Certificate Report Version 1.0 3 August 2022 CSA_CC_22002 For Thales Luna K7 Cryptographic Module From Thales Certification Report Version 1.0 Page 2 This page is left blank intentionally Certification Report Version 1.0 Page 3 Foreword Singapore is a Common Criteria Certificate Authorizing Nation, under the Common Criteria Recognition Arrangement (CCRA). The current list of signatory nations and approved certification schemes can be found at the CCRA portal: https://www.commoncriteriaportal.org The Singapore Common Criteria Scheme (SCCS) is established for the info- communications technology (ICT) industry to evaluate and certify their IT products against the requirements of the Common Criteria for Information Technology Security Evaluation (CC), Version 3.1 (ISO/IEC 15408) and Common Methodology for Information Technology Security Evaluation (CEM) Version 3.1 (ISO/IEC 18045) in Singapore. The SCCS is owned and managed by the Certification Body (CB) under the ambit of Cyber Security Agency of Singapore (CSA). The SCCS certification signifies that the target of evaluation (TOE) under evaluation has been assessed and found to provide the specified IT security assurance. However, certification does not guarantee absolute security and should always be read with the particular set of threats sought to be addressed and assumptions made in the process of evaluation. This certification is not an endorsement of the product. Certification Report Version 1.0 Page 4 Amendment Record Version Date Changes 1.0 August 2022 Released NOTICE The Cyber Security Agency of Singapore makes no warranty of any kind with regard to this material and shall not be liable for errors contained herein or for incidental or consequential damages in connection with the use of this material. Certification Report Version 1.0 Page 5 Executive Summary This report is intended to assist the end-user of the product in determining the suitability of the product in their deployed environment. The Target of Evaluation (TOE) is the Thales Luna K7 Cryptographic Module and was certified in 2020 under the Singapore Common Criteria Scheme (SCCS) with the Certification ID CSA-CC-19003. This re-evaluation is performed in accordance with the SCCS Assurance Continuity procedure, where a TOE has to be submitted for re-evaluation when changes made to the TOE are determined by the certification body to be major. The major changes to the TOE are as follows: • Addition of two firmware versions (7.7.2 and 7.7.3) to the existing firmware version • Addition of two hardware variants to the existing hardware version (808-000048-003 and 808-000073-002) The Target of Evaluation (TOE). The TOE comprises of the following components: Identifier Version Hardware 808-000048-002 808-000048-003 808-000073-001 808-000073-002 808-000066-001 808-000069-001 808-000070-001 Bootloader 1.1.1, 1.1.2, or 1.1.4 Firmware 7.7.0, 7.7.1, or 7.7.2 Table 1 - TOE components identifier The list of guidance documents to use with the product in its certified configuration is as follows. Name and version Version 007-013968-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part1: Preparative Procedures Revision H 007-000465-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part2: Operational Guidance (General) Revision I 007-000466-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part3: eIDAS Guidance Revision H Certification Report Version 1.0 Page 6 007-000467-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part4: TOE Integration for use in Composite Evaluation Revision G Table 2 - List of guidance documents The Thales Luna K7 Cryptographic Module (i.e. the TOE) is a Hardware Security Module (HSM) in the form of a PCI-E card (Thales Luna PCIe HSM). It is operated in a controlled environment and can be used either as a standalone device to be inserted in a server, or as a device embedded in a Thales Luna Network HSM. The TOE can fulfil general purpose HSM use cases, where assured cryptographic services alongside generation and management of cryptographic keys is required. The TOE is also suitable for use by Trust Service Providers (TSP) supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS). The re-evaluation of the TOE has been carried out by Brightsight B.V., an approved CC test laboratory, at the assurance level CC EAL 4 augmented with AVA_VAN.5 (Advanced Methodical Vulnerability Analysis) and completed on 19 July 2022. The certification body monitored each evaluation to ensure a harmonised procedure and interpretation of the criteria has been applied. Certification Report Version 1.0 Page 7 The TOE Security Functional Requirements are implemented by the following TOE Security Functionality: TOE Security Functionality Storage and management of cryptographic keys inside containers (i.e. partitions). The TOE supports a mandatory Admin Partition and several (optional) User Partitions. For a given partition, the management and usage of the related key material is restricted to the roles assigned to that partition, therefore enforcing a strict isolation between the different partitions managed inside the TOE Enforcement of per-partition authenticated user roles with varying privileges Enforcement of user authentication (either PIN or PW-based) and per-key authorization before allowing users to perform TSF-mediated actions as defined in the ST [1] Cryptographic functions covering: ▪ Digital signature generation and verification ▪ Message digest generation ▪ Message authentication code generation and verification ▪ Encryption and decryption (symmetric and asymmetric) ▪ Key generation ▪ Key derivation ▪ Generation of shared secret values ▪ Cryptographic support for one-time password and other non-PKI based authentication mechanisms ▪ Random number generation Key management functions Secure Trusted Channel (STC) for confidentiality and integrity protection of communication between TOE and Remote Client Applications. Firmware update Auditing functionalities Self-protection mechanisms: ▪ voltage and temperature monitors and zeroization response, ▪ passive shield (for K7 TOE variant) ▪ active shield (for K7+ TOE variant). Table 3: TOE Security Functionalities Certification Report Version 1.0 Page 8 Please refer to the Security Target [1] for more information. The assets to be protected by the TOE has been defined. Based on these assets, the TOE Security Problem Definition has been defined in terms of Assumptions, Threats and Organisation Policies. These are outlined in Chapter 4 of the Security Target [1] This Certification covers the configurations of the TOE as outlined in Chapter 5.3 of this report. The certification results only apply to the version of the product indicated in the certificate and on the condition that all the stipulations are kept as detailed in this Certification Report. This certificate applies only to the specific version and release of the IT product in its evaluated configuration. This certificate is not an endorsement of the IT product by SCCS, and no warranty of the IT product by SCCS, is either expressed or implied. Certification Report Version 1.0 Page 9 Table of Contents 1 CERTIFICATION .....................................................................................10 1.1 PROCEDURE........................................................................................10 1.2 RECOGNITION AGREEMENTS.................................................................10 2 VALIDITY OF THE CERTIFICATION RESULT ....................................... 11 3 IDENTIFICATION ....................................................................................12 4 SECURITY POLICY ................................................................................14 5 ASSUMPTIONS AND SCOPE OF EVALUATION...................................14 5.1 ASSUMPTIONS .....................................................................................14 5.2 CLARIFICATION OF SCOPE.....................................................................16 5.3 EVALUATED CONFIGURATION.................................................................17 5.4 NON-EVALUATED FUNCTIONALITIES .......................................................17 5.5 NON-TOE COMPONENTS .....................................................................17 6 ARCHITECTURE DESIGN INFORMATION............................................18 7 DOCUMENTATION .................................................................................18 8 IT PRODUCT TESTING ..........................................................................18 8.1 DEVELOPER TESTING (ATE_FUN)........................................................18 8.1.1 Test Approach and Depth............................................................18 8.1.2 Test Configuration .......................................................................18 8.1.3 Test Results ................................................................................19 8.2 EVALUATOR TESTING (ATE_IND)..........................................................19 8.2.1 Test Approach and Depth............................................................19 8.2.2 Test Configuration .......................................................................19 8.2.3 Test Results ................................................................................19 8.3 PENETRATION TESTING (AVA_VAN)......................................................19 8.3.1 Test Approach and Depth............................................................19 9 RESULTS OF THE EVALUATION ..........................................................20 10 OBLIGATIONS AND RECOMMENDATIONS FOR THE USAGE OF THE TOE .......................................................................................................21 11 ACRONYMS.........................................................................................22 12 BIBLIOGRAPHY..................................................................................23 Certification Report Version 1.0 Page 10 1 Certification 1.1 Procedure The certification body conducts the certification procedure according to the following criteria: ▪ Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5 [2] [3] [4]; ▪ Common Methodology for IT Security Evaluation (CEM), Version 3.1 Revision 5 [5]; and ▪ SCCS scheme publications [6] [7] [8] 1.2 Recognition Agreements The international arrangement on the mutual recognition of certificates based on the Common Criteria Recognition Arrangement had been ratified on 2 July 2014. The arrangement covers certificates with claims of compliance against collaborative protection profiles (cPPs) or evaluation assurance levels (EALs) 1 through 2 and ALC_FLR. Hence, the certification for this TOE is covered partially by the CCRA for the components up to EAL2. The Common Criteria Recognition Arrangement mark printed on the certificate indicates that this certification is recognised under the terms of this agreement by all signatory nations listed on the CC web portal (https://www.commoncriteriaportal.org). Certification Report Version 1.0 Page 11 2 Validity of the Certification Result This Certification Report only applies to the version of the TOE as indicated. The Certificate is valid till 2 August 20271. In cases of changes to the certified version of the TOE, the validity may be extended to new versions and releases provided the TOE sponsor applies for Assurance Continuity (i.e. re-certification or maintenance) of the revised TOE, in accordance with the requirements of the Singapore Common Criteria Scheme (SCCS). The owner of the Certificate is obliged: ▪ When advertising the Certificate or the fact of the product’s certification, to refer to and provide the Certification Report, the Security Target and user guidance documentation herein to any customer of the product for the application and usage of the certified product; ▪ To inform the SCCS immediately about vulnerabilities of the product that have been identified by the developer or any third party; and ▪ To inform the SCCS immediately in the case that relevant security changes in the evaluated life cycle has occurred or the confidentiality of documentation and information related to the TOE or resulting from the evaluation and certification procedure where the certification of the product has assumed this confidentiality being maintained, is no longer valid. 1 Certificate validity could be extended by means of assurance continuity. Certificate could also be revoked under the conditions specified in SCCS Publication 3 [8]. Potential users should check the SCCS website (www.csa.gov.sg/programmes/csa-cc-product-list) for the up-to-date status regarding the certificate’s validity. Certification Report Version 1.0 Page 12 3 Identification The Target of Evaluation (TOE) is: Thales Luna K7 Cryptographic Module The following table identifies the TOE deliverables. Identifier Version Hardware 808-000048-002 808-000048-003 808-000073-001 808-000073-002 808-000066-001 808-000069-001 808-000070-001 Bootloader 1.1.1, 1.1.2, or 1.1.4 Firmware 7.7.0, 7.7.1 or 7.7.2 Table 4 - TOE Deliverables The guide for receipt and acceptance of the above-mentioned TOE are described in the set of guidance documents. Name and version Version 007-013968-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part1: Preparative Procedures Revision H 007-000465-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part2: Operational Guidance (General) Revision I 007-000466-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part3: eIDAS Guidance Revision H 007-000467-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part4: TOE Integration for use in Composite Evaluation Revision G Table 5 - Guidance Document (part of TOE deliverables) Certification Report Version 1.0 Page 13 Additional identification information relevant to this Certification procedure as follows: TOE Thales Luna K7 Cryptographic Module Security Target Thales Luna K7 Cryptographic Module - Security Target, 002-010985-001, Rev M, 6 May 2022 Developer Thales Sponsor Thales Evaluation Facility SGS Brightsight Completion Date of Evaluation 19 July 2022 Certification Body Cyber Security Agency of Singapore (CSA) Certificate ID CSA_CC_22002 Certificate Validity 5 years from date of issuance Table 6: Additional Identification Information Certification Report Version 1.0 Page 14 4 Security Policy The TOE’s Security Policy is expressed by the set of Security Functional Requirements listed and implemented by the TOE. The TOE implements policies pertaining to the following security functional classes: • Cryptographic Support • Identification and Authentication • User Data Protection • Trusted Path/Channel • Protection of the TSF • Security Management • Security Audit Specific details concerning the above mentioned security policy can be found in Chapter 5 of the Security Target [1]. 5 Assumptions and Scope of Evaluation 5.1 Assumptions The assumptions defined in the Security Target [1] and some aspects of Threats and Organisational Security Policies are not covered by the TOE itself. These aspects lead to specific security objectives to be fulfilled by the TOE environment and are listed in the tables below: Environmental Assumptions Description OE.ExternalData Protection of data outside TOE control Where copies of data protected by the TOE are managed outside of the TOE, client applications and other entities shall provide appropriate protection for that data to a level required by the application context and the risks in the deployment environment. This includes protection of data that is exported from, or imported to, the TOE (such as audit data and encrypted keys). In particular, any backups of the TOE and its data shall be maintained in a way that ensures appropriate controls over making backups, storing backup data, and using backup data to restore an operational TOE. The number of sets of backup data shall not exceed the minimum needed to ensure continuity of the TSP service. The ability to restore a TOE to an operational state from backup data shall require at least dual person control (i.e. the participation and approval of more than one authenticated administrator). Certification Report Version 1.0 Page 15 OE.Env Protected operating environment The TOE shall operate in a protected environment that limits physical access to the TOE to authorized Administrators. The TOE software and hardware environment (including client applications) shall be installed and maintained by Administrators in a secure state that mitigates against the specific risks applicable to the deployment environment, including (where applicable): ▪ Protection against loss or theft of the TOE or any of its externally stored assets ▪ Inspections to deter and detect tampering (including attempts to access side-channels, or to access connections between physically separate parts of the TOE, or parts of the hardware appliance) ▪ Protection against the possibility of attacks based on emanations from the TOE (e.g. electromagnetic emanations) according to risks assessed for the operating environment ▪ Protection against unauthorized software and configuration changes on the TOE and the hardware appliance ▪ Protection to an equivalent level of all instances of the TOE holding the same assets (e.g. where a key is present as a backup in more than one instance of the TOE). OE.DataContext Appropriate use of TOE functions Any client application using the cryptographic functions of the TOE shall ensure that the correct data are supplied in a secure manner (including any relevant requirements for authenticity, integrity and confidentiality). For example, when creating a digital signature over a DTBS the client application shall ensure that the correct (authentic, unmodified) DTBS/R is supplied to the TOE, and shall correctly and securely manage the signature received from the TOE; and when certifying a public key the client application shall ensure that necessary checks are made to prove possession of the corresponding private key. The client application may make use of appropriate secure channels provided by the TOE to support these security requirements. Where required by the risks in the operational environment a suitable entity (possibly the client application) shall perform a check of the signature returned from the TOE, to confirm that it relates to the correct DTBS. Client applications shall be responsible for any required logging of the uses made of the TOE services, such as signing (or sealing) events. Similar requirements shall apply in local use cases where no client application need be involved, but in Certification Report Version 1.0 Page 16 which the TOE and its user data (such as keys used for signatures) need to be configured in ways that will support the need for security requirements such as sole control of signing keys. Appropriate procedures shall be defined for the initial creation of data and continuing operation of the TOE according to the specific risks applicable to the deployment environment and the ways in which the TOE is used. OE.Uauth Authentication of application user Any client application using the cryptographic services of the TOE shall correctly and securely gather identification and authentication/authorization data from its users and securely transfer it to the TOE (protecting the confidentiality of the authentication/authorization data as required) when required to authorize the use of TOE assets and services. OE.AuditSupport Audit data review The audit trail generated by the TOE will be collected, maintained and reviewed by a System Auditor according to a defined audit procedure for the TSP. OE.AppSupport Application security support Procedures to ensure the ongoing security of client applications and their data shall be defined and followed in the environment, and reflected in use of the appropriate TOE cryptographic functions and parameters, and appropriate management and administration actions on the TOE. This includes, for example, any relevant policies on algorithms, key generation methods, key lengths, key access, key import/export, key usage limitations, key activation, cryptoperiods and key renewal, and key/certificate revocation. Table 7: Environmental Assumptions Details can be found in section 4.2 of the Security Target [1]. 5.2 Clarification of Scope The TOE physical boundary is the SafeNet Luna K7 PCI-E card with passive (K7) and active (K7+) shielding. The TOE is intended to be operated in a protected operating environment (OE.Env) and can be used either as a standalone device to be inserted in a server, or as a device embedded in a Thales Luna Network HSM. Secure channel may exist between the TOE with external and local client applications but these are not covered within the scope of evaluation. The scope of evaluation is limited to the claims made in the Security Target [1]. Certification Report Version 1.0 Page 17 5.3 Evaluated Configuration The Thales Luna K7 is a hardware security module in the form of a PCI-E card that can be used either as a standalone device to be inserted in a server, or as a device embedded in a Thales Luna Network HSM. The TOE can fulfil general purpose HSM use cases, where assured cryptographic services alongside generation and management of cryptographic keys is required and is also suitable for use by Trust Service Providers (TSP) supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, Note that the TOE is not aware of the context in which a cryptographic function is used. Any such context is therefore the responsibility of client applications used by the trust service provider or operator, and these client applications need to use the cryptographic functions in an appropriate way. In general, this will be achieved by suitable configuration of the TOE and its stored data. Figure 1 - Thales Luna K7 Cryptographic Module, Fan Variant without Tamper Wrap 5.4 Non-Evaluated Functionalities There are no non-evaluated functionalities within the scope as clarified in section 5.2. 5.5 Non-TOE Components The TOE does not require additional components for its operation. Certification Report Version 1.0 Page 18 6 Architecture Design Information As described in the Security Target [1], the high-level logical architecture of the TOE can be depicted as follows: Figure 2 - Logical Architecture of the TOE (From [ST]) 7 Documentation The evaluated documentation as listed in Table 5 - Guidance Document (part of TOE deliverables) is being provided with the product to the customer. These documentations contain the required information for secure usage of the TOE in accordance with the Security Target. 8 IT Product Testing 8.1 Developer Testing (ATE_FUN) 8.1.1 Test Approach and Depth The developer performed functional testing covering all TSFIs and module-to- module interactions. Several proprietary automated test suites were used, along with cryptographic tests suites such as known-answer tests and physical hardware tests to fulfil FPT_PHP.1 and FPT_PHP.3 requirements. 8.1.2 Test Configuration The TOE used for testing is configured according to the TOE guidance document [9] [10] [11] [12]. Certification Report Version 1.0 Page 19 8.1.3 Test Results The test results provided by the developer covered all operational functions as described in the Security Target [1]. All test results from all tested environment showed that the expected test results are identical to the actual test results. 8.2 Evaluator Testing (ATE_IND) 8.2.1 Test Approach and Depth The automated test cases in the developer’s test plan were repeated on K7 and K7+. These includes tests that confirm the correct execution of electronic signature/seal operation against known data to be signed as part of the PP’s requirement. The evaluator’s strategy for devising independent tests was based on the following: ▪ Tests that expand on partially tested features of the TOE ▪ Tests that provide an alternate approach with respect to the testing strategy presented by the developer ▪ Tests that expand on the policy enforcement concept ▪ Test that addresses otherwise untested functionalities ▪ Tests that are mandated by the PP ▪ Tests that are mandated by the AIS31 standard 8.2.2 Test Configuration A detailed test description was provided in the ATE document. The evaluator used the developer’s test environment at the developer’s premises to perform independent testing. Prior to running tests, the evaluator performed identification of the test environment and verification of the TOE. 8.2.3 Test Results The developer’s test reproduced were verified by the evaluator to conform to the expected results from the test plan. 8.3 Penetration Testing (AVA_VAN) 8.3.1 Test Approach and Depth The AVA_VAN.5 assurance class requires the evaluator to conduct a methodical vulnerability analysis based on publicly available source of information and based on structured examination of the evidence while performing previous evaluation activities (ASE, ADV, AGD, ATE). Given the restrictions imposed by the PP (which prevents any physical attack and any side channel attack that requires physical proximity to the TOE), the evaluator focused on vulnerabilities related to design/architectural flaws that would lead intended users to abuse the TOE. For this reason, the evaluator Certification Report Version 1.0 Page 20 needed to find a methodical approach to scout the TOE implementation searching for such design/architectural flaws. The evaluator’s strategy for performing vulnerability analysis was based on the following: 1. Identification of areas of concern using open source publicly maintained weakness enumeration database. Areas of concerns includes Accessibility, Cryptography, Secure Channel etc. 2. Iteratively, for each SFR, the evaluator formulates security relevant questions for each identified area of concern which are then translated into TOE specific possible vulnerabilities. 3. The evaluator then justifies whether a possible vulnerability is removed or sufficiently mitigated by the TOE implementation/environment/functional testing evidence. For instance, in response to vulnerabilities identifying usage of weak cryptographic algorithms, the developer modified the ST claim and guidance documentation to exclude usage of TDES and SHA-1. 4. Residue Potential vulnerabilities are then addressed in the context of penetration tests and further code review. The approach chosen by the evaluator is commensurate with the assurance component chosen (AVA_VAN.5) treating the resistance of the TOE to an attack with the High attack potential. Penetration Test Description PEN_A07.HSM.KnownAnswerTestModifiedBit Checking that the known answer test as claimed to be effective, is indeed detecting a mismatch in test outcome and expected result. Table 8 - Penetration Test Case The evaluator found no exploitable vulnerability in the TOE when operated in the evaluated configuration. No residual risks were identified. 9 Results of the Evaluation The Evaluation Technical Report (ETR) was provided by the CCTL in accordance with the CC, CEM and requirements of the SCCS. As a result of the evaluation, the verdict PASS is confirmed for the following assurance components: ▪ All components of the EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 assurance package This implies that the TOE satisfies the security requirements specified in the Security Target [1]. Certification Report Version 1.0 Page 21 10 Obligations and recommendations for the usage of the TOE The documents as outlined in Table 2 - List of guidance documents contain necessary information about the usage of the TOE and all security hints therein have to be considered. In addition, all aspects of Assumptions, Threats and OSPs as outlined in the Security Target [1] that are not covered by the TOE shall be fulfilled by the operational environment of the TOE. Potential user of the product shall consider the results of the certification within his/her system risk management process. As attack methods and techniques evolve over time, he/she should define the period of time whereby a re- assessment of the TOE is required and convey such request to the sponsor of the certificate. User-defined ECC curves are not included in the scope of the CC certification; only the curves as defined in the Security Functional Requirements in section 6.3 of [ST] are included in the evaluation scope. No additional recommendation was provided by the evaluators. Certification Report Version 1.0 Page 22 11 Acronyms CCRA Common Criteria Recognition Arrangement CC Common Criteria for IT Security Evaluation CCTL Common Criteria Test Laboratory CSA Cyber Security Agency of Singapore CEM Common Methodology for Information Technology Security Evaluation cPP Collaborative Protection Profile EAL Evaluation Assurance Level ETR Evaluation Technical Report IT Information Technology PP Protection Profile SAR Security Assurance Requirement SCCS Singapore Common Criteria Scheme SFR Security Functional Requirement TOE Target of Evaluation TSF TOE Security Functionality Certification Report Version 1.0 Page 23 12 Bibliography [1] Thales, “Thales Luna K7 Cryptographic Module Security Target, 002- 010985-001, Rev M,” 6 May 2022. [2] Common Criteria Maintenance Board (CCMB), “Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and general model [Document Number CCMB-2017-04-001]. Version 3.1 Revision 5,” 2017. [3] Common Criteria Maintenance Board (CCMB), “Common Criteria for Information Technology Security Evaluation - Part 2: Security functional components [Document Number CCMB-2017-04-002], Version 3.1 Revision 5,” 2017. [4] Common Criteria Maintenance Board (CCMB), “Common Criteria for Information Technology Security Evaluation - Part 3: Security assurance components [Document Number CCMB-2018-04-003] Version 3.1 Revision 5,” 2017. [5] Common Criteria Maintenance Board (CCMB), “Common Methodology for Information Technology Security Evaluation - Evaluation Methodology [Document Number CCMB-2017-04-004], Version 3.1 Revision 5,” 2017. [6] Cyber Security Agency of Singapore (CSA), “SCCS Publication 1 - Overview of SCCS, Version 5.0,” 2018. [7] Cyber Security Agency of Singapore (CSA), “SCCS Publication 2 - Requirements for CCTL, Version 5.0,” 2018. [8] Cyber Security Agency of Singapore (CSA), “SCCS Publication 3 - Evaluation and Certification, Version 5.0,” 2018. [9] Thales, “007-013968-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part1: Preparative Procedures, Revision H,” 6 May 2022. [10] Thales, “007-000465-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part2: Operational Guidance (General), Revision I,” 6 May 2022. [11] Thales, “007-000466-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part3: eIDAS Guidance, Revision H,” 6 May 2022. [12] Thales, “007-000467-001, Thales Luna K7(+) Cryptographic Module, Common Criteria User Guidance – Part4: TOE Integration for use in Composite Evaluation, Revision G,” 6 May 2022. [13] EN 419 221-5:2018 version 1.0, “Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trusted Services, v1.0, registered under the reference ANSSI-CC-PP-2016/05- M01,” 18 May 2020. [14] Brightsight B.V., “Evaluation Technical Report Thales Luna K7/K7+ EAL 4+, 22-RPT-521 Version 3.0,” 19 July 2022. [15] Brightsight B.V.,, “Evaluation Technical Report for Composition Thales Luna K7/K7+ EAL 4+, 22-RPT-722, v2.0,” 19 July 2022. Certification Report Version 1.0 Page 24 -------------------------------------------End of Report -----------------------------------------