Huawei GaussDB 200 version 6.5.1 build e3690037

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 22.03.2022
Valid until 22.03.2027
Scheme 🇪🇸 ES
Manufacturer Huawei Technologies Co., Ltd.
Category Databases
Security level ALC_FLR.2, EAL2+
Protection profiles

Heuristics summary ?

Certificate ID: 2019-32-INF-3664

Certificate ?

Extracted keywords

Vendor
Huawei, Huawei Technologies Co

Security level
EAL 4, EAL 2, EAL2
Claims
O.E, A.U, R.C
Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2
Protection profiles
BSI-CC-PP-0088-V2

File metadata

Creation date D:20220310164952+01'00'
Modification date D:20220310164952+01'00'
Pages 2
Producer GPL Ghostscript 9.27

Certification report ?

Extracted keywords

Hash functions
SHA256
Protocols
TLS, TLSv1.1, TLSv1.2

Vendor
Huawei, Huawei Technologies Co

Security level
EAL2, EAL2+, EAL 1, EAL 4, EAL 2, ITSEC Evaluation
Claims
A.U
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FPT_TRC.1, FTA_MCS.1, FTA_TSE.1
Protection profiles
BSI-CC-PP-0088-V2
Certificates
2019-32-INF-3664- v1
Evaluation facilities
DEKRA Testing and Certification

File metadata

Creation date D:20220325091528+01'00'
Modification date D:20220325091528+01'00'
Pages 14
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Security target ?

Extracted keywords

Hash functions
SHA256

Vendor
Huawei Technologies Co, Huawei

Security level
EAL 2
Claims
O.ADMIN_ROLE, O.AUDIT, O.DISCRETIONARY, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORM, O.TOE_ACCESS, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.RESIDUAL_INFORMATION, O.RESIDUAL, O.TOE_ACCE, O.ADMIN_RO, O.DISCRETIO, O.RESIDUAL_, O.AUDIT_GE, O.ADMIN_ROL, O.RESIDUAL_I, O.TOE_ACCES, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, T.ACCESS_TSF, T.IA_MASQUE, T.RESIDUAL_, T.TSF_COMPR, T.UNAUTHOR, T.TSF, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, A.NO_GENERA, A.PEER_FUNC, A.TRAINEDUS, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED, OE.IT_TRUSTED_SYSTEM, OE.NO_GENE, OE.NO_GENERAL, OE.INFO, OE.IT_REMOT, OE.IT_TRUST, OE.INFO_PRO
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FAU_MTD.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_STM.1, FPT_ITT.1, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1
Protection profiles
BSI-CC-PP-0088-V2

Certification process
out of scope, including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE, this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE, with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are, provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a, Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the, Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz, 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools, is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to

Heuristics ?

Certificate ID: 2019-32-INF-3664

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ALC_FLR.2, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2020-1790
C M N
HIGH 8.8 5.9 18.02.2020 03:15
CVE-2020-1811
C M N
HIGH 8.8 5.9 18.02.2020 00:15
CVE-2020-1853
C M N
MEDIUM 6.5 3.6 17.02.2020 21:15

Scheme data ?

Product Huawei GaussDB 200 version 6.5.1 build e3690037
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037
Category Database management systems
Manufacturer Huawei Technologies Co., Ltd.
Certification Date 22.03.2022
Enhanced
Description The TOE is the Huawei GaussDB 200 Database Management System (DBMS). Huawei GaussDB 200 is an enterprise-level relational database for massively parallel processing (MPP), which adopts the MPP architecture, supports row and column storage, provides the capabilities of processing petabytes of data, and is oriented to massive data online analysis.
Category Database management systems
Manufacturer Huawei Technologies Co., Ltd.
Type Product
Evaluation Facility DEKRA Testing and Certification S.A.U.
Status Certified
Certification Date 22.03.2022
Cc Version Common Criteria 3.1 release 5
Level EAL2 + (ALC_FLR.2)
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1425
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1426
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1427

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2022-03-22'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PP']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'pdf_hash': 'd02f59b7a6d5456731c35ebc9bb381df2e56cc8e578e4f38d8c6bcc1425d1f17', 'txt_hash': '3c923458c53ff9aae9cc3c56cadb125a1b0b82e243db896cbf01f90971014771'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c54b4d2999a8fabd845475365be7eae515610ba9bb9ab08ca411ea597f7f6182', 'txt_hash': 'de509c605a6b9c3912b02d919cc8fc13533d96955a3d461999e693952b5df28c'} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to {'pdf_file_size_bytes': 847729, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Producer': 'GPL Ghostscript 9.27', '/CreationDate': "D:20220310164952+01'00'", '/ModDate': "D:20220310164952+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 3}}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_GEN.2': 10, 'FAU_SEL.1': 10, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_SEL.1.1': 2, 'FAU_MTD.1': 2}, 'FDP': {'FDP_ACC.1': 19, 'FDP_ACF.1': 17, 'FDP_RIP.1': 10, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 16, 'FIA_UAU.1': 9, 'FIA_UID.1': 15, 'FIA_USB.1': 5, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MOF.1': 10, 'FMT_MSA.1': 11, 'FMT_MSA.3': 11, 'FMT_MTD.1': 10, 'FMT_REV.1': 15, 'FMT_SMF.1': 14, 'FMT_SMR.1': 21, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 1, 'FMT_REV.1.1': 5, 'FMT_REV.1.2': 3, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPT': {'FPT_TRC.1': 11, 'FPT_TRC.1.1': 2, 'FPT_TRC.1.2': 2, 'FPT_STM.1': 1, 'FPT_ITT.1': 1}, 'FTA': {'FTA_MCS.1': 9, 'FTA_TSE.1': 8, 'FTA_MCS.1.1': 2, 'FTA_MCS.1.2': 2, 'FTA_TSE.1.1': 2}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 7, 'O.AUDIT': 2, 'O.DISCRETIONARY': 1, 'O.MANAGE': 13, 'O.MEDIATE': 9, 'O.RESIDUAL_INFORM': 1, 'O.TOE_ACCESS': 10, 'O.AUDIT_GENERATION': 3, 'O.DISCRETIONARY_ACCESS': 5, 'O.RESIDUAL_INFORMATION': 6, 'O.RESIDUAL': 2, 'O.TOE_ACCE': 8, 'O.ADMIN_RO': 3, 'O.DISCRETIO': 3, 'O.RESIDUAL_': 1, 'O.AUDIT_GE': 2, 'O.ADMIN_ROL': 1, 'O.RESIDUAL_I': 1, 'O.TOE_ACCES': 1}, 'T': {'T.ACCESS_TSFDATA': 2, 'T.ACCESS_TSFFUNC': 1, 'T.IA_MASQUERADE': 2, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 2, 'T.TSF_COMPROMISE': 1, 'T.UNAUTHORIZED_ACCESS': 2, 'T.ACCESS_TSF': 2, 'T.IA_MASQUE': 2, 'T.RESIDUAL_': 1, 'T.TSF_COMPR': 1, 'T.UNAUTHOR': 2, 'T.TSF': 1}, 'A': {'A.PHYSICAL': 3, 'A.AUTHUSER': 2, 'A.MANAGE': 3, 'A.TRAINEDUSER': 1, 'A.NO_GENERAL_PURPOSE': 2, 'A.SUPPORT': 4, 'A.CONNECT': 3, 'A.NO_GENERA': 1, 'A.PEER_FUNC': 1, 'A.TRAINEDUS': 1}, 'OE': {'OE.ADMIN': 10, 'OE.INFO_PROTECT': 11, 'OE.NO_GENERAL_PURPOSE': 4, 'OE.PHYSICAL': 8, 'OE.IT_REMOTE': 6, 'OE.IT_TRUSTED': 1, 'OE.IT_TRUSTED_SYSTEM': 5, 'OE.NO_GENE': 3, 'OE.NO_GENERAL': 1, 'OE.INFO': 5, 'OE.IT_REMOT': 4, 'OE.IT_TRUST': 4, 'OE.INFO_PRO': 4}}, 'vendor': {'Huawei': {'Huawei Technologies Co': 87, 'Huawei': 9}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 7, 'including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE': 1, 'this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE': 1, 'with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are': 1, 'provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a': 1, 'Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the': 1, 'Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz': 1, '1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools': 1, 'is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 2, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}, 'A': {'A.U': 1}, 'R': {'R.C': 1}}, 'vendor': {'Huawei': {'Huawei': 2, 'Huawei Technologies Co': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 2019-32-ST.pdf.
    • The cert_filename property was set to 2019-32_Certificado.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Huawei GaussDB 200 version 6.5.1 build e3690037 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Databases",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf",
  "dgst": "b91f3f25e268a1e0",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2019-32-INF-3664",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:huawei:gaussdb_200:6.5.1.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:huawei:gaussdb_200:6.5.1.5:*:*:*:*:*:*:*",
        "cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2020-1790",
        "CVE-2020-1853",
        "CVE-2020-1811"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Database management systems",
      "certification_date": "2022-03-22",
      "enhanced": {
        "category": "Database management systems",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1426",
        "certification_date": "2022-03-22",
        "description": "The TOE is the Huawei GaussDB 200 Database Management System (DBMS). Huawei GaussDB 200 is an enterprise-level relational database for massively parallel processing (MPP), which adopts the MPP architecture, supports row and column storage, provides the capabilities of processing petabytes of data, and is oriented to massive data online analysis.",
        "evaluation_facility": "DEKRA Testing and Certification S.A.U.",
        "level": "EAL2 + (ALC_FLR.2)",
        "manufacturer": "Huawei Technologies Co., Ltd.",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1427",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1425",
        "type": "Product"
      },
      "manufacturer": "Huawei Technologies Co., Ltd.",
      "product": "Huawei GaussDB 200 version 6.5.1 build e3690037",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Huawei Technologies Co., Ltd.",
  "manufacturer_web": "https://www.huawei.com",
  "name": "Huawei GaussDB 200 version 6.5.1 build e3690037",
  "not_valid_after": "2027-03-22",
  "not_valid_before": "2022-03-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2019-32_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.U": 1
        },
        "O": {
          "O.E": 1
        },
        "R": {
          "R.C": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0088-V2": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 2,
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 2,
          "Huawei Technologies Co": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20220310164952+01\u002700\u0027",
      "/ModDate": "D:20220310164952+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.27",
      "pdf_file_size_bytes": 847729,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2019-32-INF-3664.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2019-32-INF-3664- v1": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.U": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0088-V2": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE": 3,
          "AGD_OPE.1": 1,
          "AGD_PRE": 4
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 2,
          "ALC_FLR.2": 8
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 7,
          "EAL2+": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1,
          "FAU_SEL.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_REV.1": 2,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_TRC.1": 1
        },
        "FTA": {
          "FTA_MCS.1": 1,
          "FTA_TSE.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3,
            "TLSv1.1": 1,
            "TLSv1.2": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DEKRA": {
          "DEKRA Testing and Certification": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 14,
          "Huawei Technologies Co": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20220325091528+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220325091528+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 909986,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.org/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "2019-32-ST.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AUTHUSER": 2,
          "A.CONNECT": 3,
          "A.MANAGE": 3,
          "A.NO_GENERA": 1,
          "A.NO_GENERAL_PURPOSE": 2,
          "A.PEER_FUNC": 1,
          "A.PHYSICAL": 3,
          "A.SUPPORT": 4,
          "A.TRAINEDUS": 1,
          "A.TRAINEDUSER": 1
        },
        "O": {
          "O.ADMIN_RO": 3,
          "O.ADMIN_ROL": 1,
          "O.ADMIN_ROLE": 7,
          "O.AUDIT": 2,
          "O.AUDIT_GE": 2,
          "O.AUDIT_GENERATION": 3,
          "O.DISCRETIO": 3,
          "O.DISCRETIONARY": 1,
          "O.DISCRETIONARY_ACCESS": 5,
          "O.MANAGE": 13,
          "O.MEDIATE": 9,
          "O.RESIDUAL": 2,
          "O.RESIDUAL_": 1,
          "O.RESIDUAL_I": 1,
          "O.RESIDUAL_INFORM": 1,
          "O.RESIDUAL_INFORMATION": 6,
          "O.TOE_ACCE": 8,
          "O.TOE_ACCES": 1,
          "O.TOE_ACCESS": 10
        },
        "OE": {
          "OE.ADMIN": 10,
          "OE.INFO": 5,
          "OE.INFO_PRO": 4,
          "OE.INFO_PROTECT": 11,
          "OE.IT_REMOT": 4,
          "OE.IT_REMOTE": 6,
          "OE.IT_TRUST": 4,
          "OE.IT_TRUSTED": 1,
          "OE.IT_TRUSTED_SYSTEM": 5,
          "OE.NO_GENE": 3,
          "OE.NO_GENERAL": 1,
          "OE.NO_GENERAL_PURPOSE": 4,
          "OE.PHYSICAL": 8
        },
        "T": {
          "T.ACCESS_TSF": 2,
          "T.ACCESS_TSFDATA": 2,
          "T.ACCESS_TSFFUNC": 1,
          "T.IA_MASQUE": 2,
          "T.IA_MASQUERADE": 2,
          "T.IA_USER": 2,
          "T.RESIDUAL_": 1,
          "T.RESIDUAL_DATA": 2,
          "T.TSF": 1,
          "T.TSF_COMPR": 1,
          "T.TSF_COMPROMISE": 1,
          "T.UNAUTHOR": 2,
          "T.UNAUTHORIZED_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0088-V2": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 12,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 10,
          "FAU_GEN.2.1": 2,
          "FAU_MTD.1": 2,
          "FAU_SEL.1": 10,
          "FAU_SEL.1.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 19,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 17,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 1,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 2
        },
        "FIA": {
          "FIA_ATD.1": 16,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UID.1": 15,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2,
          "FIA_USB.1": 5
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 2,
          "FMT_MSA.1": 11,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_REV.1": 15,
          "FMT_REV.1.1": 5,
          "FMT_REV.1.2": 3,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPT": {
          "FPT_ITT.1": 1,
          "FPT_STM.1": 1,
          "FPT_TRC.1": 11,
          "FPT_TRC.1.1": 2,
          "FPT_TRC.1.2": 2
        },
        "FTA": {
          "FTA_MCS.1": 9,
          "FTA_MCS.1.1": 2,
          "FTA_MCS.1.2": 2,
          "FTA_TSE.1": 8,
          "FTA_TSE.1.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools": 1,
          "Co., Ltd. 6 Item Requirement \u25cf NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz": 1,
          "Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the": 1,
          "including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE": 1,
          "is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to": 1,
          "out of scope": 7,
          "provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a": 1,
          "this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE": 1,
          "with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 9,
          "Huawei Technologies Co": 87
        }
      },
      "vulnerability": {}
    },
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL2+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "DBMS_PP"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf",
        "pp_name": "Base Protection Profile for Database Management Systems"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c54b4d2999a8fabd845475365be7eae515610ba9bb9ab08ca411ea597f7f6182",
      "txt_hash": "de509c605a6b9c3912b02d919cc8fc13533d96955a3d461999e693952b5df28c"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "751bc00acd3f7630e3c5c689e0831c7d3c4e555f1fab98256a3ec0cd688e2b18",
      "txt_hash": "cb0a07fbf7792960f58c0c79306b0b859c18ed6a66fa5122b08eb69ca0d354b5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "d02f59b7a6d5456731c35ebc9bb381df2e56cc8e578e4f38d8c6bcc1425d1f17",
      "txt_hash": "3c923458c53ff9aae9cc3c56cadb125a1b0b82e243db896cbf01f90971014771"
    }
  },
  "status": "active"
}