Argus Command Center Web Portal Stable Version 2.1
CSV information ?
Status | active |
---|---|
Valid from | 23.06.2021 |
Valid until | 23.06.2026 |
Scheme | 🇲🇾 MY |
Manufacturer | Certis CISCO Security Pte Ltd (Certis) |
Category | Other Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Extracted keywords
File metadata
Creation date | D:20210630131348Z |
---|---|
Modification date | D:20210630215915+08'00' |
Pages | 1 |
Creator | Word |
Producer | macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext |
Certification report ?
Extracted keywords
Protocols
TLSv1.2, TLS 1.2Vendor
CiscoSecurity level
EAL2, EAL 2Claims
A.TRUSTED_ADMIN, A.TRUSTED_DEV, A.TIMESTAMP, A.CLOUD, A.MALWARE, A.DDOS, A.CONNECTIVITY, A.THIRDPARTYSecurity Assurance Requirements (SAR)
ALC_DEL.1, ALC_CMS.2Security Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.1, FIA_ATD.1, FIA_SOS.2, FIA_UID.1, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FTP_ITC.1, FTP_TRP.1Certificates
ISCB-3-RPT-C115-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
Creation date | D:20210629084408Z00'00' |
---|---|
Modification date | D:20210629084408Z00'00' |
Pages | 36 |
Creator | Word |
Producer | macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext |
Security target ?
Extracted keywords
Protocols
TLS 1.2, TLSv1.2Vendor
Samsung, CiscoSecurity level
EAL2, EAL 2Claims
O.SEC_ACCESS, O.SEC_AUTHENTICATE, O.SEC_COMMUNICATION, O.SEC_PASSWORD_GENERATION, O.SEC_PASSWORD_GENER, T.BROKEN_AUTH, T.UNAUTHORIZED_ACCESS, T.INTERCEPTION, T.WEAK_PASSWORD_GENE, T.WEAK_PASSWORD_GENERATION, T.UNAUTHORIZED_AC, T.WEAK_PASSWORD_, A.TRUSTED_ADMIN, A.TRUSTED_DEV, A.TIMESTAMP, A.CLOUD, A.MALWARE, A.DDOS, A.CONNECTIVITY, A.THIRDPARTY, OE.ADMINISTRATOR, OE.DEVELOPER, OE.SYN_TIMESTAMP, OE.SAFE_CLOUD, OE.ANTI_MALWARE, OE.ANTI_DDOS, OE.SAFE_CONNECTIVITY, OE.THIRDPARTYSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_ECD.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECDSecurity Functional Requirements (SFR)
FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_AFL.1, FIA_UAU.1, FIA_ATD.1, FIA_SOS.1, FIA_SOS.2, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.3, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
SPACertification process
out of scope, AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope, infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s, inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the, environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and, together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hostingFile metadata
Title | 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 |
---|---|
Author | CLAIREHYC |
Creation date | D:20210701124256+08'00' |
Modification date | D:20210701124256+08'00' |
Pages | 46 |
Creator | PDFCreator Free 4.2.0 |
Producer | GPL Ghostscript 9.52 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data ?
Cert No | 2021-004-C115 | |
---|---|---|
Developer | Certis CISCO Security Pte Ltd (Certis) | |
Level | EAL2 | |
Product | Argus Command Center Web Portal Stable V.2.1 | |
Certification Date | 23.06.2021 | |
Expiration Date | 23.06.2026 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/130 | |
Enhanced | ||
Cert Id | C115 | |
Product | Argus Command Center Web Portal Stable V.2.1 | |
Developer | Certis Cyber Competency Centre20 Jalan Afifi Singapore 409179 T: +65 6856 8799E: [email protected] https://www.certisgroup.com | |
Category | Other Devices and Systems | |
Type | Other Devices and Systems | |
Scope | The Target of Evaluation (TOE) is a web-based command centre application of the Argus System called the Argus Command Centre Web Portal (Argus CC) which provides the use for two primary purposes as an officer (security personnel) support system; security operations management and account management through the Internet. The user roles defined in the Argus CC consist of System Administrator, Account Owner, Managers, Operators, Supervisors and Officers. Supervisors and Officers are managed by TOE users but are themselves not TOE users and are thus omitted from the scope of this evaluation. Fundamentally, the TOE can be accessed by consumers via selected web browsers (front-end Command Centre). | |
Assurance Level | EAL2 | |
Certification Date | 23.06.2021 | |
Expiration Date | 23.06.2026 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/2019_Certis_Cisco__Argus_CC_EAL2__Security_Target_ASE-v1.14_2-smallsize.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/ISCB-5-RPT-C119-CR-v1.pdf | |
Status | Valid |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2021-06-23', 'expiration_date': '2026-06-23', 'enhanced': {'__update__': {'developer': 'Certis Cyber Competency Centre20 Jalan Afifi Singapore 409179 T: +65 6856 8799E: [email protected] https://www.certisgroup.com', 'certification_date': '2021-06-23', 'expiration_date': '2026-06-23'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '309e06af0ee8d7ff15c1dcbb4eeb853798b2c4d23b5729d60f3265acb043dd0f', 'txt_hash': '4dcabd774290a4d5e25c8d685282a5b5a8e46022ce51a80df50dd8497ee02bb2'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5512b8f95c223c4349bc9bc2f611f6a336afd1e13cea51e52211959d9d7b9b0b', 'txt_hash': 'f3160f8243c7f7ab6f114fe75a8018343bfea0305efd10cdfbe0d5af2de4ce0b'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fc2cb9a4772830d7b14e816f2d46aad5bfaa7d2c4a64620dd195a9cb9fe3a082', 'txt_hash': '626edb526c4ad2df4ba576de449da8218114b250c3e28f12e09aae9d4649c96a'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 800031, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Producer': 'macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20210629084408Z00'00'", '/ModDate': "D:20210629084408Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1022047, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 46, '/Producer': 'GPL Ghostscript 9.52', '/CreationDate': "D:20210701124256+08'00'", '/ModDate': "D:20210701124256+08'00'", '/Title': '2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14', '/Author': 'CLAIREHYC', '/Subject': '', '/Keywords': '', '/Creator': 'PDFCreator Free 4.2.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 205722, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': 'D:20210630131348Z', '/Creator': 'Word', '/ModDate': "D:20210630215915+08'00'", '/Producer': 'macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-3-RPT-C115-CR-v1': 35}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 6, 'EAL 2': 3}}, 'cc_sar': {'ALC': {'ALC_DEL.1': 1, 'ALC_CMS.2': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC.1': 14, 'FDP_ACF.1': 1}, 'FIA': {'FIA_AFL.1': 2, 'FIA_SOS.1': 3, 'FIA_UAU.1': 2, 'FIA_ATD.1': 5, 'FIA_SOS.2': 2, 'FIA_UID.1': 7}, 'FMT': {'FMT_MSA.1': 7, 'FMT_SMF.1': 3, 'FMT_SMR.1': 3}, 'FTP': {'FTP_ITC.1': 17, 'FTP_TRP.1': 2}}, 'cc_claims': {'A': {'A.TRUSTED_ADMIN': 1, 'A.TRUSTED_DEV': 1, 'A.TIMESTAMP': 1, 'A.CLOUD': 1, 'A.MALWARE': 1, 'A.DDOS': 1, 'A.CONNECTIVITY': 1, 'A.THIRDPARTY': 1}}, 'vendor': {'Cisco': {'Cisco': 5}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLSv1.2': 1, 'TLS 1.2': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 11, 'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_DEL.1': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 3, 'ASE_CCL.1': 3, 'ASE_ECD.1': 3, 'ASE_SPD.1': 3, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 5, 'ASE_TSS.1': 3, 'ASE_ECD': 1}}, 'cc_sfr': {'FDP': {'FDP_ACC.1': 8, 'FDP_ACF.1': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_AFL.1': 5, 'FIA_UAU.1': 6, 'FIA_ATD.1': 5, 'FIA_SOS.1': 6, 'FIA_SOS.2': 5, 'FIA_UID.1': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.1': 6, 'FMT_SMR.1': 9, 'FMT_SMF.1': 6, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.SEC_ACCESS': 5, 'O.SEC_AUTHENTICATE': 5, 'O.SEC_COMMUNICATION': 5, 'O.SEC_PASSWORD_GENERATION': 3, 'O.SEC_PASSWORD_GENER': 1}, 'T': {'T.BROKEN_AUTH': 4, 'T.UNAUTHORIZED_ACCESS': 2, 'T.INTERCEPTION': 4, 'T.WEAK_PASSWORD_GENE': 1, 'T.WEAK_PASSWORD_GENERATION': 1, 'T.UNAUTHORIZED_AC': 1, 'T.WEAK_PASSWORD_': 1}, 'A': {'A.TRUSTED_ADMIN': 4, 'A.TRUSTED_DEV': 3, 'A.TIMESTAMP': 4, 'A.CLOUD': 3, 'A.MALWARE': 4, 'A.DDOS': 3, 'A.CONNECTIVITY': 4, 'A.THIRDPARTY': 3}, 'OE': {'OE.ADMINISTRATOR': 3, 'OE.DEVELOPER': 3, 'OE.SYN_TIMESTAMP': 3, 'OE.SAFE_CLOUD': 3, 'OE.ANTI_MALWARE': 3, 'OE.ANTI_DDOS': 3, 'OE.SAFE_CONNECTIVITY': 3, 'OE.THIRDPARTY': 3}}, 'vendor': {'Samsung': {'Samsung': 4}, 'Cisco': {'Cisco': 7}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS 1.2': 3, 'TLSv1.2': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 5, 'AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope': 1, 'infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s': 1, 'inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the': 1, 'environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and': 1, 'together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C115-CR-v1.pdf
. - The st_filename property was set to
2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf
. - The cert_filename property was set to
ISCB-5-CERT-C115-CERTIFICATE-v1.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-3-RPT-C115-CR-v1
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20–%20Security%20Target%20[ASE]-v1.14%202.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Argus Command Center Web Portal Stable Version 2.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
"dgst": "c86ad5ef88d4cf8b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C115-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2021-004-C115",
"certification_date": "2021-06-23",
"developer": "Certis CISCO Security Pte Ltd (Certis)",
"enhanced": {
"assurance_level": "EAL2",
"category": "Other Devices and Systems",
"cert_id": "C115",
"certification_date": "2021-06-23",
"developer": "Certis Cyber Competency Centre20 Jalan Afifi Singapore 409179 T: +65 6856 8799E: [email protected] https://www.certisgroup.com",
"expiration_date": "2026-06-23",
"mutual_recognition": "CCRA",
"product": "Argus Command Center Web Portal Stable V.2.1",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/ISCB-5-RPT-C119-CR-v1.pdf",
"scope": "The Target of Evaluation (TOE) is a web-based command centre application of the Argus System called the Argus Command Centre Web Portal (Argus CC) which provides the use for two primary purposes as an officer (security personnel) support system; security operations management and account management through the Internet. The user roles defined in the Argus CC consist of System Administrator, Account Owner, Managers, Operators, Supervisors and Officers. Supervisors and Officers are managed by TOE users but are themselves not TOE users and are thus omitted from the scope of this evaluation. Fundamentally, the TOE can be accessed by consumers via selected web browsers (front-end Command Centre).",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C115/2019_Certis_Cisco__Argus_CC_EAL2__Security_Target_ASE-v1.14_2-smallsize.pdf",
"type": "Other Devices and Systems"
},
"expiration_date": "2026-06-23",
"level": "EAL2",
"product": "Argus Command Center Web Portal Stable V.2.1",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/130"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Certis CISCO Security Pte Ltd (Certis)",
"manufacturer_web": "https://www.certisgroup.com/",
"name": "Argus Command Center Web Portal Stable Version 2.1",
"not_valid_after": "2026-06-23",
"not_valid_before": "2021-06-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20210630131348Z",
"/Creator": "Word",
"/ModDate": "D:20210630215915+08\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 205722,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C115-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C115-CR-v1": 35
}
},
"cc_claims": {
"A": {
"A.CLOUD": 1,
"A.CONNECTIVITY": 1,
"A.DDOS": 1,
"A.MALWARE": 1,
"A.THIRDPARTY": 1,
"A.TIMESTAMP": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_DEV": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 6
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 14,
"FDP_ACF.1": 1
},
"FIA": {
"FIA_AFL.1": 2,
"FIA_ATD.1": 5,
"FIA_SOS.1": 3,
"FIA_SOS.2": 2,
"FIA_UAU.1": 2,
"FIA_UID.1": 7
},
"FMT": {
"FMT_MSA.1": 7,
"FMT_SMF.1": 3,
"FMT_SMR.1": 3
},
"FTP": {
"FTP_ITC.1": 17,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 1,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210629084408Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210629084408Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 800031,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14 2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CLOUD": 3,
"A.CONNECTIVITY": 4,
"A.DDOS": 3,
"A.MALWARE": 4,
"A.THIRDPARTY": 3,
"A.TIMESTAMP": 4,
"A.TRUSTED_ADMIN": 4,
"A.TRUSTED_DEV": 3
},
"O": {
"O.SEC_ACCESS": 5,
"O.SEC_AUTHENTICATE": 5,
"O.SEC_COMMUNICATION": 5,
"O.SEC_PASSWORD_GENER": 1,
"O.SEC_PASSWORD_GENERATION": 3
},
"OE": {
"OE.ADMINISTRATOR": 3,
"OE.ANTI_DDOS": 3,
"OE.ANTI_MALWARE": 3,
"OE.DEVELOPER": 3,
"OE.SAFE_CLOUD": 3,
"OE.SAFE_CONNECTIVITY": 3,
"OE.SYN_TIMESTAMP": 3,
"OE.THIRDPARTY": 3
},
"T": {
"T.BROKEN_AUTH": 4,
"T.INTERCEPTION": 4,
"T.UNAUTHORIZED_AC": 1,
"T.UNAUTHORIZED_ACCESS": 2,
"T.WEAK_PASSWORD_": 1,
"T.WEAK_PASSWORD_GENE": 1,
"T.WEAK_PASSWORD_GENERATION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 4
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD": 1,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 5,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 11
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 8,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_SOS.2": 5,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 8,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope": 1,
"environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and": 1,
"infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: \u2022 Amazon Web Service (AWS) host, \u2022 database host(s); \u2022 mobile device(s": 1,
"inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the": 1,
"out of scope": 5,
"together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 3,
"TLSv1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 7
},
"Samsung": {
"Samsung": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "CLAIREHYC",
"/CreationDate": "D:20210701124256+08\u002700\u0027",
"/Creator": "PDFCreator Free 4.2.0",
"/Keywords": "",
"/ModDate": "D:20210701124256+08\u002700\u0027",
"/Producer": "GPL Ghostscript 9.52",
"/Subject": "",
"/Title": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14",
"pdf_file_size_bytes": 1022047,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20\u2013%20Argus%20CC%20EAL2%20\u2013%20Security%20Target%20[ASE]-v1.14%202.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fc2cb9a4772830d7b14e816f2d46aad5bfaa7d2c4a64620dd195a9cb9fe3a082",
"txt_hash": "626edb526c4ad2df4ba576de449da8218114b250c3e28f12e09aae9d4649c96a"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "309e06af0ee8d7ff15c1dcbb4eeb853798b2c4d23b5729d60f3265acb043dd0f",
"txt_hash": "4dcabd774290a4d5e25c8d685282a5b5a8e46022ce51a80df50dd8497ee02bb2"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5512b8f95c223c4349bc9bc2f611f6a336afd1e13cea51e52211959d9d7b9b0b",
"txt_hash": "f3160f8243c7f7ab6f114fe75a8018343bfea0305efd10cdfbe0d5af2de4ce0b"
}
},
"status": "active"
}