Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)

CSV information ?

Status archived
Valid from 19.02.2013
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Microsoft Corporation
Category Databases
Security level ALC_FLR.2, EAL4+
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0811-2013

Certificate ?

Certification report ?

Extracted keywords

Hash functions
SHA-1

Trusted Execution Environments
SE
Vendor
Microsoft, Microsoft Corporation

Security level
EAL 4, EAL1, EAL4, EAL4+, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_ADD, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Certificates
BSI-DSZ-CC-0811-2013, BSI-DSZ-CC-0811
Evaluation facilities
TÜV Informationstechnik
Certification process
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.3000.0 (confidential document) [8] Microsoft SQL ServerTM 2012 Books Online (BOL); File name

Certification process
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.3000.0 (confidential document) [8] Microsoft SQL ServerTM 2012 Books Online (BOL); File name

Standards
AIS 32
Technical reports
BSI 7125, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0811-2013
Subject Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)
Keywords "Microsoft SQL Server 2012 Database Engine Enterprise Edition x64, Version 11.0.3000.0"
Author Federal Office for Information Security
Creation date D:20130306131843+01'00'
Modification date D:20130307064603+01'00'
Pages 36
Creator Writer
Producer OpenOffice.org 3.2

Frontpage

Certificate ID BSI-DSZ-CC-0811-2013
Certified item Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1
Certification lab BSI
Developer Microsoft Corporation

Security target ?

Extracted keywords

Hash functions
SHA-1

Trusted Execution Environments
SE
Vendor
Microsoft Corporation, Microsoft

Security level
EAL4+, EAL4, EAL 4, EAL2, EAL4 augmented, EAL 4 augmented
Claims
O.ACCESS_HISTORY, O.ADMIN_GUIDANCE, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.CONFIGURATION_IDENTIFICATION, O.DOCUMENTED_DESIGN, O.INTERNAL_TOE_DOMAINS, O.MANAGE, O.MEDIATE, O.PARTIAL_FUNCTIONAL_TEST, O.PARTIAL_SELF_PROTECTION, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.VULNERABILITY_ANALYSIS, O.CONFIGURATION_IDENTIFICATI, O.CONFIGURATION_IDE, O.CONFIGURATION_IDENTI, O.DOCUMENTED_DESIG, O.VULNERABILITY_ANA, O.VULNERABILITY_ANALYSI, O.PARTIAL_FUNCTIONA, O.PARTIAL_FUNCTIONAL_T, O.DOCUMENTED_, O.RESIDUAL_INFORMAT, O.PARTIAL_SELF_PROT, O.PARTIAL_SELF_PROTECT, O.INTERNAL_TOE_DOM, O.INTERNAL_TOE_DOMAIN, O.AUDIT_, O.CONFIGURATION_I, O.DOCUMENTED_DES, O.INTERNAL_TOE_DO, O.PARTIAL_FUNCTION, O.PARTIAL_SELF_PR, O.RESIDUAL_INFORM, O.VULNERABILITY_, T.ACCIDENTAL_ADMIN_ERROR, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, T.UNIDENTIFIED_ACTIONS, T.ACCIDENTAL_ADMIN_, A.NO_EVIL, A.NO_GENERAL_PURPOSE, A.PHYSICAL, OE.NO_EVIL, OE.NO_GENERAL_, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE
Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_TDS.3, ADV_ARC.1, AGD_ADD, AGD_PRE.1, AGD_PRE, AGD_OPE.1, ALC_FLR.2, ALC_DEL.1, ALC_CMS.4, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3
Security Functional Requirements (SFR)
FAU_STG_EXP.5, FAU_STG, FAU_GEN, FAU_SEL, FAU_STG_EXP, FAU_STG.3, FAU_STG.1, FAU_STG_EXP.5.1, FAU_GEN.1, FAU_SEL.1, FAU_GEN.2, FAU_STG.4, FDP_ACF, FDP_ACC.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1, FDP_RIP.1.1, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.3.2, FPT_STM.1, FPT_ITT.1, FPT_TRC.1.1, FPT_TRC.1.2, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1
Certificates
BSI-DSZ-CC-0811

File metadata

Title Security Target - SQL Server 2012 Team
Subject Security Target
Keywords CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System
Author Roger French
Creation date D:20130114171743+01'00'
Modification date D:20130114171743+01'00'
Pages 58
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics ?

Certificate ID: BSI-DSZ-CC-0811-2013

Extracted SARs

ALC_FLR.2, APE_REQ.2, ADV_TDS.3, ALC_CMC.5, ADV_FSP.4, ALC_DVS.2, APE_SPD.1, ASE_CCL.1, AVA_VAN.3, ATE_COV.2, ALC_LCD.2, ATE_FUN.1, ALC_CMS.4, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, APE_OBJ.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, APE_ECD.1, ADV_SPM.1, ASE_ECD.1, ASE_TSS.2, APE_CCL.1, ASE_SPD.1, ATE_DPT.4, APE_INT.1

Similar certificates

Name Certificate ID
SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1) JISEC-CC-CRP-C0537 Compare
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60 JISEC-CC-CRP-C0371 Compare
Database Engine of Microsoft SQL Server 2008 R2 Enterprise Edition and Datacenter Edition (English) x64, Version 10.50.2500.0 BSI-DSZ-CC-0698-2012 Compare
Microsoft SQL Server 2019 Database Engine Enterprise Edition x64 (English), version 15.0.4033.1 2019-44-INF-3227 Compare
Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English), version 16.0.4025.1 2022-34-INF-4109 Compare
Microsoft SQL Server 2019 Database Engine Enterprise Edition x64 (English), version 15.0.4178.1 2019-45-INF-3781 Compare
Microsoft SQL Server 2019 on Linux Database Engine Enterprise Edition x64 (English), version 15.0.4033.1 2019-43-INF-3225 Compare
Database Engine of Microsoft SQL Server 2008 Enterprise Edition (English) x86 and x64, Version / Built 10.0.4000.0 BSI-DSZ-CC-0591-2011 Compare
Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2 2022-36-INF-4306 Compare
Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3 BSI-DSZ-CC-1050-2020 Compare
Microsoft SQL Server 2022 on Linux Database Engine Enterprise Edition x64 (English) version 16.0.4105.2 2022-33-INF-4305 Compare
Microsoft SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 BSI-DSZ-CC-1004-2017 Compare
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 JISEC-CC-CRP-C0475 Compare
Microsoft SQL Server 2008 Enterprise Edition (English) x86 and x64, Version 10.0.1600.22 BSI-DSZ-CC-0520-2009 Compare
Database Engine of Microsoft SQL Server 2005 SP2, Enterprise Edition (English) Version 9.00.3068.00 BSI-DSZ-CC-0366-2008 Compare
Database Engine of Microsoft SQL Server 2005 Enterprise Edition (English) SP1, Version/Build 9.00.2047.00 BSI-DSZ-CC-0416-2007 Compare
Oracle Database 11g Release 2 Standard Edition and Standard Edition 1, version 11.2.0.2, with all critical patch updates up to and including July 2011 via the July 2011 PSU as well as the October 2011 CPU BSI-DSZ-CC-0765-2012 Compare
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 BSI-DSZ-CC-0929-2015 Compare
Microsoft Internet Security and Acceleration Server 2004 – Enterprise Edition – Service Pack 2 – Version 4.0.3443.594 BSI-DSZ-CC-0387-2007 Compare
Oracle Database 11g Release 2 Enterprise Edition, version 11.2.0.2, with all critical patch updates up to and including July 2011 via the July 2011 PSU as well as the October 2011 CPU BSI-DSZ-CC-0766-2012 Compare
Showing 5 out of 20.

References ?

No references are available for this certificate.

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile Database Management Systems, Version 1.3', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_dbms_v1.3.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_DBMS_V1.3']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd029caffc6dae99012d4e2c952f7b2296b7f4f75abf3fc0531741343b01f949c', 'txt_hash': 'ce96da6f997935856c8fc651c93e2245afef990aa6b30f6dd6cb6c8bbdc58754'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd63f2fcb56c8e6edb00611105b1554cf3960f9db9506432e86baea44e40da66e', 'txt_hash': 'cae1143329d3850636c5d7ca05622471ea748e4102192d5fcdda50725e617f69'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 935036, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Author': 'Federal Office for Information Security', '/CreationDate': "D:20130306131843+01'00'", '/Creator': 'Writer', '/Keywords': '"Microsoft SQL Server 2012 Database Engine Enterprise Edition x64, Version 11.0.3000.0"', '/ModDate': "D:20130307064603+01'00'", '/Producer': 'OpenOffice.org 3.2', '/Subject': 'Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)', '/Title': 'Certification Report BSI-DSZ-CC-0811-2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1407252, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 58, '/Title': 'Security Target - SQL Server 2012 Team', '/Author': 'Roger French', '/Subject': 'Security Target', '/Keywords': 'CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20130114171743+01'00'", '/ModDate': "D:20130114171743+01'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.microsoft.com/licensing/servicecenter/default.aspx', 'https://www.microsoft.com/sqlserver/en/us/common-criteria.aspx']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0811-2013', 'cert_item': 'Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1', 'developer': 'Microsoft Corporation', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0811-2013': 19, 'BSI-DSZ-CC-0811': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 6, 'EAL1': 7, 'EAL4': 6, 'EAL4+': 2, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_ADD': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 1, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 23, 'Microsoft Corporation': 8}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 17}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 32': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.3000.0 (confidential document) [8] Microsoft SQL ServerTM 2012 Books Online (BOL); File name': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0811': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 58, 'EAL4': 1, 'EAL 4': 2, 'EAL2': 1, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_TDS.3': 2, 'ADV_ARC.1': 2}, 'AGD': {'AGD_ADD': 3, 'AGD_PRE.1': 2, 'AGD_PRE': 1, 'AGD_OPE.1': 4}, 'ALC': {'ALC_FLR.2': 6, 'ALC_DEL.1': 1, 'ALC_CMS.4': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 5}}, 'cc_sfr': {'FAU': {'FAU_STG_EXP.5': 14, 'FAU_STG': 3, 'FAU_GEN': 11, 'FAU_SEL': 8, 'FAU_STG_EXP': 2, 'FAU_STG.3': 1, 'FAU_STG.1': 2, 'FAU_STG_EXP.5.1': 2, 'FAU_GEN.1': 2, 'FAU_SEL.1': 1, 'FAU_GEN.2': 1, 'FAU_STG.4': 1}, 'FDP': {'FDP_ACF': 9, 'FDP_ACC.1': 10, 'FDP_RIP.1': 5, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 4, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 10, 'FIA_UAU.2': 8, 'FIA_UAU.5': 8, 'FIA_UID.2': 12, 'FIA_ATD.1.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 11}, 'FMT': {'FMT_MOF.1': 6, 'FMT_MSA.1': 7, 'FMT_MTD.1': 7, 'FMT_REV.1': 14, 'FMT_SMF.1': 7, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 4, 'FMT_MTD.1.1': 1, 'FMT_REV.1.1': 4, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3.2': 1}, 'FPT': {'FPT_STM.1': 1, 'FPT_ITT.1': 1, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1}, 'FTA': {'FTA_MCS.1': 5, 'FTA_TSE.1': 5, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.ACCESS_HISTORY': 5, 'O.ADMIN_GUIDANCE': 6, 'O.ADMIN_ROLE': 5, 'O.AUDIT_GENERATION': 3, 'O.CONFIGURATION_IDENTIFICATION': 1, 'O.DOCUMENTED_DESIGN': 4, 'O.INTERNAL_TOE_DOMAINS': 1, 'O.MANAGE': 7, 'O.MEDIATE': 4, 'O.PARTIAL_FUNCTIONAL_TEST': 2, 'O.PARTIAL_SELF_PROTECTION': 1, 'O.RESIDUAL_INFORMATION': 4, 'O.TOE_ACCESS': 6, 'O.VULNERABILITY_ANALYSIS': 2, 'O.CONFIGURATION_IDENTIFICATI': 1, 'O.CONFIGURATION_IDE': 2, 'O.CONFIGURATION_IDENTI': 2, 'O.DOCUMENTED_DESIG': 1, 'O.VULNERABILITY_ANA': 3, 'O.VULNERABILITY_ANALYSI': 3, 'O.PARTIAL_FUNCTIONA': 2, 'O.PARTIAL_FUNCTIONAL_T': 2, 'O.DOCUMENTED_': 1, 'O.RESIDUAL_INFORMAT': 2, 'O.PARTIAL_SELF_PROT': 1, 'O.PARTIAL_SELF_PROTECT': 1, 'O.INTERNAL_TOE_DOM': 1, 'O.INTERNAL_TOE_DOMAIN': 1, 'O.AUDIT_': 1, 'O.CONFIGURATION_I': 1, 'O.DOCUMENTED_DES': 1, 'O.INTERNAL_TOE_DO': 1, 'O.PARTIAL_FUNCTION': 1, 'O.PARTIAL_SELF_PR': 1, 'O.RESIDUAL_INFORM': 1, 'O.VULNERABILITY_': 1}, 'T': {'T.ACCIDENTAL_ADMIN_ERROR': 2, 'T.MASQUERADE': 3, 'T.POOR_DESIGN': 3, 'T.POOR_IMPLEMENTATION': 3, 'T.POOR_TEST': 3, 'T.RESIDUAL_DATA': 3, 'T.TSF_COMPROMISE': 3, 'T.UNAUTHORIZED_ACCESS': 3, 'T.UNIDENTIFIED_ACTIONS': 3, 'T.ACCIDENTAL_ADMIN_': 1}, 'A': {'A.NO_EVIL': 3, 'A.NO_GENERAL_PURPOSE': 3, 'A.PHYSICAL': 3}, 'OE': {'OE.NO_EVIL': 4, 'OE.NO_GENERAL_': 2, 'OE.PHYSICAL': 4, 'OE.NO_GENERAL_PURPOSE': 1}}, 'vendor': {'Microsoft': {'Microsoft Corporation': 2, 'Microsoft': 11}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0811a_pdf.pdf.
    • The st_filename property was set to 0811b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0811-2013.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0811a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0811b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Databases",
  "cert_link": null,
  "dgst": "c068a098bbcc7e17",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0811-2013",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "11.0.3000.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Microsoft Corporation",
  "manufacturer_web": "https://www.microsoft.com",
  "name": "Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2013-02-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0811a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0811-2013",
        "cert_item": "Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1",
        "cert_lab": "BSI",
        "developer": "Microsoft Corporation",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0811": 1,
          "BSI-DSZ-CC-0811-2013": 19
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_ADD": 1,
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 1,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 5,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 6,
          "EAL 4 augmented": 3,
          "EAL1": 7,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 6,
          "EAL4+": 2,
          "EAL5": 6,
          "EAL6": 3,
          "EAL7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.3000.0 (confidential document) [8] Microsoft SQL ServerTM 2012 Books Online (BOL); File name": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 17
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 23,
          "Microsoft Corporation": 8
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/CreationDate": "D:20130306131843+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Microsoft SQL Server 2012 Database Engine Enterprise Edition x64, Version 11.0.3000.0\"",
      "/ModDate": "D:20130307064603+01\u002700\u0027",
      "/Producer": "OpenOffice.org 3.2",
      "/Subject": "Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)",
      "/Title": "Certification Report BSI-DSZ-CC-0811-2013",
      "pdf_file_size_bytes": 935036,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "0811b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0811": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.NO_EVIL": 3,
          "A.NO_GENERAL_PURPOSE": 3,
          "A.PHYSICAL": 3
        },
        "O": {
          "O.ACCESS_HISTORY": 5,
          "O.ADMIN_GUIDANCE": 6,
          "O.ADMIN_ROLE": 5,
          "O.AUDIT_": 1,
          "O.AUDIT_GENERATION": 3,
          "O.CONFIGURATION_I": 1,
          "O.CONFIGURATION_IDE": 2,
          "O.CONFIGURATION_IDENTI": 2,
          "O.CONFIGURATION_IDENTIFICATI": 1,
          "O.CONFIGURATION_IDENTIFICATION": 1,
          "O.DOCUMENTED_": 1,
          "O.DOCUMENTED_DES": 1,
          "O.DOCUMENTED_DESIG": 1,
          "O.DOCUMENTED_DESIGN": 4,
          "O.INTERNAL_TOE_DO": 1,
          "O.INTERNAL_TOE_DOM": 1,
          "O.INTERNAL_TOE_DOMAIN": 1,
          "O.INTERNAL_TOE_DOMAINS": 1,
          "O.MANAGE": 7,
          "O.MEDIATE": 4,
          "O.PARTIAL_FUNCTION": 1,
          "O.PARTIAL_FUNCTIONA": 2,
          "O.PARTIAL_FUNCTIONAL_T": 2,
          "O.PARTIAL_FUNCTIONAL_TEST": 2,
          "O.PARTIAL_SELF_PR": 1,
          "O.PARTIAL_SELF_PROT": 1,
          "O.PARTIAL_SELF_PROTECT": 1,
          "O.PARTIAL_SELF_PROTECTION": 1,
          "O.RESIDUAL_INFORM": 1,
          "O.RESIDUAL_INFORMAT": 2,
          "O.RESIDUAL_INFORMATION": 4,
          "O.TOE_ACCESS": 6,
          "O.VULNERABILITY_": 1,
          "O.VULNERABILITY_ANA": 3,
          "O.VULNERABILITY_ANALYSI": 3,
          "O.VULNERABILITY_ANALYSIS": 2
        },
        "OE": {
          "OE.NO_EVIL": 4,
          "OE.NO_GENERAL_": 2,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.PHYSICAL": 4
        },
        "T": {
          "T.ACCIDENTAL_ADMIN_": 1,
          "T.ACCIDENTAL_ADMIN_ERROR": 2,
          "T.MASQUERADE": 3,
          "T.POOR_DESIGN": 3,
          "T.POOR_IMPLEMENTATION": 3,
          "T.POOR_TEST": 3,
          "T.RESIDUAL_DATA": 3,
          "T.TSF_COMPROMISE": 3,
          "T.UNAUTHORIZED_ACCESS": 3,
          "T.UNIDENTIFIED_ACTIONS": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_ADD": 3,
          "AGD_OPE.1": 4,
          "AGD_PRE": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 6
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4 augmented": 1,
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL4+": 58
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 11,
          "FAU_GEN.1": 2,
          "FAU_GEN.2": 1,
          "FAU_SEL": 8,
          "FAU_SEL.1": 1,
          "FAU_STG": 3,
          "FAU_STG.1": 2,
          "FAU_STG.3": 1,
          "FAU_STG.4": 1,
          "FAU_STG_EXP": 2,
          "FAU_STG_EXP.5": 14,
          "FAU_STG_EXP.5.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 10,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 9,
          "FDP_ACF.1": 4,
          "FDP_IFC.1": 1,
          "FDP_RIP.1": 5,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 11,
          "FIA_UID.2": 12,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 7,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 4,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_REV.1": 14,
          "FMT_REV.1.1": 4,
          "FMT_REV.1.2": 2,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT.1": 1,
          "FPT_STM.1": 1,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1
        },
        "FTA": {
          "FTA_MCS.1": 5,
          "FTA_MCS.1.1": 1,
          "FTA_MCS.1.2": 1,
          "FTA_TSE.1": 5,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 11,
          "Microsoft Corporation": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Roger French",
      "/CreationDate": "D:20130114171743+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System",
      "/ModDate": "D:20130114171743+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "Security Target",
      "/Title": "Security Target - SQL Server 2012 Team",
      "pdf_file_size_bytes": 1407252,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.microsoft.com/sqlserver/en/us/common-criteria.aspx",
          "https://www.microsoft.com/licensing/servicecenter/default.aspx"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 58
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL2+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_DBMS_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_dbms_v1.3.pdf",
        "pp_name": "U.S. Government Protection Profile Database Management Systems, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0811a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0811b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d029caffc6dae99012d4e2c952f7b2296b7f4f75abf3fc0531741343b01f949c",
      "txt_hash": "ce96da6f997935856c8fc651c93e2245afef990aa6b30f6dd6cb6c8bbdc58754"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d63f2fcb56c8e6edb00611105b1554cf3960f9db9506432e86baea44e40da66e",
      "txt_hash": "cae1143329d3850636c5d7ca05622471ea748e4102192d5fcdda50725e617f69"
    }
  },
  "status": "archived"
}