Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2

CSV information ?

Status archived
Valid from 11.04.2013
Valid until 22.04.2015
Scheme 🇺🇸 US
Manufacturer Palo Alto Networks, Inc.
Category Boundary Protection Devices and Systems
Security level ALC_FLR.2, EAL4+, ATE_DPT.3
Maintenance updates Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 5.0.11 (09.09.2014) Certification report Security target
Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2 (21.02.2015) Certification report Security target

Heuristics summary ?

Certificate ID: CCEVS-VR-VID-10392-2013

Certificate ?

Certification report ?

Extracted keywords

Schemes
Key Exchange
Protocols
SSH, SSL, TLS, IKE, VPN
Libraries
OpenSSL

Vendor
Microsoft

Security level
EAL 4, EAL 4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.3, ATE_DPT, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3
Certificates
CCEVS-VR-VID10392-2013

Standards
FIPS 140-2, NIST SP 800-53, CCIMB-2006-09-001, CCIMB-2007-09-002, CCIMB-2007-09-003, CCIMB-2007-09-004

File metadata

Title Palo Alto Networks Inc. PA-Series Next Generation Firewall
Subject Validation Report
Author SAIC
Creation date D:20130514115641
Modification date D:20130514115641
Pages 28
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-VID10392-2013
Certified item Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 4.0.12-h2
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES-256, AES, HMAC, HMAC-SHA-256
Asymmetric Algorithms
RSA-2048, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
Key Exchange
Protocols
SSH, SSL, TLSv1.0, TLS v1.0, TLS 1.2, TLS, IKE, IKEv1, IPsec, VPN
Randomness
PRNG, RNG
Libraries
OpenSSL
Block cipher modes
ECB, CBC, CTR
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA

Vendor
Microsoft

Security level
EAL 4, EAL4, EAL4 augmented
Claims
O.ROBUST_ADMIN_GUIDANCE, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.CHANGE_MANAGEMENT, O.CORRECT_, O.CRYPTOGRAPHIC_, O.CRYPTOGRAPHY_, O.DISPLAY_BANNER, O.THOROUGH_FUNCTIONAL_, O.MAINT_MODE, O.MANAGE, O.MEDIATE, O.REPLAY_DETECTION, O.RESIDUAL_INFORMATION, O.RESOURCE_SHARING, O.SELF_PROTECTION, O.SOUND_IMPLEMENTATION, O.TIME_STAMPS, O.ROBUST_TOE_ACCESS, O.TRUSTED_PATH, O.VULNERABILITY_ANALYSIS_TEST, O.DOCUMENT_KEY_LEAKAGE, T.ADDRESS_MASQUERADE, T.ADMIN_ERROR, T.ADMIN_ROGUE, T.AUDIT_COMPROMISE, T.CRYPTO_COMPROMISE, T.MASQUERADE, T.FLAWED_DESIGN, T.FLAWED_IMPLEMENTATION, T.POOR_TEST, T.REPLAY, T.RESIDUAL_DATA, T.RESOURCE_EXHAUSTION, T.SPOOFING, T.MALICIOUS_TSF_, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.NO_TOE_BYPASS, A.UIA_ONLY, OE.CRYPTANALYTIC, OE.NO_GENERAL_PURPOSE, OE.NO_TOE_BYPASS, OE.PHYSICAL, OE.UIA_ONLY
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.1, ADV_FSP.5, ADV_TDS.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.3
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAA, FAU_SEL.1, FAU_STG, FAU_ARP, FAU_SAR, FAU_SEL, FAU_ARP.1, FAU_ARP.1.1, FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.1, FAU_STG.3, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM, FCS_CKM_EXT.2, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP_EXT.1, FCS_CKM_EXT, FDP_IFC.1, FDP_IFF.1, FDP_RIP, FDP_RIP.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_USB, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.2, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.2.1, FIA_USB.1.1, FMT_MSA, FMT_MOF.1, FMT_MTD.1, FMT_MTD.2, FMT_REV, FMT_SMR, FMT_MSA.1, FMT_REV.1, FMT_SMR.2, FMT_MOF.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_REV.1.1, FMT_REV.1.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.1, FPT_FLS, FPT_ITC, FPT_ITT, FPT_RCV, FPT_RPL, FPT_STM, FPT_TST.1, FPT_RCV.1, FPT_RPL.1, FPT_STM.1, FPT_FLS.1, FPT_FLS.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_ITT.1, FPT_ITT.1.1, FPT_RCV.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT, FRU_RSA.1, FRU_FLT.1, FRU_FLT.1.1, FRU_RSA.1.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.2, FTA_SSL.3, FTA_TAB.1, FTA_TSE.1, FTA_SSL.2.1, FTA_SSL.2.2, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TSE.1.1, FTA_SSL.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Evaluation facilities
Leidos

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 180-3, FIPS140-2, NIST SP 800-57, RFC 792, CCMB-2007-09-002, CCMB-2007-09-003

File metadata

Creation date D:20150223143644-05'00'
Modification date D:20150223143644-05'00'
Pages 82

Heuristics ?

Certificate ID: CCEVS-VR-VID-10392-2013

Extracted SARs

ALC_LCD.1, ADV_TDS.4, ATE_DPT.3, ATE_IND.2, ATE_COV.2, ALC_FLR.2, ADV_ARC.1, ALC_CMS.4, ALC_DEL.1, ALC_CMC.4, ATE_FUN.1, ALC_DVS.1, AGD_OPE.1, ALC_TAT.1, ADV_FSP.5, AGD_PRE.1, ADV_INT.1, AVA_VAN.3, ADV_IMP.1

Similar certificates

Name Certificate ID
Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7000 Series, VM Series, Next-Generation Firewall with PAN-OS 7.0.1-h4 CCEVS-VR-VID-10640-2015 Compare
Palo Alto Networks PA-200 Series, PA-500, PA-800 Series, PA-3000 Series, PA-5000 Series, PA-5200 Series, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS v8.0.6 CCEVS-VR-VID-10839-2018 Compare
Palo Alto Networks PA-400 Series, PA-800 Series, PA-1400 Series, PA-3200 Series, PA-3400 Series, PA-5200 Series, PA-5400 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 11.1 CCEVS-VR-VID-11482-2024 Compare
Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-5200 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1 CCEVS-VR-VID-11284-2022 Compare
Palo Alto Networks PA-220 Series, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 9.0 CCEVS-VR-VID-11063-2020 Compare
Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 JISEC-CC-CRP-C0239 Compare
Palo Alto Networks, Inc. PA-2000 Series and PA-4000 Series Firewall CCEVS-VR-VID-10330-2011 Compare
Showing 5 out of 7.

Scheme data ?

Product Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2
Id CCEVS-VR-VID10392
Url https://www.niap-ccevs.org/product/10392
Certification Date 2013-04-11T00:00:00Z
Expiration Date 2015-04-11T00:00:00Z
Category Firewall
Vendor Palo Alto Networks, Inc.
Evaluation Facility Leidos Common Criteria Testing Laboratory
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-09-09', 'maintenance_title': 'Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 5.0.11', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-add1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf'}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2015-02-21', 'maintenance_title': 'Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-add2.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf'}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6c04c77c48f77c3375dbe27b4f2f80eb91669d900f03691c92fdc56ea3579e62', 'txt_hash': '0a3e870002c44dac329887b1803d2393921d6892f24030f22dee07164ea67801'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e1e900922cc893f1d721bddb7d4312e53732b05a38da3c0733ff667a5060f628', 'txt_hash': '794d90d286ed54320eb8a4515cba2e0eee02461977ff110d95e660e688ed3586'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 483560, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 28, '/Title': 'Palo Alto Networks Inc. PA-Series Next Generation Firewall', '/Author': 'SAIC', '/Subject': 'Validation Report', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20130514115641', '/ModDate': 'D:20130514115641', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1237301, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 82, '/CreationDate': "D:20150223143644-05'00'", '/ModDate': "D:20150223143644-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#2323']}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-VID10392-2013', 'cert_item': 'Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 4.0.12-h2', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10392-2013': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL 4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.3': 4, 'ATE_DPT': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 3}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 8}, 'TLS': {'SSL': {'SSL': 12}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 2}, 'VPN': {'VPN': 8}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-53': 2}, 'CC': {'CCIMB-2006-09-001': 1, 'CCIMB-2007-09-002': 1, 'CCIMB-2007-09-003': 1, 'CCIMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL4': 3, 'EAL4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.4': 11, 'ADV_IMP.1': 7, 'ADV_TDS.3': 15, 'ADV_INT.1': 1, 'ADV_FSP.5': 1, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 16, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 15, 'ALC_CMS.4': 6, 'ALC_DEL.1': 5, 'ALC_DVS.1': 5, 'ALC_LCD.1': 6, 'ALC_TAT.1': 7}, 'ATE': {'ATE_DPT.3': 9, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 5, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.3': 7}}, 'cc_sfr': {'FAU': {'FAU_GEN': 10, 'FAU_SAA': 7, 'FAU_SEL.1': 2, 'FAU_STG': 10, 'FAU_ARP': 2, 'FAU_SAR': 4, 'FAU_SEL': 5, 'FAU_ARP.1': 4, 'FAU_ARP.1.1': 1, 'FAU_GEN.1': 4, 'FAU_SAR.1': 3, 'FAU_SAR.2': 4, 'FAU_SAR.3': 3, 'FAU_STG.1': 4, 'FAU_STG.3': 4, 'FAU_GEN.2': 1, 'FAU_SAA.1': 2, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FCS': {'FCS_COP.1': 27, 'FCS_COP.1.1': 6, 'FCS_CKM.1': 9, 'FCS_CKM': 2, 'FCS_CKM_EXT.2': 1, 'FCS_CKM.2': 3, 'FCS_CKM.4': 5, 'FCS_COP': 1, 'FCS_CKM.1.1': 2, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP_EXT.1': 1, 'FCS_CKM_EXT': 1}, 'FDP': {'FDP_IFC.1': 19, 'FDP_IFF.1': 21, 'FDP_RIP': 1, 'FDP_RIP.2': 3, 'FDP_IFC.1.1': 3, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_IFF.1.6': 2, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2}, 'FIA': {'FIA_AFL': 1, 'FIA_ATD': 1, 'FIA_UAU': 1, 'FIA_UID': 1, 'FIA_USB': 1, 'FIA_AFL.1': 4, 'FIA_ATD.1': 4, 'FIA_UAU.1': 5, 'FIA_UID.2': 3, 'FIA_USB.1': 3, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1}, 'FMT': {'FMT_MSA': 11, 'FMT_MOF.1': 25, 'FMT_MTD.1': 24, 'FMT_MTD.2': 10, 'FMT_REV': 1, 'FMT_SMR': 1, 'FMT_MSA.1': 5, 'FMT_REV.1': 3, 'FMT_SMR.2': 3, 'FMT_MOF.1.1': 7, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 7, 'FMT_MTD.2.1': 2, 'FMT_MTD.2.2': 2, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 2, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FLS': 2, 'FPT_ITC': 3, 'FPT_ITT': 2, 'FPT_RCV': 1, 'FPT_RPL': 1, 'FPT_STM': 1, 'FPT_TST.1': 10, 'FPT_RCV.1': 3, 'FPT_RPL.1': 3, 'FPT_STM.1': 6, 'FPT_FLS.1': 7, 'FPT_FLS.1.1': 1, 'FPT_ITC.1': 5, 'FPT_ITC.1.1': 1, 'FPT_ITT.1': 6, 'FPT_ITT.1.1': 1, 'FPT_RCV.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 2, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2}, 'FRU': {'FRU_FLT': 2, 'FRU_RSA.1': 11, 'FRU_FLT.1': 6, 'FRU_FLT.1.1': 1, 'FRU_RSA.1.1': 2}, 'FTA': {'FTA_SSL': 4, 'FTA_TAB': 1, 'FTA_TSE': 1, 'FTA_SSL.2': 4, 'FTA_SSL.3': 5, 'FTA_TAB.1': 4, 'FTA_TSE.1': 3, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 1, 'FTA_SSL.3.1': 1, 'FTA_TAB.1.1': 1, 'FTA_TSE.1.1': 1, 'FTA_SSL.1': 1}, 'FTP': {'FTP_ITC.1': 8, 'FTP_TRP.1': 8, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 2, 'FTP_ITC.1.3': 2, 'FTP_TRP.1.1': 2, 'FTP_TRP.1.2': 2, 'FTP_TRP.1.3': 2}}, 'cc_claims': {'O': {'O.ROBUST_ADMIN_GUIDANCE': 1, 'O.ADMIN_ROLE': 1, 'O.AUDIT_GENERATION': 1, 'O.AUDIT_PROTECTION': 1, 'O.AUDIT_REVIEW': 1, 'O.CHANGE_MANAGEMENT': 1, 'O.CORRECT_': 1, 'O.CRYPTOGRAPHIC_': 1, 'O.CRYPTOGRAPHY_': 1, 'O.DISPLAY_BANNER': 1, 'O.THOROUGH_FUNCTIONAL_': 1, 'O.MAINT_MODE': 2, 'O.MANAGE': 2, 'O.MEDIATE': 4, 'O.REPLAY_DETECTION': 1, 'O.RESIDUAL_INFORMATION': 1, 'O.RESOURCE_SHARING': 1, 'O.SELF_PROTECTION': 2, 'O.SOUND_IMPLEMENTATION': 1, 'O.TIME_STAMPS': 1, 'O.ROBUST_TOE_ACCESS': 1, 'O.TRUSTED_PATH': 1, 'O.VULNERABILITY_ANALYSIS_TEST': 1, 'O.DOCUMENT_KEY_LEAKAGE': 1}, 'T': {'T.ADDRESS_MASQUERADE': 1, 'T.ADMIN_ERROR': 1, 'T.ADMIN_ROGUE': 1, 'T.AUDIT_COMPROMISE': 1, 'T.CRYPTO_COMPROMISE': 1, 'T.MASQUERADE': 1, 'T.FLAWED_DESIGN': 1, 'T.FLAWED_IMPLEMENTATION': 1, 'T.POOR_TEST': 1, 'T.REPLAY': 1, 'T.RESIDUAL_DATA': 1, 'T.RESOURCE_EXHAUSTION': 1, 'T.SPOOFING': 1, 'T.MALICIOUS_TSF_': 1, 'T.UNATTENDED_SESSION': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNIDENTIFIED_ACTIONS': 1, 'T.UNKNOWN_STATE': 1}, 'A': {'A.NO_GENERAL_PURPOSE': 1, 'A.PHYSICAL': 1, 'A.NO_TOE_BYPASS': 1, 'A.UIA_ONLY': 1}, 'OE': {'OE.CRYPTANALYTIC': 1, 'OE.NO_GENERAL_PURPOSE': 1, 'OE.NO_TOE_BYPASS': 1, 'OE.PHYSICAL': 1, 'OE.UIA_ONLY': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-256': 2, 'AES': 7}}, 'constructions': {'MAC': {'HMAC': 5, 'HMAC-SHA-256': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-2048': 2}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DH': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 15}, 'SHA2': {'SHA-256': 1, 'SHA-384': 2, 'SHA-512': 2, 'SHA-2': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 14}, 'TLS': {'SSL': {'SSL': 22}, 'TLS': {'TLSv1.0': 1, 'TLS v1.0': 3, 'TLS 1.2': 1, 'TLS': 3}}, 'IKE': {'IKE': 13, 'IKEv1': 2}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 40}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 8}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 6}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 12, 'FIPS PUB 140-2': 7, 'FIPS 180-3': 1, 'FIPS140-2': 1}, 'NIST': {'NIST SP 800-57': 3}, 'RFC': {'RFC 792': 2}, 'CC': {'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid10392-vr.pdf.
    • The st_filename property was set to st_vid10392-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-VID-10392-2013.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "bdc993babbbfb13c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10392-2013",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0.12",
        "3.1.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Firewall",
      "certification_date": "2013-04-11T00:00:00Z",
      "evaluation_facility": "Leidos Common Criteria Testing Laboratory",
      "expiration_date": "2015-04-11T00:00:00Z",
      "id": "CCEVS-VR-VID10392",
      "product": "Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2  and User Identification Agent v3.1.2",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/10392",
      "vendor": "Palo Alto Networks, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2015-02-21",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-add2.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf",
        "maintenance_title": "Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2014-09-09",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-add1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf",
        "maintenance_title": "Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 5.0.11"
      }
    ]
  },
  "manufacturer": "Palo Alto Networks, Inc.",
  "manufacturer_web": "https://www.paloaltonetworks.com/",
  "name": "Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2",
  "not_valid_after": "2015-04-22",
  "not_valid_before": "2013-04-11",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10392-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10392-2013",
        "cert_item": "Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 4.0.12-h2",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10392-2013": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.3": 4,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 4 augmented": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "SSH": {
          "SSH": 8
        },
        "TLS": {
          "SSL": {
            "SSL": 12
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 8
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-2006-09-001": 1,
          "CCIMB-2007-09-002": 1,
          "CCIMB-2007-09-003": 1,
          "CCIMB-2007-09-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 1
        },
        "NIST": {
          "NIST SP 800-53": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "SAIC",
      "/CreationDate": "D:20130514115641",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20130514115641",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Validation Report",
      "/Title": "Palo Alto Networks Inc. PA-Series Next Generation Firewall",
      "pdf_file_size_bytes": 483560,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    },
    "st_filename": "st_vid10392-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 6,
            "Diffie-Hellman": 4
          }
        },
        "RSA": {
          "RSA-2048": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_GENERAL_PURPOSE": 1,
          "A.NO_TOE_BYPASS": 1,
          "A.PHYSICAL": 1,
          "A.UIA_ONLY": 1
        },
        "O": {
          "O.ADMIN_ROLE": 1,
          "O.AUDIT_GENERATION": 1,
          "O.AUDIT_PROTECTION": 1,
          "O.AUDIT_REVIEW": 1,
          "O.CHANGE_MANAGEMENT": 1,
          "O.CORRECT_": 1,
          "O.CRYPTOGRAPHIC_": 1,
          "O.CRYPTOGRAPHY_": 1,
          "O.DISPLAY_BANNER": 1,
          "O.DOCUMENT_KEY_LEAKAGE": 1,
          "O.MAINT_MODE": 2,
          "O.MANAGE": 2,
          "O.MEDIATE": 4,
          "O.REPLAY_DETECTION": 1,
          "O.RESIDUAL_INFORMATION": 1,
          "O.RESOURCE_SHARING": 1,
          "O.ROBUST_ADMIN_GUIDANCE": 1,
          "O.ROBUST_TOE_ACCESS": 1,
          "O.SELF_PROTECTION": 2,
          "O.SOUND_IMPLEMENTATION": 1,
          "O.THOROUGH_FUNCTIONAL_": 1,
          "O.TIME_STAMPS": 1,
          "O.TRUSTED_PATH": 1,
          "O.VULNERABILITY_ANALYSIS_TEST": 1
        },
        "OE": {
          "OE.CRYPTANALYTIC": 1,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.NO_TOE_BYPASS": 1,
          "OE.PHYSICAL": 1,
          "OE.UIA_ONLY": 1
        },
        "T": {
          "T.ADDRESS_MASQUERADE": 1,
          "T.ADMIN_ERROR": 1,
          "T.ADMIN_ROGUE": 1,
          "T.AUDIT_COMPROMISE": 1,
          "T.CRYPTO_COMPROMISE": 1,
          "T.FLAWED_DESIGN": 1,
          "T.FLAWED_IMPLEMENTATION": 1,
          "T.MALICIOUS_TSF_": 1,
          "T.MASQUERADE": 1,
          "T.POOR_TEST": 1,
          "T.REPLAY": 1,
          "T.RESIDUAL_DATA": 1,
          "T.RESOURCE_EXHAUSTION": 1,
          "T.SPOOFING": 1,
          "T.UNATTENDED_SESSION": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNIDENTIFIED_ACTIONS": 1,
          "T.UNKNOWN_STATE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 10,
          "ADV_FSP": 1,
          "ADV_FSP.4": 11,
          "ADV_FSP.5": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 7,
          "ADV_INT.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.3": 15,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 15,
          "ALC_CMS": 1,
          "ALC_CMS.4": 6,
          "ALC_DEL": 1,
          "ALC_DEL.1": 5,
          "ALC_DVS": 1,
          "ALC_DVS.1": 5,
          "ALC_FLR": 1,
          "ALC_FLR.2": 16,
          "ALC_LCD": 1,
          "ALC_LCD.1": 6,
          "ALC_TAT": 1,
          "ALC_TAT.1": 7
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 5,
          "ATE_DPT": 1,
          "ATE_DPT.3": 9,
          "ATE_FUN": 1,
          "ATE_FUN.1": 8,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL4": 3,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 4,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 10,
          "FAU_GEN.1": 4,
          "FAU_GEN.2": 1,
          "FAU_SAA": 7,
          "FAU_SAA.1": 2,
          "FAU_SAR": 4,
          "FAU_SAR.1": 3,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 4,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 3,
          "FAU_SAR.3.1": 1,
          "FAU_SEL": 5,
          "FAU_SEL.1": 2,
          "FAU_STG": 10,
          "FAU_STG.1": 4,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 4,
          "FAU_STG.3.1": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 9,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 3,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 5,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXT": 1,
          "FCS_CKM_EXT.2": 1,
          "FCS_COP": 1,
          "FCS_COP.1": 27,
          "FCS_COP.1.1": 6,
          "FCS_COP_EXT.1": 1
        },
        "FDP": {
          "FDP_IFC.1": 19,
          "FDP_IFC.1.1": 3,
          "FDP_IFF.1": 21,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 5,
          "FDP_IFF.1.3": 3,
          "FDP_IFF.1.4": 3,
          "FDP_IFF.1.5": 3,
          "FDP_IFF.1.6": 2,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_RIP": 1,
          "FDP_RIP.2": 3,
          "FDP_RIP.2.1": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 4,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 1,
          "FIA_UID.2": 3,
          "FIA_UID.2.1": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 3,
          "FIA_USB.1.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 25,
          "FMT_MOF.1.1": 7,
          "FMT_MSA": 11,
          "FMT_MSA.1": 5,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 24,
          "FMT_MTD.1.1": 7,
          "FMT_MTD.2": 10,
          "FMT_MTD.2.1": 2,
          "FMT_MTD.2.2": 2,
          "FMT_REV": 1,
          "FMT_REV.1": 3,
          "FMT_REV.1.1": 1,
          "FMT_REV.1.2": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 1,
          "FMT_SMR.2": 3,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 2
        },
        "FPT": {
          "FPT_FLS": 2,
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_ITC": 3,
          "FPT_ITC.1": 5,
          "FPT_ITC.1.1": 1,
          "FPT_ITT": 2,
          "FPT_ITT.1": 6,
          "FPT_ITT.1.1": 1,
          "FPT_RCV": 1,
          "FPT_RCV.1": 3,
          "FPT_RCV.1.1": 1,
          "FPT_RPL": 1,
          "FPT_RPL.1": 3,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2
        },
        "FRU": {
          "FRU_FLT": 2,
          "FRU_FLT.1": 6,
          "FRU_FLT.1.1": 1,
          "FRU_RSA.1": 11,
          "FRU_RSA.1.1": 2
        },
        "FTA": {
          "FTA_SSL": 4,
          "FTA_SSL.1": 1,
          "FTA_SSL.2": 4,
          "FTA_SSL.2.1": 1,
          "FTA_SSL.2.2": 1,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1,
          "FTA_TAB": 1,
          "FTA_TAB.1": 4,
          "FTA_TAB.1.1": 1,
          "FTA_TSE": 1,
          "FTA_TSE.1": 3,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 2,
          "FTP_ITC.1.3": 2,
          "FTP_TRP.1": 8,
          "FTP_TRP.1.1": 2,
          "FTP_TRP.1.2": 2,
          "FTP_TRP.1.3": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 6
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 13,
          "IKEv1": 2
        },
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 14
        },
        "TLS": {
          "SSL": {
            "SSL": 22
          },
          "TLS": {
            "TLS": 3,
            "TLS 1.2": 1,
            "TLS v1.0": 3,
            "TLSv1.0": 1
          }
        },
        "VPN": {
          "VPN": 40
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 15
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 1,
            "SHA-384": 2,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 8
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 12,
          "FIPS 180-3": 1,
          "FIPS PUB 140-2": 7,
          "FIPS140-2": 1
        },
        "NIST": {
          "NIST SP 800-57": 3
        },
        "RFC": {
          "RFC 792": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7,
            "AES-256": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 5,
            "HMAC-SHA-256": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 1
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20150223143644-05\u002700\u0027",
      "/ModDate": "D:20150223143644-05\u002700\u0027",
      "pdf_file_size_bytes": 1237301,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#2323"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 82
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ATE_DPT.3",
      "EAL4+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6c04c77c48f77c3375dbe27b4f2f80eb91669d900f03691c92fdc56ea3579e62",
      "txt_hash": "0a3e870002c44dac329887b1803d2393921d6892f24030f22dee07164ea67801"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e1e900922cc893f1d721bddb7d4312e53732b05a38da3c0733ff667a5060f628",
      "txt_hash": "794d90d286ed54320eb8a4515cba2e0eee02461977ff110d95e660e688ed3586"
    }
  },
  "status": "archived"
}