PikeOS Separation Kernel 4.2.2

CSV information

Status archived
Valid from 10.12.2018
Valid until 09.12.2023
Scheme 🇩🇪 DE
Manufacturer SYSGO AG
Category Operating Systems
Security level ALC_FLR.3, EAL3
Maintenance updates PikeOS 4.2.3 (18.03.2019) Certification report Security target

Heuristics summary

Certificate ID: BSI-DSZ-CC-1041-2018

Certificate

Extracted keywords

Security level
EAL 3, EAL 2, EAL 3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLR
Certificates
BSI-DSZ-CC-1041-2018

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certification Report BSI-DSZ-CC-1041-2018
Subject Zertifizierung Operating System; Urkunde
Keywords "Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20181213114818+01'00'
Modification date D:20181213121418+01'00'
Pages 1
Creator Writer
Producer LibreOffice 5.2

Certification report

Extracted keywords

Trusted Execution Environments
PSP

Security level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLR
Certificates
BSI-DSZ-CC-1041-2018
Evaluation facilities
atsec

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 3, 21.11.2018, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 03.09.2018, Master Document List, 16162-9101- MDL.xlsx

Standards
AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1041-2018
Subject Zertifizierung Operating System
Keywords "Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20181213114735+01'00'
Modification date D:20181214111737+01'00'
Pages 29
Creator Writer
Producer LibreOffice 5.2

Frontpage

Certificate ID BSI-DSZ-CC-1041-2018
Certified item PikeOS Separation Kernel 4.2.2
Certification lab BSI
Developer SYSGO AG

References

Incoming

Security target

Extracted keywords

Trusted Execution Environments
PSP

Security level
EAL 3, EAL 3+, EAL 3 augmented
Claims
T.DISCLOSURE, T.MODIFICATION, T.DEPLETION, T.EXECUTION, A.PRIVILEGED_EXECUTABLES, A.HARDWARE, A.EXCLUSIVE_RESOURCES, A.PHYSICAL, A.TRUSTWORTHY_PERSONNEL, OT.CONFIDENTIALITY, OT.INTEGRITY, OT.RESOURCE_AVAILABILITY, OT.API_PROTECTION, OT.RESOURCE_AVAILABILIT, OE.PRIVILEGED_EXECUTABLES, OE.HARDWARE, OE.EXCLUSIVE_RESOURCES, OE.PHYSICAL, OE.TRUSTWORTHY_PERSONNEL
Security Assurance Requirements (SAR)
ALC_FLR.3, AVA_VAN.2
Security Functional Requirements (SFR)
FDP_ACF, FDP_ACF.1, FDP_ACC.2, FDP_ACC, FDP_IFC.2, FDP_IFF.1, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FRU_RSA, FRU_RSA.2

File metadata

Title Security Target
Subject PikeOS Separation Kernel v4.2.2
Author Dominic Eschweiler
Creation date D:20181122132307+01'00'
Modification date D:20181122132319+01'00'
Pages 47
Creator Acrobat PDFMaker 15 for Word
Producer Adobe PDF Library 15.0

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-1041-2018

Extracted SARs

ALC_FLR.3, AVA_VAN.2

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041c_pdf.pdf",
  "dgst": "bcd676cbe8f74379",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1041-2018",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.2.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1041-V2-2022"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1041-V2-2022"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2019-03-18",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041ma1a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041ma1b_pdf.pdf",
        "maintenance_title": "PikeOS 4.2.3"
      }
    ]
  },
  "manufacturer": "SYSGO AG",
  "manufacturer_web": "https://www.sysgo.com",
  "name": "PikeOS Separation Kernel 4.2.2",
  "not_valid_after": "2023-12-09",
  "not_valid_before": "2018-12-10",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1041c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1041-2018": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 3": 1,
          "EAL 3 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20181213114818+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel\"",
      "/ModDate": "D:20181213121418+01\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifizierung Operating System;  Urkunde",
      "/Title": "Certification Report BSI-DSZ-CC-1041-2018",
      "pdf_file_size_bytes": 901999,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1041a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ALC_FLR.3",
        "cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
        "cert_id": "BSI-DSZ-CC-1041-2018",
        "cert_item": "PikeOS Separation Kernel 4.2.2",
        "cert_lab": "BSI",
        "developer": "SYSGO AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1041-2018": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.3": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 3": 4,
          "EAL 3 augmented": 3,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report, Version 3, 21.11.2018, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 03.09.2018, Master Document List, 16162-9101- MDL.xlsx": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20181213114735+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO AG, PikeOS, Separation Kernel\"",
      "/ModDate": "D:20181214111737+01\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifizierung Operating System",
      "/Title": "Certification Report BSI-DSZ-CC-1041-2018",
      "pdf_file_size_bytes": 1387625,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1041b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.EXCLUSIVE_RESOURCES": 3,
          "A.HARDWARE": 3,
          "A.PHYSICAL": 3,
          "A.PRIVILEGED_EXECUTABLES": 3,
          "A.TRUSTWORTHY_PERSONNEL": 3
        },
        "OE": {
          "OE.EXCLUSIVE_RESOURCES": 3,
          "OE.HARDWARE": 2,
          "OE.PHYSICAL": 2,
          "OE.PRIVILEGED_EXECUTABLES": 3,
          "OE.TRUSTWORTHY_PERSONNEL": 3
        },
        "OT": {
          "OT.API_PROTECTION": 5,
          "OT.CONFIDENTIALITY": 6,
          "OT.INTEGRITY": 4,
          "OT.RESOURCE_AVAILABILIT": 1,
          "OT.RESOURCE_AVAILABILITY": 5
        },
        "T": {
          "T.DEPLETION": 4,
          "T.DISCLOSURE": 4,
          "T.EXECUTION": 4,
          "T.MODIFICATION": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 4
        },
        "AVA": {
          "AVA_VAN.2": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 5,
          "EAL 3 augmented": 1,
          "EAL 3+": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 14,
          "FDP_ACC.2": 13,
          "FDP_ACF": 31,
          "FDP_ACF.1": 28,
          "FDP_IFC.2": 8,
          "FDP_IFF.1": 11
        },
        "FIA": {
          "FIA_UID.2": 6
        },
        "FMT": {
          "FMT_MSA.1": 6,
          "FMT_MSA.3": 7,
          "FMT_MSA.3.1": 2,
          "FMT_MTD": 12,
          "FMT_MTD.1": 3,
          "FMT_SMF.1": 5,
          "FMT_SMR.1": 7
        },
        "FRU": {
          "FRU_RSA": 10,
          "FRU_RSA.2": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "AMD": {
          "PSP": 30
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Dominic Eschweiler",
      "/BuildID": "S5400",
      "/Company": "",
      "/CreationDate": "D:20181122132307+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 15 for Word",
      "/DOORS-Baseline": "N.A.",
      "/DocID": "00101-8000-ST",
      "/Keywords": "",
      "/ModDate": "D:20181122132319+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/Revision": "20.6",
      "/SourceModified": "D:20181122121241",
      "/Status": "App",
      "/Subject": "PikeOS Separation Kernel v4.2.2",
      "/SupplierCode": "N.A.",
      "/TemplateAuthor": "HJT",
      "/TemplateDate": "2012-09-10",
      "/TemplateID": "00014-9102-BOOK_ENG",
      "/TemplateRevision": "01.3",
      "/Title": "Security Target",
      "/Ziel": "4.2.2",
      "pdf_file_size_bytes": 452300,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 47
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "e5ef667b1afa358d601cbeec89e37d50900637e1b84ed4c276b822b3a16e758d",
      "txt_hash": "ec554ec391f5cd72bba3335de93a02ad9d2d7a2f53d993cb58a5ecfc18b67b99"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "7b70b0e2130bf8bd102f3fde6e8750d9cf23e74ebce2b48c3ecc5b740e6169b3",
      "txt_hash": "8173437d2b23ee02f702d3ccca08b65759d972fe41b243bba551dd4f8f3e38bd"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "a99baf9feb219895dc67a36f4fc8edd7dc8c6fd3fccd8b09ec0e22045c248cd3",
      "txt_hash": "c2d04e0e529f6595f335453760ea717235f9aeccdbe6f80d1ee664a09933d4d2"
    }
  },
  "status": "archived"
}