Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C
BSI-DSZ-CC-1133-2020
Trend Micro Deep Security 20
561-LSS
name PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C Trend Micro Deep Security 20
category Operating Systems Boundary Protection Devices and Systems
scheme DE CA
not_valid_after 30.06.2025 31.05.2027
not_valid_before 01.07.2020 31.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20CT%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20CR%20v1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20ST%20v12.0.pdf
manufacturer IBM Corporation Trend Micro Inc.
manufacturer_web https://www.ibm.com https://www.trendmicro.com
security_level EAL5, AVA_VAN.5, ALC_TAT.3, ATE_FUN.2, ALC_FLR.3 EAL2+, ALC_FLR.1
dgst 00e236c67ac43f3f 0c1fb05671e601ac
heuristics/cert_id BSI-DSZ-CC-1133-2020 561-LSS
heuristics/cert_lab BSI CANADA
heuristics/cpe_matches {} cpe:2.3:a:trendmicro:deep_security_agent:20.0:update224:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update213:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1822:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6313:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1559:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3288:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update190:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5761:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5512:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2419:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8137:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update158:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update690:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:-:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update198:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update167:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7303:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8268:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8438:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5995:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2593:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2921:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5810:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5394:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3771:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3445:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1681:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3964:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update208:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7119:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update183:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2395:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update877:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update173:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3165:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update223:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update182:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6690:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1876:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1337:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2740:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4726:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6860:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2009:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7476:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7719:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4185:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update180:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3530:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4416:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5137:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4959:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2204:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7943:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security:20.0:-:*:*:long_term_support:*:*:*
heuristics/related_cves {} CVE-2023-52337, CVE-2021-25252, CVE-2023-52338
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_FLR.3, ADV_FSP.5, ATE_FUN.2, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ASE_CCL.1 ALC_CMS.2, ALC_FLR.1, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1
heuristics/extracted_versions - 20
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1160-2021 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-1109-2019 {}
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1186-2023, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1222-2024 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-1048-2018 {}
heuristics/scheme_data
  • certification_date: 31.05.2022
  • level: EAL 2+ (ALC_FLR.1)
  • product: Trend Micro Deep Security 20
  • vendor: Trend Micro Inc.
pdf_data/cert_filename 1133c_pdf.pdf 561-LSS CT v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1133-2020: 1
  • CA:
    • 561-LSS: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
  • EAL:
    • EAL 2+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20200702094713+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM, IBM, z15, IBM LinuxOne III Systems, BSI-DSZ-CC-1133"
  • /ModDate: D:20200702100618+02'00'
  • /Producer: LibreOffice 6.2
  • /Subject: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C with Bundle Level H06/S06c from IBM Corporation
  • /Title: Certificate BSI-DSZ-CC-1133
  • pdf_file_size_bytes: 313728
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20220606065558-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1640320
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1133a_pdf.pdf 561-LSS CR v1.0.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1133-2020
    • cert_item: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • CA:
  • DE:
  • CA:
    • cert_id: 561-LSS
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1109-2019: 3
    • BSI-DSZ-CC-1133-2020: 15
  • CA:
    • 561-LSS: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 4
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 1
  • EAL:
    • EAL 2+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 4
    • ALC_TAT.3: 5
  • ATE:
    • ATE_DPT.3: 1
    • ATE_FUN.2: 5
  • AVA:
    • AVA_VAN.5: 5
  • ALC:
    • ALC_FLR.1: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • Lightship:
    • Lightship Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 14
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 3, 2020-05-29, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] z15 System Hardware Management Console Operations Guide, Version 2.15.0, 2019-09-13, IBM: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • out of scope: 1
    • the security test suite FTP06 must be included in the driver regression testing, which however is out of scope for this evaluation The combination of the above ensures that changes to the driver, including: 1
pdf_data/report_metadata
pdf_data/st_filename 1133b_pdf.pdf 561-LSS ST v12.0.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1133: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 4
  • EAL:
    • EAL2+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.3: 2
    • ATE_FUN.2: 4
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS: 2
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 3
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 25
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 43
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 27
    • FMT_MSA.1: 14
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 7
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_RSA.1: 7
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.1.3: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG.2: 15
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.4: 1
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FIA:
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_ITT.1.1: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 6
    • FPT_STM.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.SIE: 3
  • T:
    • T.LPAR_XCTL: 5
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NOEVIL: 5
    • A.PROTCT: 3
    • A.TRUST: 4
  • O:
    • O.ACCESS: 12
    • O.APP_CONTROL: 7
    • O.AUDITS: 8
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_SORT: 6
    • O.EADMIN: 4
    • O.EXPORT: 3
    • O.IDANLZ: 5
    • O.IDAUTH: 19
    • O.IDSCAN: 7
    • O.IDSENS: 9
    • O.INTEGR: 7
    • O.OFLOWS: 6
    • O.PROTCT: 10
    • O.RESPON: 5
    • O.VIRUS: 8
  • OE:
    • OE.CREDEN: 5
    • OE.INSTAL: 5
    • OE.INTROP: 5
    • OE.PERSON: 5
    • OE.PHYCAL: 6
    • OE.TIME: 4
  • T:
    • T.COMDIS: 3
    • T.COMINT: 4
    • T.FACCNT: 3
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 4
    • T.IMPCON: 3
    • T.INADVE: 3
    • T.INFLUX: 4
    • T.LOSSOF: 4
    • T.MISACT: 4
    • T.MISUSE: 4
    • T.NOHALT: 3
    • T.PRIVIL: 4
    • T.SCNCFG: 4
    • T.SCNMLC: 3
    • T.SCNVUL: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DSA:
      • DSA: 13
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
      • TLS 1.2: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-224: 2
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 24
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 198-1: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different