIV": 3,
"R.KEY_PAIR_PUB": 2,
"R.OCSP_CONTEXT": 14,
"R.OCSP_KEY_PAIR_PRIV": 17,
"R.OCSP_KEY_PAIR_PUB": 11,
"R.OCSP_REQUEST": 8,
"R.OCSP_RESPONSE": 8,
"R.TLS_CONTEXT": 3,
"R.TSF_DATA": 9,
"R.TST_CONTEXT": 12,
"R.TST_KEY_PAIR_PRIV": 17,
"R.TST_KEY_PAIR_PUB": 12,
"R.TST_REQUEST": 8,
"R.TST_TOKEN": 7
},
"T": {
"T.AUDIT_ALTERATION": 3,
"T.CONTEXT_ALTERATION": 6,
"T.CRYPTO": 2,
"T.DATE_AND_TIME_ALTERATION": 4,
"T.EXTERNAL": 2,
"T.INSECURE_INITIALISATION": 2,
"T.INSIDER": 2,
"T.MISUSE": 15,
"T.PRIVATE_KEY_ALTERATION": 4,
"T.PRIVATE_KEY_DERIVATION": 4,
"T.PRIVATE_KEY_DISCLOSURE": 3,
"T.PUBLIC_KEY_ALTERATION": 5,
"T.UNRELIABLE_OCSP_RESPONSE": 2,
"T.UNRELIABLE_TST": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP": 2,
"ADV_FSP.1": 2,
"ADV_FSP.2": 3,
"ADV_FSP.4": 8,
"ADV_IMP.1": 5,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 8
},
"AGD": {
"AGD_OPE.1": 6,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 2,
"ALC_DVS.1": 4,
"ALC_FLR.2": 6,
"ALC_LCD.1": 4,
"ALC_TAT.1": 4
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 5,
"ASE_INT.1": 6,
"ASE_OBJ.2": 4,
"ASE_REQ.1": 2,
"ASE_REQ.2": 4,
"ASE_SPD.1": 3,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 4,
"ATE_DPT.1": 1,
"ATE_FUN.1": 7,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL4": 4,
"EAL4+": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 4,
"FAU_SAR.3.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 1,
"FAU_STG.2": 6,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.4": 3,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.3": 10,
"FCS_CKM.3.1": 1,
"FCS_CKM.5": 6,
"FCS_CKM.6": 8,
"FCS_CKM.6.1": 2,
"FCS_CKM.6.2": 1,
"FCS_COP.1": 8,
"FCS_COP.1.1": 1,
"FCS_RBG.1": 2,
"FCS_RNG.1": 6,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1,
"FCS_TLSC_EXT": 14,
"FCS_TLSC_EXT.1": 4,
"FCS_TLSC_EXT.1.1": 9,
"FCS_TLSC_EXT.1.2": 4,
"FCS_TLSC_EXT.1.3": 4,
"FCS_TLSS_EXT": 6,
"FCS_TLSS_EXT.1": 2,
"FCS_TLSS_EXT.1.1": 2,
"FCS_TLSS_EXT.1.2": 2,
"FCS_TLSS_EXT.1.3": 2
},
"FDP": {
"FDP_ACC": 23,
"FDP_ACC.1": 27,
"FDP_ACC.1.1": 3,
"FDP_ACF": 15,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 3,
"FDP_ETC": 5,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 9,
"FDP_IFC.1": 18,
"FDP_IFC.1.1": 1,
"FDP_IFF": 5,
"FDP_IFF.1": 2,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC": 18,
"FDP_ITC.1": 7,
"FDP_ITC.1.1": 2,
"FDP_ITC.1.2": 2,
"FDP_ITC.1.3": 2,
"FDP_ITC.2": 6,
"FDP_ITC.2.1": 2,
"FDP_ITC.2.2": 2,
"FDP_ITC.2.3": 2,
"FDP_ITC.2.4": 2,
"FDP_ITC.2.5": 2,
"FDP_OCSP_EXT": 3,
"FDP_OCSP_EXT.1": 4,
"FDP_OCSP_EXT.1.1": 4,
"FDP_TST_EXT": 3,
"FDP_TST_EXT.1": 4,
"FDP_TST_EXT.1.1": 3,
"FDP_TST_TST.1.1": 1
},
"FIA": {
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_ACF.1": 1,
"FMT_MSA": 36,
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 4,
"FMT_MSA.3": 13,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD": 5,
"FMT_MTD.1.1": 1,
"FMT_SMF": 16,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 3,
"FMT_SMR.1": 23,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 8,
"FPT_STM.1.1": 1,
"FPT_TDC": 14,
"FPT_TDC.1": 4,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 2
},
"FTP": {
"FTP_ITC": 20,
"FTP_ITC.1": 4,
"FTP_ITC.1.1": 4,
"FTP_ITC.1.2": 4,
"FTP_ITC.1.3": 4,
"FTP_TRP": 8,
"FTP_TRP.1": 4,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 10
},
"TLS": {
"TLS": {
"TLS": 63,
"TLS 1.2": 8,
"TLS 1.3": 8
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"Curve": {
"Curve25519": 2
},
"NIST": {
"NIST P-256": 1,
"NIST P-384": 1,
"NIST P-521": 1,
"P-256": 1,
"P-384": 1,
"P-521": 1,
"prime256v1": 1,
"prime384v1": 1,
"prime521v1": 1,
"secp256r1": 4,
"secp384r1": 4,
"secp521r1": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"X25519": 2
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 1,
"RNG": 6
}
},
"side_channel_analysis": {
"SCA": {
"side channel": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 2,
"AIS31": 2
},
"FIPS": {
"FIPS 140-3": 2,
"FIPS 186-4": 2,
"FIPS PUB 140-2": 3
},
"ISO": {
"ISO/IEC 15408": 12,
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1,
"ISO/IEC 19790": 4,
"ISO/IEC 19790:2006": 1
},
"PKCS": {
"PKCS#1": 2
},
"RFC": {
"RFC 3161": 6,
"RFC 3268": 8,
"RFC 3447": 2,
"RFC 5246": 14,
"RFC 5288": 8,
"RFC 5289": 16,
"RFC 6960": 6,
"RFC 7748": 2,
"RFC 8422": 8,
"RFC 8446": 6
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 4,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 4,
"TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256": 6,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 3,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 6,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 3,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 3,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 6,
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305": 5,
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256": 7,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 5,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 3,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 5,
"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305": 5,
"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256": 6,
"TLS_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_RSA_WITH_AES_128_GCM_SHA256": 3,
"TLS_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_RSA_WITH_AES_256_CBC_SHA256": 3,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 3
}
},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/Company": "Entrust Datacard",
"/ContentTypeId": "0x010100CB99AE5E205E1B478B34220FED2A8D4F",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/MediaServiceImageTags": "",
"/ModDate": "",
"/Producer": "",
"/SourceModified": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 1219043,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://chrony-project.org/",
"https://grafana.com/docs/loki/latest/",
"https://grafana.com/docs/loki/latest/query/",
"https://grafana.com/grafana/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 118
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-51_INF-4692.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-51_ST.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "282395cdbd3311ec40e0041f25705618eb605b3c19fa87c1e9e43cc2517c768f",
"txt_hash": "d0f8ebb7b09614ece7a576bbae4cddb311b631afaff8ca4637b9650326ad9139"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "58081fc500792954b6e2e5864f7834c0a8870aa318565cd2cbc8cb3fdf8666ce",
"txt_hash": "e500657f31eede51ce38fb16e463cf5fc1d13bf6cdfc33a5a085fb93fb908b93"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "57302334e16c8144ae673a4638b46423c0e539645a68c081d039008691afd3bb",
"txt_hash": "f0d45ccbf37157ff7521b2b0ab6ead285b11b1e2bc4aa056b9674b1881260daf"
}
},
"status": "active"
}