name |
PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C |
Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050 |
category |
Operating Systems |
Operating Systems |
scheme |
DE |
DE |
status |
active |
archived |
not_valid_after |
30.06.2025 |
01.09.2019 |
not_valid_before |
01.07.2020 |
24.07.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0570a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0570b_pdf.pdf |
manufacturer |
IBM Corporation |
Microsoft Corporation |
manufacturer_web |
https://www.ibm.com |
https://www.microsoft.com |
security_level |
ALC_TAT.3, EAL5, ALC_FLR.3, ATE_FUN.2, AVA_VAN.5 |
ALC_FLR.3, EAL4+ |
dgst |
00e236c67ac43f3f |
4f57d0ebb73a69ed |
heuristics/cert_id |
BSI-DSZ-CC-1133-2020 |
BSI-DSZ-CC-0570-2009 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
CVE-2009-0320, CVE-2010-4398, CVE-2008-2252, CVE-2009-0230, CVE-2009-0234, CVE-2024-29056, CVE-2009-1536, CVE-2018-0887, CVE-2009-2526, CVE-2008-4269, CVE-2018-0972, CVE-2017-0175, CVE-2009-2493, CVE-2009-0094, CVE-2009-2532, CVE-2018-0969, CVE-2008-3013, CVE-2009-0231, CVE-2010-0024, CVE-2008-2251, CVE-2009-0085, CVE-2011-1229, CVE-2009-1216, CVE-2008-2250, CVE-2018-0968, CVE-2009-0078, CVE-2009-0233, CVE-2010-4669, CVE-2008-1441, CVE-2018-0971, CVE-2009-0080, CVE-2018-0974, CVE-2010-4562, CVE-2009-0081, CVE-2009-0082, CVE-2017-11852, CVE-2012-1194, CVE-2008-1084, CVE-2009-0568, CVE-2007-6753, CVE-2009-0086, CVE-2018-0960, CVE-2010-0719, CVE-2008-4038, CVE-2009-3103, CVE-2010-0025, CVE-2008-4036, CVE-2009-0083, CVE-2008-4268, CVE-2009-0093, CVE-2018-0975, CVE-2018-8641, CVE-2017-11831, CVE-2018-0970, CVE-2018-0973, CVE-2010-3227 |
heuristics/indirect_transitive_cves |
{} |
CVE-2009-0320, CVE-2010-4398, CVE-2008-2252, CVE-2009-0230, CVE-2009-0234, CVE-2024-29056, CVE-2009-1536, CVE-2018-0887, CVE-2009-2526, CVE-2008-4269, CVE-2018-0972, CVE-2017-0175, CVE-2009-2493, CVE-2009-0094, CVE-2009-2532, CVE-2018-0969, CVE-2008-3013, CVE-2009-0231, CVE-2010-0024, CVE-2008-2251, CVE-2009-0085, CVE-2011-1229, CVE-2009-1216, CVE-2008-2250, CVE-2018-0968, CVE-2009-0078, CVE-2009-0233, CVE-2010-4669, CVE-2008-1441, CVE-2018-0971, CVE-2009-0080, CVE-2018-0974, CVE-2010-4562, CVE-2009-0081, CVE-2009-0082, CVE-2017-11852, CVE-2012-1194, CVE-2008-1084, CVE-2009-0568, CVE-2007-6753, CVE-2009-0086, CVE-2018-0960, CVE-2010-0719, CVE-2008-4038, CVE-2009-3103, CVE-2010-0025, CVE-2008-4036, CVE-2009-0083, CVE-2008-4268, CVE-2009-0093, CVE-2018-0975, CVE-2018-8641, CVE-2017-11831, CVE-2018-0970, CVE-2018-0973, CVE-2010-3227 |
heuristics/extracted_sars |
ADV_ARC.1, ALC_CMC.4, ALC_DVS.1, ASE_OBJ.2, ALC_FLR.3, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ADV_FSP.5, ALC_DEL.1, ATE_DPT.3, ADV_TDS.4, ALC_TAT.3, ATE_COV.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, AVA_VAN.5, ADV_INT.2, ALC_CMS.5, ADV_IMP.1, ASE_CCL.1, ATE_FUN.2, AGD_OPE.1 |
ADV_ARC.1, ALC_CMC.4, ADV_FSP.4, ALC_DVS.1, ASE_OBJ.2, ALC_FLR.3, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, AVA_VAN.3, APE_SPD.1, ATE_DPT.2, ALC_DEL.1, ATE_FUN.1, ALC_TAT.1, ATE_COV.2, APE_ECD.1, ALC_CMS.4, ASE_ECD.1, APE_CCL.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, APE_REQ.2, ADV_IMP.1, APE_OBJ.2, ADV_INT.3, ASE_CCL.1, ADV_TDS.3, ADV_SPM.1, AGD_OPE.1, APE_INT.1 |
heuristics/extracted_versions |
- |
2008 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1160-2021 |
BSI-DSZ-CC-0755-2012 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1109-2019 |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1222-2024, BSI-DSZ-CC-1186-2023 |
BSI-DSZ-CC-0755-2012 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-1048-2018, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-0715-2011 |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
1133c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 1
- EAL 5 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_FLR.3: 1
- ALC_TAT.3: 1
- ATE:
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200702094713+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM, IBM, z15, IBM LinuxOne III Systems, BSI-DSZ-CC-1133"
- /ModDate: D:20200702100618+02'00'
- /Producer: LibreOffice 6.2
- /Subject: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C with Bundle Level H06/S06c from IBM Corporation
- /Title: Certificate BSI-DSZ-CC-1133
- pdf_file_size_bytes: 313728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1133a_pdf.pdf |
0570a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1133-2020
- cert_item: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- DE:
- cert_id: BSI-DSZ-CC-0570-2009
- cert_item: Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050
- cert_lab: BSI
- developer: Microsoft Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1109-2019: 3
- BSI-DSZ-CC-1133-2020: 15
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 4
- EAL 5: 4
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
- EAL:
- EAL 1: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 4
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_FLR: 3
- ALC_FLR.3: 4
- ALC_TAT.3: 5
- ATE:
- ATE_DPT.3: 1
- ATE_FUN.2: 5
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 6
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 25
- Microsoft Corporation: 7
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report, Version 3, 2020-05-29, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] z15 System Hardware Management Console Operations Guide, Version 2.15.0, 2019-09-13, IBM: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- OutOfScope:
- out of scope: 1
- the security test suite FTP06 must be included in the driver regression testing, which however is out of scope for this evaluation The combination of the above ensures that changes to the driver, including: 1
|
- ConfidentialDocument:
- Final Evaluation Technical Report Microsoft Hyper-V Server 2008, atsec information security GmbH, (confidential document) [8] Configuration lists for the TOE (confidential documents): ● Configuration List – Hyper-V RTM: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200702143526+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM, IBM, z15, IBM LinuxOne III Systems, BSI-DSZ-CC-1133"
- /ModDate: D:20200702144908+02'00'
- /Producer: LibreOffice 6.2
- /Subject: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C with Bundle Level H06/S06c from IBM Corporation
- /Title: Certification Report BSI-DSZ-CC-1133-2020
- pdf_file_size_bytes: 721385
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090731095448+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Microsoft, Hyper-V, Server 2008, Virtualization, Operating System"
- /ModDate: D:20090803083941+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0570-2009
- pdf_file_size_bytes: 734094
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
1133b_pdf.pdf |
0570b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 1
- EAL4: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.5: 2
- ADV_IMP.1: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.3: 4
- ALC_LCD.1: 2
- ALC_TAT.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.3: 2
- ATE_FUN.2: 4
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 3
- FDP_ACC.1.1: 2
- FDP_ACC.2: 25
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 43
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.2: 8
- FDP_RIP.2.1: 1
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 27
- FMT_MSA.1: 14
- FMT_MSA.3: 13
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 13
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TRC.1: 7
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_RSA.1: 7
- FRU_RSA.1.1: 1
- FTA:
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
|
- FAU:
- FAU_GEN.1: 15
- FAU_GEN.1.1: 6
- FAU_GEN.1.2: 6
- FAU_GEN.2: 12
- FAU_GEN.2.1: 6
- FAU_SAR.1: 6
- FAU_SAR.1.1: 4
- FAU_SAR.1.2: 4
- FAU_SAR.2: 5
- FAU_SAR.2.1: 3
- FAU_STG.1: 6
- FAU_STG.1.1: 3
- FAU_STG.1.2: 3
- FAU_STG.3: 5
- FAU_STG.3.1: 3
- FAU_STG.4: 6
- FAU_STG.4.1: 4
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 6
- FDP_ACF.1: 17
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 6
- FDP_IFC.1: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 3
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 14
- FIA_ATD.1.1: 7
- FIA_SOS.1: 5
- FIA_SOS.1.1: 4
- FIA_UAU.1: 4
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 3
- FIA_UAU.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 4
- FIA_UID.1: 8
- FIA_UID.1.1: 4
- FIA_UID.1.2: 4
- FIA_UID.2: 6
- FIA_UID.2.1: 3
- FIA_USB.1: 13
- FIA_USB.1.1: 6
- FIA_USB.1.2: 6
- FIA_USB.1.3: 6
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 3
- FMT_MSA.2: 6
- FMT_MSA.2.1: 3
- FMT_MSA.3: 15
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD.1: 36
- FMT_MTD.1.1: 24
- FMT_REV.1: 7
- FMT_REV.1.1: 3
- FMT_REV.1.2: 4
- FMT_SMF.1: 9
- FMT_SMF.1.1: 6
- FMT_SMR.1: 10
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 3
- FRU:
- FRU_RSA.1: 6
- FRU_RSA.1.1: 3
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 2
- A.CLEAN_ROOT: 2
- A.CORRECT_HARDWARE: 3
- A.DEFINED_INSTALL: 2
- A.MEMORY_MANAGEMENT: 2
- A.MEMORY_MANGEMENT: 1
- A.PARTITION_CONNECT: 2
- A.PHYSICAL: 3
- A.REMOTE_ADMIN: 2
- A.REMOTE_IT_PRODUCTS: 2
- A.SUBJECT_ALLOCATION: 1
- O:
- O.AUDIT_GENERATION: 15
- O.AUTHORIZED_SUBJECT: 12
- O.INIT_SECURE_STATE: 7
- O.MANAGE: 20
- O.PARTITION_ACCESS: 11
- O.PARTITION_ISOLATION: 4
- O.PRESERVE_PART_PRIV: 5
- O.RESIDUAL_INFORMATION: 6
- O.RESOURCE_ALLOCATION: 6
- OE:
- OE.HW_MECHANISMS: 4
- OE.HW_SIDE_EFFECTS: 1
- OE.MEMORY_MANAGEMENT: 2
- OE.NETWORK: 3
- OE.PARTITION_USER: 2
- OE.PHYSICAL: 4
- OE.REMOTE_ADMIN: 3
- OE.REMOTE_IT_PRODUCT: 8
- OE.SUBJECT_ALLOCATION: 4
- OE.TRUSTED_INDIVIDUAL: 4
- OE.TRUSTED_INDIVIDUALS: 1
- OE.TRUSTED_ROOT: 4
- T:
- T.CONFIGURATION_CHANGE: 3
- T.DENIAL_OF_SERVICE: 3
- T.PARTITION_COMPROMISE: 3
- T.UNAUTHORIZED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 112
- Microsoft Corporation: 3
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2007-09-001: 1
- CCMB-2007-09-004: 1
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Robert Nasser, Clemens Wittinger (generated by CCTool version 2.8.4.35)
- /CreationDate: D:20200326110548Z
- /Creator: Unknown
- /Keywords: access control, identification, authentication, audit, object reuse, z, LPAR, logical partitioning, isolation, PR/SM, LIC, cross-partition, HMC, SE
- /ModDate: D:20200326110548Z
- /Producer: XEP 4.29.837
- /Subject: PR/SM, Driver Level D41C with Bundle Level H06/S06c for IBM z15 and IBM LinuxONE III Systems
- /Title: Security Target for PR/SM for IBM z15 and IBM LinuxONE III Systems (version 19.5 as of 2020-03-26)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 805767
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /Author: Microsoft
- /CreationDate: D:20090723152525Z
- /Creator: Microsoft® Word 2010 (Technical Preview)
- /Keywords: Microsoft, Windows Server 2008, Hyper-V, Security Target, Commcon Criteria Evauatin
- /ModDate: D:20090803090123+02'00'
- /Producer: PDF-XChange Viewer [Version: 2.0 (Build 41.5) (Mar 30 2009; 19:53:50)]
- /Subject: Microsoft Windows Server 2008 Hyper-V Security Target
- /Title: Microsoft Windows Server 2008 Hyper-V Security Target
- pdf_file_size_bytes: 1098933
- pdf_hyperlinks: http://creativecommons.org/licenses/by-nd-nc/1.0/
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |