Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TNOR Guard v. 1.1.3
SERTIT-120
Apple FileVault 2 on T2 systems running macOS Catalina 10.15
CCEVS-VR-VID-11078-2021
name TNOR Guard v. 1.1.3 Apple FileVault 2 on T2 systems running macOS Catalina 10.15
category Boundary Protection Devices and Systems Other Devices and Systems
scheme NO US
status active archived
not_valid_after 12.05.2027 29.04.2023
not_valid_before 12.05.2022 29.04.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20C%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11078-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11078-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11078-st.pdf
manufacturer Thales Norway AS Apple Inc.
manufacturer_web https://www.thales.no/ https://www.apple.com/
security_level EAL4+, AVA_VAN.4, ALC_FLR.3 {}
dgst 03972af324dcd07f 1da522202a6576db
heuristics/cert_id SERTIT-120 CCEVS-VR-VID-11078-2021
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:apple:macos:10.15.7:supplemental_update:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-30923, CVE-2024-40864, CVE-2023-40430, CVE-2024-44125, CVE-2023-40400, CVE-2024-54537, CVE-2024-54542, CVE-2023-23523, CVE-2024-44254, CVE-2024-44213, CVE-2021-30900, CVE-2024-40850, CVE-2024-44270, CVE-2022-46690, CVE-2023-23540, CVE-2022-0158, CVE-2023-42870, CVE-2023-41074, CVE-2025-24127, CVE-2025-24099, CVE-2023-28207, CVE-2022-43454, CVE-2024-54549, CVE-2023-32444, CVE-2022-22586, CVE-2024-27849, CVE-2024-27882, CVE-2022-42788, CVE-2025-24093, CVE-2022-32936, CVE-2024-54551, CVE-2022-32890, CVE-2022-32833, CVE-2025-24113, CVE-2025-24117, CVE-2022-42847, CVE-2023-38403, CVE-2024-40822, CVE-2020-27898, CVE-2023-23506, CVE-2024-44179, CVE-2024-44198, CVE-2024-40859, CVE-2024-40823, CVE-2024-54493, CVE-2024-27871, CVE-2024-40810, CVE-2023-27929, CVE-2023-28189, CVE-2025-30457, CVE-2024-54530, CVE-2025-30464, CVE-2022-46716, CVE-2023-40384, CVE-2022-1898, CVE-2022-42830, CVE-2024-44297, CVE-2024-54473, CVE-2024-40774, CVE-2025-30463, CVE-2021-30758, CVE-2023-40441, CVE-2023-42869, CVE-2023-42826, CVE-2023-34425, CVE-2025-31194, CVE-2024-4558, CVE-2022-32935, CVE-2020-27899, CVE-2025-24137, CVE-2001-0102, CVE-2021-30833, CVE-2024-54477, CVE-2022-32208, CVE-2024-40845, CVE-2023-32361, CVE-2024-44222, CVE-2024-40818, CVE-2024-54528, CVE-2020-27927, CVE-2022-0943, CVE-2022-32938, CVE-2022-22594, CVE-2024-44131, CVE-2024-40860, CVE-2024-44233, CVE-2022-22579, CVE-2022-32899, CVE-2023-38605, CVE-2024-44218, CVE-2022-32879, CVE-2025-24201, CVE-2023-27942, CVE-2024-40861, CVE-2021-30785, CVE-2024-40779, CVE-2024-54523, CVE-2024-40788, CVE-2024-54491, CVE-2023-4781, CVE-2024-44137, CVE-2024-54494, CVE-2021-30706, CVE-2022-42811, CVE-2022-35260, CVE-2025-31201, CVE-2022-1621, CVE-2022-1927, CVE-2024-44146, CVE-2024-44206, CVE-2023-30774, CVE-2024-54536, CVE-2023-40411, CVE-2023-32396, CVE-2024-44190, CVE-2025-30456, CVE-2023-22809, CVE-2023-32421, CVE-2023-23524, CVE-2024-40796, CVE-2024-54560, CVE-2021-30748, CVE-2024-23236, CVE-2022-1851, CVE-2023-23525, CVE-2022-32221, CVE-2023-40429, CVE-2024-44273, CVE-2022-42867, CVE-2022-42856, CVE-2020-10014, CVE-2024-40792, CVE-2022-32207, CVE-2022-32945, CVE-2024-54475, CVE-2022-32897, CVE-2023-23531, CVE-2023-38421, CVE-2023-27944, CVE-2022-0572, CVE-2022-42861, CVE-2020-13631, CVE-2025-24154, CVE-2021-30823, CVE-2023-23520, CVE-2022-1381, CVE-2025-24161, CVE-2024-40826, CVE-2021-4166, CVE-2024-54564, CVE-2024-54486, CVE-2022-2000, CVE-2021-30955, CVE-2022-46720, CVE-2023-42929, CVE-2025-24281, CVE-2022-42816, CVE-2024-44199, CVE-2024-54522, CVE-2024-40812, CVE-2024-40804, CVE-2023-23517, CVE-2024-54492, CVE-2023-34241, CVE-2024-54508, CVE-2021-30814, CVE-2024-54516, CVE-2024-40866, CVE-2025-24100, CVE-2023-23543, CVE-2023-23496, CVE-2024-44203, CVE-2022-42863, CVE-2023-38615, CVE-2024-27809, CVE-2022-42826, CVE-2021-30890, CVE-2021-30774, CVE-2024-54476, CVE-2021-30831, CVE-2022-32205, CVE-2025-24129, CVE-2022-42855, CVE-2024-44130, CVE-2023-38261, CVE-2023-40393, CVE-2020-13520, CVE-2024-27863, CVE-2025-24169, CVE-2024-40843, CVE-2022-46693, CVE-2024-27795, CVE-2024-44236, CVE-2023-38586, CVE-2024-54531, CVE-2021-30874, CVE-2024-44253, CVE-2021-30966, CVE-2020-27901, CVE-2022-26738, CVE-2022-2126, CVE-2020-10008, CVE-2024-54489, CVE-2024-40827, CVE-2025-24094, CVE-2019-20838, CVE-2025-24282, CVE-2023-37285, CVE-2023-23532, CVE-2024-54534, CVE-2023-42948, CVE-2025-24160, CVE-2022-46712, CVE-2023-41067, CVE-2023-32401, CVE-2023-23513, CVE-2023-27951, CVE-2025-24136, CVE-2024-27805, CVE-2023-40439, CVE-2024-44128, CVE-2022-32918, CVE-2023-28181, CVE-2023-23501, CVE-2021-30775, CVE-2025-24122, CVE-2024-54488, CVE-2025-24170, CVE-2022-32827, CVE-2025-24178, CVE-2023-42913, CVE-2022-42916, CVE-2022-0156, CVE-2023-40541, CVE-2022-22587, CVE-2024-44269, CVE-2023-40414, CVE-2024-27861, CVE-2021-30887, CVE-2023-41990, CVE-2023-27935, CVE-2024-54490, CVE-2025-24245, CVE-2023-39434, CVE-2024-40835, CVE-2022-42803, CVE-2025-31183, CVE-2025-24120, CVE-2013-0340, CVE-2022-48577, CVE-2022-1733, CVE-2022-46696, CVE-2022-46689, CVE-2021-30798, CVE-2025-24103, CVE-2022-1629, CVE-2024-44244, CVE-2023-38616, CVE-2023-32366, CVE-2023-27952, CVE-2021-30848, CVE-2022-22631, CVE-2021-30964, CVE-2023-23503, CVE-2022-47915, CVE-2024-44265, CVE-2021-30860, CVE-2023-32383, CVE-2023-4752, CVE-2022-32919, CVE-2024-27853, CVE-2024-54479, CVE-2024-54517, CVE-2024-23261, CVE-2023-39233, CVE-2024-54499, CVE-2021-30884, CVE-2023-38603, CVE-2024-40794, CVE-2022-42823, CVE-2021-30897, CVE-2025-24239, CVE-2025-24086, CVE-2020-9849, CVE-2024-44170, CVE-2024-54497, CVE-2022-0629, CVE-2022-48610, CVE-2024-23237, CVE-2022-32865, CVE-2024-44166, CVE-2025-30462, CVE-2021-30768, CVE-2020-9846, CVE-2024-27799, CVE-2022-42813, CVE-2023-27932, CVE-2023-28180, CVE-2020-36615, CVE-2021-30665, CVE-2021-1755, CVE-2023-42828, CVE-2024-40854, CVE-2022-32922, CVE-2024-44227, CVE-2024-40846, CVE-2023-27933, CVE-2025-30465, CVE-2020-27941, CVE-2024-44175, CVE-2024-23203, CVE-2022-42825, CVE-2022-1735, CVE-2023-29497, CVE-2024-44151, CVE-2024-44189, CVE-2024-54498, CVE-2025-24242, CVE-2024-27883, CVE-2022-32858, CVE-2021-30807, CVE-2021-30797, CVE-2023-41066, CVE-2024-40785, CVE-2024-44164, CVE-2024-44282, CVE-2021-30861, CVE-2024-27885, CVE-2022-42808, CVE-2025-31191, CVE-2024-44123, CVE-2024-54559, CVE-2022-0729, CVE-2022-22639, CVE-2021-30984, CVE-2025-24112, CVE-2025-24106, CVE-2024-40848, CVE-2024-27806, CVE-2021-30905, CVE-2022-32905, CVE-2024-44155, CVE-2025-24126, CVE-2020-27912, CVE-2021-22946, CVE-2022-46691, CVE-2024-44133, CVE-2023-28190, CVE-2021-30867, CVE-2020-15358, CVE-2022-32924, CVE-2022-42865, CVE-2023-42949, CVE-2023-40385, CVE-2022-0319, CVE-2024-54510, CVE-2024-54565, CVE-2024-54546, CVE-2023-40383, CVE-2022-32931, CVE-2023-23495, CVE-2023-42835, CVE-2021-30791, CVE-2025-24145, CVE-2022-0318, CVE-2024-54558, CVE-2024-54465, CVE-2022-32926, CVE-2023-40402, CVE-2023-27941, CVE-2024-44234, CVE-2025-24163, CVE-2024-44239, CVE-2025-30461, CVE-2022-42829, CVE-2023-23537, CVE-2021-30772, CVE-2023-23536, CVE-2021-30818, CVE-2024-27792, CVE-2023-42871, CVE-2023-42865, CVE-2024-27875, CVE-2022-32928, CVE-2023-28206, CVE-2025-31200, CVE-2023-38590, CVE-2023-32378, CVE-2024-40809, CVE-2024-40807, CVE-2022-1725, CVE-2023-40388, CVE-2023-40390, CVE-2022-46699, CVE-2025-24085, CVE-2021-1844, CVE-2020-27909, CVE-2020-27943, CVE-2022-42815, CVE-2024-44177, CVE-2022-1968, CVE-2023-40398, CVE-2022-42818, CVE-2025-30460, CVE-2025-24146, CVE-2023-23530, CVE-2023-41993, CVE-2025-24096, CVE-2021-30871, CVE-2025-24134, CVE-2025-24130, CVE-2022-46705, CVE-2023-40391, CVE-2024-44232, CVE-2020-27944, CVE-2025-24152, CVE-2023-40450, CVE-2025-30467, CVE-2024-54519, CVE-2021-30855, CVE-2023-42833, CVE-2024-44135, CVE-2021-30858, CVE-2022-32867, CVE-2024-40855, CVE-2024-40801, CVE-2023-38607, CVE-2024-40771, CVE-2022-42831, CVE-2022-26737, CVE-2024-44191, CVE-2022-22600, CVE-2021-1814, CVE-2021-30668, CVE-2021-30811, CVE-2023-42876, CVE-2023-35990, CVE-2021-30886, CVE-2021-30852, CVE-2023-42933, CVE-2023-41079, CVE-2025-24151, CVE-2025-24204, CVE-2022-48504, CVE-2021-30809, CVE-2024-40798, CVE-2021-4173, CVE-2024-40793, CVE-2024-23222, CVE-2024-44129, CVE-2022-0351, CVE-2024-27880, CVE-2023-42943, CVE-2024-40844, CVE-2021-30851, CVE-2024-54471, CVE-2021-30888, CVE-2024-44126, CVE-2024-27872, CVE-2025-31187, CVE-2023-35074, CVE-2023-40396, CVE-2023-23534, CVE-2024-44188, CVE-2024-27873, CVE-2023-42853, CVE-2025-24262, CVE-2021-30922, CVE-2021-1803, CVE-2024-44158, CVE-2024-40831, CVE-2024-44122, CVE-2021-30788, CVE-2022-42809, CVE-2024-40857, CVE-2024-44267, CVE-2020-27910, CVE-2021-30813, CVE-2022-1942, CVE-2025-30458, CVE-2025-24101, CVE-2024-40847, CVE-2025-24121, CVE-2024-40770, CVE-2024-54539, CVE-2023-41060, CVE-2024-54527, CVE-2023-23527, CVE-2024-27855, CVE-2022-29458, CVE-2023-40436, CVE-2022-22633, CVE-2020-14155, CVE-2023-42934, CVE-2023-40417, CVE-2023-28205, CVE-2020-27904, CVE-2024-40776, CVE-2025-24174, CVE-2025-24172, CVE-2022-42853, CVE-2021-4192, CVE-2023-40407, CVE-2023-41979, CVE-2021-30835, CVE-2022-22585, CVE-2023-42830, CVE-2024-44144, CVE-2021-30784, CVE-2022-46710, CVE-2024-23206, CVE-2023-40399, CVE-2023-42957, CVE-2024-44163, CVE-2023-42959, CVE-2024-54550, CVE-2022-48578, CVE-2023-23535, CVE-2022-42859, CVE-2022-0685, CVE-2022-42795, CVE-2022-22617, CVE-2022-0714, CVE-2023-38571, CVE-2024-54515, CVE-2025-24131, CVE-2024-40815, CVE-2023-38565, CVE-2024-44176, CVE-2021-30873, CVE-2024-27869, CVE-2022-48683, CVE-2024-54474, CVE-2024-54509, CVE-2023-40432, CVE-2024-44182, CVE-2024-44154, CVE-2022-0696, CVE-2023-27931, CVE-2022-32895, CVE-2024-27887, CVE-2024-44186, CVE-2022-2042, CVE-2022-42814, CVE-2025-24115, CVE-2022-46695, CVE-2022-1616, CVE-2023-40426, CVE-1999-0590, CVE-2021-30864, CVE-2024-27860, CVE-2024-44153, CVE-2024-44174, CVE-2023-41987, CVE-2022-1620, CVE-2024-27800, CVE-2023-40434, CVE-2024-40803, CVE-2023-23522, CVE-2021-30808, CVE-2022-42791, CVE-2022-22664, CVE-2024-40842, CVE-2023-42925, CVE-2020-29629, CVE-2022-46698, CVE-2024-54557, CVE-2022-42824, CVE-2024-44247, CVE-2022-2125, CVE-2024-27817, CVE-2024-54467, CVE-2022-42832, CVE-2020-27893, CVE-2024-44134, CVE-2024-54658, CVE-2024-40799, CVE-2022-3970, CVE-2023-40422, CVE-2021-30680, CVE-2023-38601, CVE-2024-27859, CVE-2022-46692, CVE-2025-24157, CVE-2023-32373, CVE-2024-44159, CVE-2023-23542, CVE-2021-1821, CVE-2023-4750, CVE-2025-24248, CVE-2022-47965, CVE-2025-24153, CVE-2023-32436, CVE-2022-22599, CVE-2023-41986, CVE-2023-27943, CVE-2023-41995, CVE-2023-4733, CVE-2023-27937, CVE-2024-54526, CVE-2024-44184, CVE-2024-40825, CVE-2023-38598, CVE-2023-37448, CVE-2022-46721, CVE-2024-54518, CVE-2021-30930, CVE-2022-42820, CVE-2023-32377, CVE-2023-42872, CVE-2025-24156, CVE-2025-24135, CVE-2022-2124, CVE-2023-41994, CVE-2024-40834, CVE-2024-40789, CVE-2023-23538, CVE-2024-44255, CVE-2022-42806, CVE-2024-44302, CVE-2022-22657, CVE-2021-30817, CVE-2024-44281, CVE-2023-38593, CVE-2022-42810, CVE-2024-44192, CVE-2023-27934, CVE-2022-32870, CVE-2022-0261, CVE-2022-42799, CVE-2022-42858, CVE-2025-24087, CVE-2024-54463, CVE-2024-44172, CVE-2023-27928, CVE-2025-24143, CVE-2022-42796, CVE-2024-54525, CVE-2024-54469, CVE-2024-40806, CVE-2023-40424, CVE-2021-30844, CVE-2023-23519, CVE-2022-42862, CVE-2025-24123, CVE-2025-24118, CVE-2022-1674, CVE-2023-38610, CVE-2021-30846, CVE-2024-54504, CVE-2024-40786, CVE-2025-31182, CVE-2024-23204, CVE-2024-44183, CVE-2024-40833, CVE-2024-54520, CVE-2022-0554, CVE-2024-40795, CVE-2021-30849, CVE-2023-40386, CVE-2021-30924, CVE-2025-24140, CVE-2021-30776, CVE-2023-35984, CVE-2024-44132, CVE-2024-27802, CVE-2023-42866, CVE-2021-30713, CVE-2022-26730, CVE-2021-22947, CVE-2024-44308, CVE-2021-30925, CVE-2024-40837, CVE-2025-24097, CVE-2020-13630, CVE-2024-40816, CVE-2023-32385, CVE-2023-23510, CVE-2024-44296, CVE-2020-9965, CVE-2023-40438, CVE-2020-27906, CVE-2024-54468, CVE-2021-30836, CVE-2024-23299, CVE-2024-44148, CVE-2023-4734, CVE-2025-30471, CVE-2022-48505, CVE-2025-24148, CVE-2025-24158, CVE-2024-44187, CVE-2021-4193, CVE-2020-10012, CVE-2023-41065, CVE-2024-27858, CVE-2023-42881, CVE-2022-42838, CVE-2025-24173, CVE-2021-30789, CVE-2022-32898, CVE-2022-1769, CVE-2024-27823, CVE-2024-54507, CVE-2024-44305, CVE-2021-30904, CVE-2021-30889, CVE-2024-54506, CVE-2024-44178, CVE-2025-24124, CVE-2023-42918, CVE-2024-54500, CVE-2020-27900, CVE-2022-42807, CVE-2022-1619, CVE-2021-30920, CVE-2024-27831, CVE-2023-40389, CVE-2020-27939, CVE-2024-44205, CVE-2024-44208, CVE-2021-4187, CVE-2022-42864, CVE-2024-44287, CVE-2022-22625, CVE-2024-27884, CVE-2022-22584, CVE-2022-46697, CVE-2024-44215, CVE-2023-41078, CVE-2023-32363, CVE-2024-54533, CVE-2021-36690, CVE-2022-32940, CVE-2025-24185, CVE-2025-24109, CVE-2024-44294, CVE-2025-24159, CVE-2023-23518, CVE-2023-41980, CVE-2024-44289, CVE-2023-38602, CVE-2022-22583, CVE-2025-24139, CVE-2024-54543, CVE-2024-54501, CVE-2021-30903, CVE-2022-42866, CVE-2025-24162, CVE-2024-40775, CVE-2021-30866, CVE-2024-40856, CVE-2022-22578, CVE-2023-40437, CVE-2023-38604, CVE-2024-54478, CVE-2024-40838, CVE-2025-30470, CVE-2022-42839, CVE-2024-44145, CVE-2024-23209, CVE-2021-30853, CVE-2025-24128, CVE-2025-24164, CVE-2021-36976, CVE-2022-42833, CVE-2022-2294, CVE-2024-40791, CVE-2020-27918, CVE-2022-32933, CVE-2024-54513, CVE-2020-15969, CVE-2025-24191, CVE-2024-40832, CVE-2024-54484, CVE-2024-44264, CVE-2021-30996, CVE-2020-27907, CVE-2024-40787, CVE-2023-40392, CVE-2024-44185, CVE-2021-30840, CVE-2022-1420, CVE-2024-44284, CVE-2020-9972, CVE-2024-40778, CVE-2023-28197, CVE-2020-10005, CVE-2023-38612, CVE-2021-30779, CVE-2024-44168, CVE-2023-40433, CVE-2025-24108, CVE-2023-23533, CVE-2025-24138, CVE-2023-38596, CVE-2024-44181, CVE-2022-1897, CVE-2023-40455, CVE-2025-24176, CVE-2024-44152, CVE-2023-23526, CVE-2024-54505, CVE-2023-40397, CVE-2022-1720, CVE-2022-32915, CVE-2020-9897, CVE-2022-22626, CVE-2021-30926, CVE-2025-24092, CVE-2023-27936, CVE-2024-44149, CVE-2021-30819, CVE-2025-24114, CVE-2024-44161, CVE-2024-40780, CVE-2024-54541, CVE-2024-27856, CVE-2021-30792, CVE-2025-24150, CVE-2024-27836, CVE-2024-23254, CVE-2022-32892, CVE-2024-40797, CVE-2024-44165, CVE-2022-32923, CVE-2021-30960, CVE-2022-46703, CVE-2023-40448, CVE-2025-24149, CVE-2025-24116, CVE-2024-44156, CVE-2025-24107, CVE-2022-32947
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1
heuristics/extracted_versions 1.1.3 10.15
heuristics/scheme_data
  • category: Boundary Protection Devices and Systems
  • certification_date: 12.05.2022
  • developer: Thales Norway AS
  • enhanced:
    • category: Boundary Protection Devices and Systems
    • cert_id: SERTIT-120
    • certification_date: 12.05.2022
    • description: TNOR Guard is a technology that provides controlled information flow between networks with different system and application security policies. The TNOR Guard (TOE) is part of the XOmail product family for messaging and information exchange in mission-critical military and civilian networks. The Guard implements high-assurance information flow control for the trusted exchange of information across security domain boundaries. This product is also described in this report as the Target of Evaluation (TOE). The main security feature of the TOE is to mediate a one-way or bidirectional flow between two security domains. The TOE inspects every information object that is requested sent between the security domains, and makes an automated release decision according to configured policy. The TOE covers the following four Guard products: STANAG 4406 Ed 2 Message Guard For connectivity towards the NATO standard Military Message Handling System (MMHS), SMTP Message Guard (E-mail) For connectivity towards standard e-mail systems such as Microsoft Exchange. Supports RFC 6477 for Military Message Handling attributes within the SMTP domain, Chat (XMPP) Guard Instant Messaging service between security domains. XML/SOAP Guard Exchange of XML/SOAP data between security domains.
    • developer: Thales Norway AS
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/1311036-1656573547/SERTIT/Sertifikater/2022/120/SERTIT-120%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/1310630-1654589563/SERTIT/Sertifikater/2022/120/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/1310627-1654589561/SERTIT/Sertifikater/2022/120/SERTIT-120%20CR%20v1.0.pdf'})]})
    • evaluation_facility: System Sikkerhet AS
    • expiration_date: 12.05.2027
    • level: EAL 4, ALC_FLR.3, AVA_VAN.4
    • mutual_recognition: CCRA, SOG-IS
    • product: TNOR Guard version 1.1.3
    • sponsor: Forsvarsmateriell IKT-kapasiteter
  • product: TNOR Guard
  • url: https://sertit.no/certified-products/tnor-guard-article2842-1919.html
  • category: Encrypted Storage
  • certification_date: 29.04.2021
  • evaluation_facility: Acumen Security
  • expiration_date: 29.04.2023
  • id: CCEVS-VR-VID11078
  • product: Apple FileVault 2 on T2 systems running macOS Catalina 10.15
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11078
  • vendor: Apple Inc.
heuristics/protection_profiles {} 9b51621665ff7223, 52d782dbb1cd05bd
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_AA_V2.0E.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_EE_V2.0E.pdf
pdf_data/cert_filename SERTIT-120 C v1.0.pdf st_vid11078-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • NO:
    • SERTIT-120: 2
  • US:
    • CCEVS-VR-VID11078-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/vendor
  • Thales:
    • Thales: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_metadata
  • /Author: helgerudt
  • /CreationDate: D:20220629133919+02'00'
  • /Creator: Hewlett-Packard MFP
  • /ModDate: D:20220629142649+02'00'
  • /Producer: PixEdit AS, PixEdit Version 8.7.4.6
  • /Subject: 201676 201334 VEDLEGG01
  • pdf_file_size_bytes: 1289183
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20210504123627-04'00'
  • /ModDate: D:20210504123627-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180260
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename SERTIT-120 CR v1.0.pdf st_vid11078-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID11078-2021
    • cert_item: the Apple FileVault 2 on T2 systems running macOS Catalina 10.15
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-120: 22
  • US:
    • CCEVS-VR-VID11078-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 27
    • EAL 4 augmented: 24
  • EAL:
    • EAL 1: 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 26
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 27
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.4: 6
    • FCS_VAL_EXT.1: 1
  • FPT:
    • FPT_PWR_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.INITIAL_DRIVE_STATE: 1
    • A.PASSWORD_STRENGTH: 1
    • A.PHYSICAL: 1
    • A.PLATFORM_STATE: 1
    • A.POWER_DOWN: 1
    • A.SECURE_STATE: 1
    • A.SINGLE_USE_ET: 1
    • A.STRONG_CRYPTO: 1
    • A.TRUSTED_CHANNEL: 1
  • T:
    • T.KEYSPACE_EXHAUST: 1
    • T.UNAUTHORIZED_DATA_ACCESS: 1
    • T.UNAUTHORIZED_FIRMWARE_MODIFY: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 12
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • PKE:
    • PKE: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-110: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 8
    • ISO/IEC 17025: 2
    • ISO/IEC 18045: 2
  • RFC:
    • RFC 6477: 1
pdf_data/report_metadata
  • /CreationDate: D:20220518100037+02'00'
  • /ModDate: D:20220518100037+02'00'
  • pdf_file_size_bytes: 529073
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /CreationDate: D:20220119132031-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220119132031-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 443641
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
pdf_data/st_filename TNOR Guards 739_20726_aaaa_sc_ed10-4-public.pdf st_vid11078-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 6
  • ASE:
    • ASE_CCL: 2
    • ASE_ECD: 2
    • ASE_INT: 2
    • ASE_OBJ: 2
    • ASE_REQ: 2
    • ASE_SPD: 2
    • ASE_TSS: 2
  • AVA:
    • AVA_VAN.4: 6
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 2
    • FAU_ARP.1: 9
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 10
    • FAU_SAR: 1
    • FAU_SAR.1: 11
    • FAU_SAR.2: 8
    • FAU_STG: 1
    • FAU_STG.1: 12
    • FAU_STG.3: 9
    • FAU_STG.4: 9
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 10
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 1
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_NRO.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 9
    • FDP_ACC.2: 10
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ETC: 1
    • FDP_ETC.2: 13
    • FDP_IFC: 19
    • FDP_IFC.1: 14
    • FDP_IFC.2: 11
    • FDP_IFF: 19
    • FDP_IFF.1: 16
    • FDP_IFF.2: 16
    • FDP_IFF.2.2: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 15
    • FDP_RIP: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 10
    • FDP_UIT: 1
    • FDP_UIT.1: 9
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 9
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 13
  • FMT:
    • FMT_MOF: 19
    • FMT_MOF.1: 5
    • FMT_MSA: 1
    • FMT_MSA.1: 10
    • FMT_MSA.3: 15
    • FMT_MTD: 2
    • FMT_MTD.1: 12
    • FMT_MTD.3: 8
    • FMT_MTS: 1
    • FMT_REV: 1
    • FMT_REV.1: 9
    • FMT_SMF: 1
    • FMT_SMF.1: 15
    • FMT_SMR: 1
    • FMT_SMR.1: 9
    • FMT_SMR.2: 16
    • FMT_TST.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 11
    • FPT_RCV: 1
    • FPT_RCV.4: 10
    • FPT_STM.1: 2
    • FPT_TDC: 1
    • FPT_TDC.1: 11
    • FPT_TST: 1
    • FPT_TST.1: 12
  • FRU:
    • FRU_PRS: 1
    • FRU_PRS.1: 10
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP: 1
    • FTP_TRP.1: 15
    • FTP_TRP.2: 2
  • FCS:
    • FCS_AFA_EXT: 1
    • FCS_AFA_EXT.1: 4
    • FCS_AFA_EXT.1.1: 1
    • FCS_AFA_EXT.2: 4
    • FCS_AFA_EXT.2.1: 1
    • FCS_CKM.1: 16
    • FCS_CKM.1.1: 3
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 4
    • FCS_CKM_EXT.4: 8
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.6: 5
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 39
    • FCS_COP.1.1: 6
    • FCS_KDF_EXT.1: 6
    • FCS_KDF_EXT.1.1: 1
    • FCS_KYC_EXT.1: 6
    • FCS_KYC_EXT.1.1: 1
    • FCS_KYC_EXT.1.2: 1
    • FCS_KYC_EXT.2: 6
    • FCS_KYC_EXT.2.1: 1
    • FCS_KYC_EXT.2.2: 1
    • FCS_PCC_EXT.1: 5
    • FCS_PCC_EXT.1.1: 1
    • FCS_RBG_EXT.1: 9
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SNI_EXT.1: 5
    • FCS_SNI_EXT.1.1: 1
    • FCS_SNI_EXT.1.2: 1
    • FCS_SNI_EXT.1.3: 1
    • FCS_VAL_EXT.1: 6
    • FCS_VAL_EXT.1.1: 1
    • FCS_VAL_EXT.1.2: 1
    • FCS_VAL_EXT.1.3: 1
  • FDP:
    • FDP_DSK_EXT.1: 5
    • FDP_DSK_EXT.1.1: 1
    • FDP_DSK_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 4
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FAC_EXT: 1
    • FPT_FAC_EXT.1: 4
    • FPT_FAC_EXT.1.1: 1
    • FPT_FUA_EXT: 1
    • FPT_FUA_EXT.1: 4
    • FPT_FUA_EXT.1.1: 1
    • FPT_FUA_EXT.1.2: 1
    • FPT_FUA_EXT.1.3: 1
    • FPT_FUA_EXT.1.4: 1
    • FPT_KYP_EXT.1: 10
    • FPT_KYP_EXT.1.1: 2
    • FPT_PWR_EXT: 1
    • FPT_PWR_EXT.1: 11
    • FPT_PWR_EXT.1.1: 3
    • FPT_PWR_EXT.2: 4
    • FPT_PWR_EXT.2.1: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A..Z: 1
    • A.APPROVED_CRYPTO: 3
    • A.APPROVED_PKI: 2
    • A.CORRECT_CONFIGURATION: 3
    • A.NETWORK_PROTECTED: 2
    • A.PHYSICAL_ACCESS_MANAGED: 3
    • A.TRUSTED_AND_TRAINED_ADMIN: 2
    • A.TRUSTED_LABELLER: 3
  • O:
    • O.ACCESS: 8
    • O.AUDIT: 13
    • O.CMD_ACL: 10
    • O.CONFIGURATION_CHANGE: 5
    • O.CONTROLLED_INFORMATION: 1
    • O.CONTROLLED_INFORMATION_FLOW: 5
    • O.CORRECT_TSF_OPERATION: 6
    • O.INTERNAL_LEAST_PRIVILEG: 1
    • O.INTERNAL_LEAST_PRIVILEGE: 9
    • O.LABEL_MAPPING: 8
    • O.MAC: 5
    • O.MGMT_MODE: 6
    • O.MINIMAL_PROXY: 10
    • O.OBJECT_INTEGRITY: 9
    • O.RESIDUAL_INFORMATION: 7
    • O.RESOURCE_SHARING: 7
    • O.SECURE_STATE: 8
    • O.SUBJECT_ISOLATION: 12
    • O.TRANSITION: 5
    • O.TSF_INTEGRITY: 9
    • O.VALID_LABEL: 6
  • OE:
    • OE.APPROVED_CRYPTO: 7
    • OE.APPROVED_PKI: 7
    • OE.BORDER_PROTECTION: 12
    • OE.CONFIGURATION: 8
    • OE.CONTENT_INSPECTION_S: 1
    • OE.CONTENT_INSPECTION_SE: 2
    • OE.CONTENT_INSPECTION_SERVICE: 6
    • OE.DIRECTORY_SERVICE: 6
    • OE.MINIMAL_POSTURE: 10
    • OE.NETWORK: 10
    • OE.PHYSICAL_ACCESS_MANA: 2
    • OE.PHYSICAL_ACCESS_MANAG: 1
    • OE.PHYSICAL_ACCESS_MANAGED: 6
    • OE.PLATFORM: 10
    • OE.TIME_SOURCE: 6
    • OE.TRUSTED_AND_TRAINED_: 1
    • OE.TRUSTED_AND_TRAINED_A: 1
    • OE.TRUSTED_AND_TRAINED_ADMIN: 8
    • OE.TRUSTED_AND_TRAINED_ADMINS: 1
    • OE.TRUSTED_LABELLER: 7
  • T:
    • T.ADMIN_MASQUERADE: 4
    • T.AUDIT_COMPROMISE: 2
    • T.COVERT_CHANNEL: 2
    • T.DOS: 4
    • T.INFORMATION_LEAK: 2
    • T.INSECURE_STATE: 4
    • T.MALWARE_INJECTION: 2
    • T.METADATA_LEAK: 4
    • T.NETWORK_ATTACK: 2
    • T.OBJECT_TAMPERING: 4
    • T.RECONNAISSANCE: 4
    • T.RESIDUAL_DATA: 2
    • T.TSF_COMPROMISE: 3
    • T.UNATTENDED_ADMIN_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNNOTICED_ATTACK: 2
  • A:
    • A.INITIAL_DRIVE_STATE: 1
    • A.PASSWORD_STRENGTH: 1
    • A.PHYSICAL: 1
    • A.PLATFORM_STATE: 1
    • A.POWER_DOWN: 1
    • A.SECURE_STATE: 1
    • A.SINGLE_USE_ET: 1
    • A.STRONG_CRYPTO: 1
    • A.TRUSTED_CHANNEL: 1
  • OE:
    • OE.INITIAL_DRIVE_STATE: 1
    • OE.PASSPHRASE_STRENGTH: 1
    • OE.PHYSICAL: 1
    • OE.PLATFORM_STATE: 1
    • OE.SINGLE_USE_ET: 1
    • OE.STRONG_ENVIRONMENT_CRYPTO: 1
    • OE.TRAINED_USERS: 2
    • OE.TRUSTED_CHANNEL: 1
  • T:
    • T.KEYSPACE_EXHAUST: 1
    • T.UNAUTHORIZED_DATA_ACCESS: 1
    • T.UNAUTHORIZED_FIRMWARE_MODIFY: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 80
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 44
      • AES-128: 1
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 5
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 4
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 6
  • SHA:
    • SHA2:
      • SHA-256: 10
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 22
  • PKE:
    • PKE: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
  • RNG:
    • RBG: 3
  • TRNG:
    • TRNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • GCM:
    • GCM: 8
  • XTS:
    • XTS: 7
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-4: 2
  • ISO:
    • ISO/IEC 15408: 6
  • PKCS:
    • PKCS #11: 2
    • PKCS#11: 4
    • PKCS11: 2
  • RFC:
    • RFC 5321: 1
    • RFC 5322: 1
    • RFC 6120: 1
    • RFC 6121: 1
    • RFC 6477: 1
    • RFC 7622: 2
    • RFC3507: 2
    • RFC5905: 1
    • RFC6120: 2
    • RFC6121: 1
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 4
  • ISO:
    • ISO/IEC 10116: 2
    • ISO/IEC 18031:2011: 1
    • ISO/IEC 18033-3: 2
    • ISO/IEC 19772: 2
    • ISO/IEC 9796-2: 1
    • ISO/IEC18033-3: 2
  • NIST:
    • NIST SP 800-132: 4
    • NIST SP 800-38F: 1
    • NIST SP 800-90A: 2
    • SP 800-132: 2
    • SP 800-90A: 1
  • PKCS:
    • PKCS #1: 1
pdf_data/st_metadata
  • /Author: Radical
  • /CreationDate: D:20220510093219+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220510093219+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: System/Subsystem Specification
  • pdf_file_size_bytes: 3028038
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
  • /CreationDate: D:20210419222335Z
  • /Creator: Word
  • /ModDate: D:20210504123015-04'00'
  • /Producer: macOS Version 11.2.3 (Build 20D91) Quartz PDFContext
  • /Title: Microsoft Word - VID_11078.docx
  • pdf_file_size_bytes: 4740714
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different