{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
"dgst": "c86ad5ef88d4cf8b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C115-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Certis CISCO Security Pte Ltd (Certis)",
"manufacturer_web": "https://www.certisgroup.com/",
"name": "Argus Command Center Web Portal Stable Version 2.1",
"not_valid_after": "2026-06-23",
"not_valid_before": "2021-06-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C115-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20210630131348Z",
"/Creator": "Word",
"/ModDate": "D:20210630215915+08\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 205722,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C115-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C115-CR-v1": 35
}
},
"cc_claims": {
"A": {
"A.CLOUD": 1,
"A.CONNECTIVITY": 1,
"A.DDOS": 1,
"A.MALWARE": 1,
"A.THIRDPARTY": 1,
"A.TIMESTAMP": 1,
"A.TRUSTED_ADMIN": 1,
"A.TRUSTED_DEV": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL2": 6
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 14,
"FDP_ACF.1": 1
},
"FIA": {
"FIA_AFL.1": 2,
"FIA_ATD.1": 5,
"FIA_SOS.1": 3,
"FIA_SOS.2": 2,
"FIA_UAU.1": 2,
"FIA_UID.1": 7
},
"FMT": {
"FMT_MSA.1": 7,
"FMT_SMF.1": 3,
"FMT_SMR.1": 3
},
"FTP": {
"FTP_ITC.1": 17,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 1,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210629084408Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210629084408Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 800031,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14 2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CLOUD": 3,
"A.CONNECTIVITY": 4,
"A.DDOS": 3,
"A.MALWARE": 4,
"A.THIRDPARTY": 3,
"A.TIMESTAMP": 4,
"A.TRUSTED_ADMIN": 4,
"A.TRUSTED_DEV": 3
},
"O": {
"O.SEC_ACCESS": 5,
"O.SEC_AUTHENTICATE": 5,
"O.SEC_COMMUNICATION": 5,
"O.SEC_PASSWORD_GENER": 1,
"O.SEC_PASSWORD_GENERATION": 3
},
"OE": {
"OE.ADMINISTRATOR": 3,
"OE.ANTI_DDOS": 3,
"OE.ANTI_MALWARE": 3,
"OE.DEVELOPER": 3,
"OE.SAFE_CLOUD": 3,
"OE.SAFE_CONNECTIVITY": 3,
"OE.SYN_TIMESTAMP": 3,
"OE.THIRDPARTY": 3
},
"T": {
"T.BROKEN_AUTH": 4,
"T.INTERCEPTION": 4,
"T.UNAUTHORIZED_AC": 1,
"T.UNAUTHORIZED_ACCESS": 2,
"T.WEAK_PASSWORD_": 1,
"T.WEAK_PASSWORD_GENE": 1,
"T.WEAK_PASSWORD_GENERATION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 4
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD": 1,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 5,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 11
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC.1": 8,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_SOS.2": 5,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 8,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope": 1,
"environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and": 1,
"infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: \u2022 Amazon Web Service (AWS) host, \u2022 database host(s); \u2022 mobile device(s": 1,
"inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the": 1,
"out of scope": 5,
"together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS 1.2": 3,
"TLSv1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 7
},
"Samsung": {
"Samsung": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "CLAIREHYC",
"/CreationDate": "D:20210701124256+08\u002700\u0027",
"/Creator": "PDFCreator Free 4.2.0",
"/Keywords": "",
"/ModDate": "D:20210701124256+08\u002700\u0027",
"/Producer": "GPL Ghostscript 9.52",
"/Subject": "",
"/Title": "2019 Certis Cisco \u2013 Argus CC EAL2 \u2013 Security Target [ASE]-v1.14",
"pdf_file_size_bytes": 1022047,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20\u2013%20Argus%20CC%20EAL2%20\u2013%20Security%20Target%20[ASE]-v1.14%202.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fc2cb9a4772830d7b14e816f2d46aad5bfaa7d2c4a64620dd195a9cb9fe3a082",
"txt_hash": "626edb526c4ad2df4ba576de449da8218114b250c3e28f12e09aae9d4649c96a"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "309e06af0ee8d7ff15c1dcbb4eeb853798b2c4d23b5729d60f3265acb043dd0f",
"txt_hash": "4dcabd774290a4d5e25c8d685282a5b5a8e46022ce51a80df50dd8497ee02bb2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5512b8f95c223c4349bc9bc2f611f6a336afd1e13cea51e52211959d9d7b9b0b",
"txt_hash": "f3160f8243c7f7ab6f114fe75a8018343bfea0305efd10cdfbe0d5af2de4ce0b"
}
},
"status": "active"
}