name |
BorderWare MXtreme Mail Firewall Version 3.1 |
PikeOS Separation Kernel, Version 5.1.3 |
category |
Boundary Protection Devices and Systems |
Operating Systems |
scheme |
UK |
DE |
status |
archived |
active |
not_valid_after |
05.03.2013 |
19.09.2027 |
not_valid_before |
30.07.2004 |
20.09.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP204.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/borderware_3.0Final.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1146b_pdf.pdf |
manufacturer |
Borderware Technologies |
SYSGO GmbH |
manufacturer_web |
https://www.borderware.com/ |
https://www.SYSGO.com |
security_level |
AVA_VLA.3, EAL4+, ALC_FLR.1 |
ADV_IMP.2, ALC_CMC.5, EAL5+, AVA_VAN.5, ALC_DVS.2, ALC_FLR.3 |
dgst |
02140ad16c37fee4 |
2704a53db5b77866 |
heuristics/cert_id |
CRP204 |
BSI-DSZ-CC-1146-2022 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ALC_TAT.1, ALC_CMS.5, AVA_VAN.5, ADV_FSP.4, ALC_LCD.1, ALC_DVS.2, ALC_CMC.5, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ATE_DPT.1, ALC_FLR.3, ADV_INT.2, ADV_IMP.2, AGD_PRE.1 |
heuristics/extracted_versions |
3.1 |
5.1.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1185-2023 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1185-2023 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
1146c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.3: 1
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220920112048+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, Certification Report"
- /ModDate: D:20220920135502+02'00'
- /Producer: LibreOffice 7.2
- /Subject: Certification Report, Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 5.1.3
- /Title: Certification Report BSI-DSZ-CC-1146-2022
- pdf_file_size_bytes: 327689
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
CRP204.pdf |
1146a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1146-2022
- cert_item: PikeOS Separation Kernel Version 5.1.3
- cert_lab: BSI
- developer: SYSGO GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P204: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL1: 1
- EAL4: 25
- EAL4 augmented: 18
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 4
- EAL 5: 7
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
- ALC:
- AVA:
- AVA_VLA.2: 1
- AVA_VLA.3: 42
|
- ADV:
- ADV_FSP.5: 1
- ADV_IMP.2: 5
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMC.5: 5
- ALC_CMS.5: 1
- ALC_DVS.2: 5
- ALC_FLR: 3
- ALC_FLR.3: 5
- ALC_TAT.2: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FPT:
- FPT_RIP.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-004: 1
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443: 1
- of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS: 1
- out of scope: 2
|
- ConfidentialDocument:
- Report, Version 7, 2022-09-08, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 2022-09-06, 18064-0000-MDL.xlsx (confidential document) [9: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20040804100821Z
- /Creator: Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word
- /ModDate: D:20131119171800Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: Borderware MXtreme Mail Firewall CR1.0.doc
- pdf_file_size_bytes: 186048
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220920112048+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, Certification Report"
- /ModDate: D:20220920113713+02'00'
- /Producer: LibreOffice 7.2
- /Subject: Certification Report, Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 5.1.3
- /Title: Certification Report BSI-DSZ-CC-1146-2022
- pdf_file_size_bytes: 533185
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
borderware_3.0Final.pdf |
1146b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 5
- EAL 5 augmented: 2
- EAL 5+: 1
- EAL5: 3
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA.3: 7
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 4
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.5: 4
- ALC_DVS.2: 5
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_IFF.1.6: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_RVM.1: 2
- FDP_SEP.1: 2
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 7
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
|
- FDP:
- FDP_ACC: 32
- FDP_ACC.2: 12
- FDP_ACF: 34
- FDP_ACF.1: 27
- FDP_IFC.2: 8
- FDP_IFF.1: 11
- FIA:
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.3: 7
- FMT_MSA.3.1: 2
- FMT_MTD: 12
- FMT_MTD.1: 3
- FMT_SMF.1: 5
- FMT_SMR.1: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL: 2
- A.TRANSFER: 2
- A.TRUSTED: 2
- A.USEAGE: 2
- O:
- O.ADDRESS: 10
- O.ADMIN: 7
- O.ATTEMPT: 4
- O.AUDREC: 4
- O.DIRECT: 5
- O.GW: 4
- O.LIMEXT: 4
- O.MAILCTL: 6
- O.MEDIATE: 10
- O.NOREP: 3
- O.PORT: 1
- O.PORTS: 10
- O.SELPRO: 5
- T:
- T.CONFIG: 2
- T.CONN: 1
- T.DETECT: 2
- T.MEDIAT: 2
- T.OLDINF: 2
- T.OPEN_RELAY: 2
- T.OS_FAC: 2
- T.REM_CONN: 2
- T.REPEAT: 2
- T.SELPRO: 2
- T.SOURCE: 2
- T.UNSOLICITED: 2
|
- A:
- A.EXCLUSIVE_RESOURCES: 4
- A.HARDWARE: 4
- A.PHYSICAL: 4
- A.PRIVILEGED_EXECUTABLES: 5
- A.TRUSTWORTHY_PERSONNEL: 4
- OE:
- OE.EXCLUSIVE_RESOURCES: 3
- OE.HARDWARE: 2
- OE.PHYSICAL: 2
- OE.PRIVILEGED_EXECUTABLES: 3
- OE.TRUSTWORTHY_PERSONNEL: 3
- OT:
- OT.API_PROTECTION: 4
- OT.CONFIDENTIALITY: 6
- OT.INTEGRITY: 4
- OT.RESOURCE_AVAILABILITY: 6
- T:
- T.DEPLETION: 4
- T.DISCLOSURE: 4
- T.EXECUTION: 4
- T.MODIFICATION: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: BorderWare Technologies Inc
- /CreationDate: D:20040804110458Z
- /Creator: SecurityTarget3.0Final - Microsoft Word
- /ModDate: D:20040804134352+02'00'
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: MXtreme V3.0 Security Target
- pdf_file_size_bytes: 165061
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Author: Guillaume Fumaroli
- /CreationDate: D:20220907162051Z
- /Creator: disclosed
- /Keywords: operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforcé
- /ModDate: D:20220907162051Z
- /PTEX.Fullbanner: This is pdfTeX, Version 3.1415926-2.4-1.40.13 (TeX Live 2012/Debian) kpathsea version 6.1.0
- /Producer: disclosed
- /Subject:
- /Title: Security Target PikeOS Separation Kernel v5.1.3
- /Trapped: /False
- pdf_file_size_bytes: 1057120
- pdf_hyperlinks: mailto:[email protected], mailto:[email protected], mailto:[email protected], https://www.sysgo.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |