name |
TNOR Guard v. 1.1.3 |
Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location |
category |
Boundary Protection Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
NO |
US |
status |
active |
archived |
not_valid_after |
12.05.2027 |
20.07.2012 |
not_valid_before |
12.05.2022 |
25.03.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20C%20v1.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-st.pdf |
manufacturer |
Thales Norway AS |
Cisco Systems, Inc. |
manufacturer_web |
https://www.thales.no/ |
https://www.cisco.com |
security_level |
EAL4+, AVA_VAN.4, ALC_FLR.3 |
AVA_MSU.1, EAL2+, ACM_SCP.1, ALC_FLR.2 |
dgst |
03972af324dcd07f |
c46fedfa2cf2d8a1 |
heuristics/cert_id |
SERTIT-120 |
CCEVS-VR-VID-10324-2009 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:h:cisco:4400_wireless_lan_controller:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:1240:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2005-4258, CVE-2003-1002, CVE-2003-1001, CVE-2007-5134, CVE-2013-1235, CVE-2007-1258, CVE-2007-2041, CVE-2007-2038 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
ATE_HLD.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_COV.1, ADV_SPM.1, ATE_IND.2, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
heuristics/extracted_versions |
1.1.3 |
4400, 1130, 1240, 2710, 1230, 6500 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Boundary Protection Devices and Systems
- certification_date: 12.05.2022
- developer: Thales Norway AS
- enhanced:
- category: Boundary Protection Devices and Systems
- cert_id: SERTIT-120
- certification_date: 12.05.2022
- description: TNOR Guard is a technology that provides controlled information flow between networks with different system and application security policies. The TNOR Guard (TOE) is part of the XOmail product family for messaging and information exchange in mission-critical military and civilian networks. The Guard implements high-assurance information flow control for the trusted exchange of information across security domain boundaries. This product is also described in this report as the Target of Evaluation (TOE). The main security feature of the TOE is to mediate a one-way or bidirectional flow between two security domains. The TOE inspects every information object that is requested sent between the security domains, and makes an automated release decision according to configured policy. The TOE covers the following four Guard products: STANAG 4406 Ed 2 Message Guard For connectivity towards the NATO standard Military Message Handling System (MMHS), SMTP Message Guard (E-mail) For connectivity towards standard e-mail systems such as Microsoft Exchange. Supports RFC 6477 for Military Message Handling attributes within the SMTP domain, Chat (XMPP) Guard Instant Messaging service between security domains. XML/SOAP Guard Exchange of XML/SOAP data between security domains.
- developer: Thales Norway AS
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/1311036-1656573547/SERTIT/Sertifikater/2022/120/SERTIT-120%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/1310630-1654589563/SERTIT/Sertifikater/2022/120/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/1310627-1654589561/SERTIT/Sertifikater/2022/120/SERTIT-120%20CR%20v1.0.pdf'})]})
- evaluation_facility: System Sikkerhet AS
- expiration_date: 12.05.2027
- level: EAL 4, ALC_FLR.3, AVA_VAN.4
- mutual_recognition: CCRA, SOG-IS
- product: TNOR Guard version 1.1.3
- sponsor: Forsvarsmateriell IKT-kapasiteter
- product: TNOR Guard
- url: https://sertit.no/certified-products/tnor-guard-article2842-1919.html
|
- category: Miscellaneous
- certification_date: 25.03.2009
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10324
- product: Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location
- scheme: US
- url: https://www.niap-ccevs.org/product/10324
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
SERTIT-120 C v1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: helgerudt
- /CreationDate: D:20220629133919+02'00'
- /Creator: Hewlett-Packard MFP
- /ModDate: D:20220629142649+02'00'
- /Producer: PixEdit AS, PixEdit Version 8.7.4.6
- /Subject: 201676 201334 VEDLEGG01
- pdf_file_size_bytes: 1289183
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
SERTIT-120 CR v1.0.pdf |
st_vid10324-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10324-2009
- cert_item: Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 Cisco Unified Wireless Network & Wireless Intrusion Detection System
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10324-2009: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 27
- EAL 4 augmented: 24
|
- EAL:
- EAL 2: 8
- EAL 2 augmented: 4
- EAL 4: 1
- EAL2: 2
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 26
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 59
- Cisco Systems: 2
- Cisco Systems, Inc: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- ISO:
- ISO/IEC 15408: 8
- ISO/IEC 17025: 2
- ISO/IEC 18045: 2
- RFC:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20220518100037+02'00'
- /ModDate: D:20220518100037+02'00'
- pdf_file_size_bytes: 529073
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: root
- /CreationDate: D:20090410185059
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090410185059
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report for WLAN
- pdf_file_size_bytes: 345953
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
TNOR Guards 739_20726_aaaa_sc_ed10-4-public.pdf |
st_vid10324-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 8
- EAL4 augmented: 5
|
- EAL:
- EAL 4: 1
- EAL2: 11
- EAL2 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ALC:
- ASE:
- ASE_CCL: 2
- ASE_ECD: 2
- ASE_INT: 2
- ASE_OBJ: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- AVA:
|
- ACM:
- ACM_CAP.2: 5
- ACM_CAP.3: 1
- ACM_SCP: 1
- ACM_SCP.1: 9
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 3
- ADO_IGS.1: 6
- ADV:
- ADV_FSP.1: 13
- ADV_HLD.1: 6
- ADV_RCR: 3
- ADV_RCR.1: 6
- ADV_SPM.1: 3
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 9
- AGD_USR: 2
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 6
- ATE_HLD.1: 1
- ATE_IND.2: 5
- AVA:
- AVA_MSU: 2
- AVA_MSU.1: 7
- AVA_SOF: 1
- AVA_SOF.1: 5
- AVA_VLA: 2
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 9
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 10
- FAU_SAR: 1
- FAU_SAR.1: 11
- FAU_SAR.2: 8
- FAU_STG: 1
- FAU_STG.1: 12
- FAU_STG.3: 9
- FAU_STG.4: 9
- FCO:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP: 1
- FCS_COP.1: 10
- FCS_NRO.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.2: 10
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ETC: 1
- FDP_ETC.2: 13
- FDP_IFC: 19
- FDP_IFC.1: 14
- FDP_IFC.2: 11
- FDP_IFF: 19
- FDP_IFF.1: 16
- FDP_IFF.2: 16
- FDP_IFF.2.2: 1
- FDP_ITC: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 15
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.2: 10
- FDP_UIT: 1
- FDP_UIT.1: 9
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 9
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.2: 13
- FMT:
- FMT_MOF: 19
- FMT_MOF.1: 5
- FMT_MSA: 1
- FMT_MSA.1: 10
- FMT_MSA.3: 15
- FMT_MTD: 2
- FMT_MTD.1: 12
- FMT_MTD.3: 8
- FMT_MTS: 1
- FMT_REV: 1
- FMT_REV.1: 9
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMR: 1
- FMT_SMR.1: 9
- FMT_SMR.2: 16
- FMT_TST.1: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 11
- FPT_RCV: 1
- FPT_RCV.4: 10
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 11
- FPT_TST: 1
- FPT_TST.1: 12
- FRU:
- FTP:
- FTP_ITC.1: 4
- FTP_TRP: 1
- FTP_TRP.1: 15
- FTP_TRP.2: 2
|
- FAU:
- FAU_GEN.1: 31
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_GEN_EXP.1: 12
- FAU_GEN_EXP.1.1: 3
- FAU_GEN_EXP.1.2: 1
- FAU_SAR.1: 29
- FAU_SAR.1.1: 3
- FAU_SAR.1.2: 2
- FAU_SAR.2: 23
- FAU_SAR.2.1: 3
- FAU_SAR.3: 16
- FAU_SAR.3.1: 2
- FAU_SEL.1: 11
- FAU_SEL.1.1: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 2
- FAU_STG.1.2: 3
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 13
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM.1: 54
- FCS_CKM.1.1: 3
- FCS_CKM.2: 5
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_CKM_EXP.2: 17
- FCS_CKM_EXP.2.1: 1
- FCS_COP.1: 31
- FCS_COP.1.1: 2
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 22
- FCS_COP_EXP.2.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 2
- FDP_PUD_EXP: 1
- FDP_PUD_EXP.1: 12
- FDP_PUD_EXP.1.1: 2
- FDP_PUP_EXP.1: 1
- FDP_RIP.1: 20
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 29
- FIA_ATD.1.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU_EXP.5: 25
- FIA_UAU_EXP.5.1: 2
- FIA_UAU_EXP.5.2: 2
- FIA_UID.1: 11
- FIA_UID.2: 29
- FIA_UID.2.1: 2
- FIA_USB.1: 22
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 6
- FMT_MOF.1: 34
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 29
- FMT_MSA.2.1: 1
- FMT_MTD.1: 39
- FMT_MTD.1.1: 4
- FMT_REV.1: 1
- FMT_SMF.1: 38
- FMT_SMF.1.1: 3
- FMT_SMR.1: 30
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 13
- FPT_RVM.1: 18
- FPT_RVM.1.1: 2
- FPT_SEP.1: 18
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_STM_EXP.1: 15
- FPT_STM_EXP.1.1: 1
- FPT_TST: 3
- FPT_TST_EXP: 1
- FPT_TST_EXP.1: 10
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 12
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXP.1: 22
- FTP_ITC_EXP.1.1: 2
- FTP_ITC_EXP.1.2: 2
- FTP_ITC_EXP.1.3: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A..Z: 1
- A.APPROVED_CRYPTO: 3
- A.APPROVED_PKI: 2
- A.CORRECT_CONFIGURATION: 3
- A.NETWORK_PROTECTED: 2
- A.PHYSICAL_ACCESS_MANAGED: 3
- A.TRUSTED_AND_TRAINED_ADMIN: 2
- A.TRUSTED_LABELLER: 3
- O:
- O.ACCESS: 8
- O.AUDIT: 13
- O.CMD_ACL: 10
- O.CONFIGURATION_CHANGE: 5
- O.CONTROLLED_INFORMATION: 1
- O.CONTROLLED_INFORMATION_FLOW: 5
- O.CORRECT_TSF_OPERATION: 6
- O.INTERNAL_LEAST_PRIVILEG: 1
- O.INTERNAL_LEAST_PRIVILEGE: 9
- O.LABEL_MAPPING: 8
- O.MAC: 5
- O.MGMT_MODE: 6
- O.MINIMAL_PROXY: 10
- O.OBJECT_INTEGRITY: 9
- O.RESIDUAL_INFORMATION: 7
- O.RESOURCE_SHARING: 7
- O.SECURE_STATE: 8
- O.SUBJECT_ISOLATION: 12
- O.TRANSITION: 5
- O.TSF_INTEGRITY: 9
- O.VALID_LABEL: 6
- OE:
- OE.APPROVED_CRYPTO: 7
- OE.APPROVED_PKI: 7
- OE.BORDER_PROTECTION: 12
- OE.CONFIGURATION: 8
- OE.CONTENT_INSPECTION_S: 1
- OE.CONTENT_INSPECTION_SE: 2
- OE.CONTENT_INSPECTION_SERVICE: 6
- OE.DIRECTORY_SERVICE: 6
- OE.MINIMAL_POSTURE: 10
- OE.NETWORK: 10
- OE.PHYSICAL_ACCESS_MANA: 2
- OE.PHYSICAL_ACCESS_MANAG: 1
- OE.PHYSICAL_ACCESS_MANAGED: 6
- OE.PLATFORM: 10
- OE.TIME_SOURCE: 6
- OE.TRUSTED_AND_TRAINED_: 1
- OE.TRUSTED_AND_TRAINED_A: 1
- OE.TRUSTED_AND_TRAINED_ADMIN: 8
- OE.TRUSTED_AND_TRAINED_ADMINS: 1
- OE.TRUSTED_LABELLER: 7
- T:
- T.ADMIN_MASQUERADE: 4
- T.AUDIT_COMPROMISE: 2
- T.COVERT_CHANNEL: 2
- T.DOS: 4
- T.INFORMATION_LEAK: 2
- T.INSECURE_STATE: 4
- T.MALWARE_INJECTION: 2
- T.METADATA_LEAK: 4
- T.NETWORK_ATTACK: 2
- T.OBJECT_TAMPERING: 4
- T.RECONNAISSANCE: 4
- T.RESIDUAL_DATA: 2
- T.TSF_COMPROMISE: 3
- T.UNATTENDED_ADMIN_SESSION: 2
- T.UNAUTHORIZED_ACCESS: 4
- T.UNNOTICED_ATTACK: 2
|
- A:
- A.NO_EVIL: 2
- A.NO_GENERAL_: 1
- A.NO_GENERAL_PURPOSE: 1
- A.ONE_WCS_ADMIN: 3
- A.PHYSICAL: 2
- A.SYSLOG_ADMIN: 3
- A.SYSLOG_SEP: 5
- A.TOE_NO_BYPASS: 2
- O:
- O.ADMIN_GUIDANCE: 9
- O.AUDIT_GENERATION: 3
- O.CONFIGURATION_: 1
- O.CONFIGURATION_IDENTIFICATION: 8
- O.CORRECT_: 1
- O.CORRECT_TSF_: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 10
- O.CRYPTOGRAPHY_: 1
- O.CRYPTOGRAPHY_VALIDATED: 4
- O.DISPLAY_BANNER: 8
- O.DOCUMENTED_: 1
- O.DOCUMENTED_DESIGN: 3
- O.FUNCTIONAL_TESTING: 1
- O.IDS_AUDIT_: 1
- O.IDS_AUDIT_GENERATION: 10
- O.MANAGE: 7
- O.MEDIATE: 10
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONAL_TESTING: 3
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 10
- O.SELF_PROTECTION: 5
- O.TIME_STAMPS: 8
- O.TOE: 1
- O.TOE_ACCESS: 6
- O.VULNERABILITY_: 1
- O.VULNERABILITY_ANALYSIS: 7
- O.VULNERABILITY_ANALYSIS_TEST: 3
- OE:
- OE.AUDIT_PROTECTION: 6
- OE.AUDIT_REVIEW: 3
- OE.MANAGE: 8
- OE.NO_EVIL: 5
- OE.NO_GENERAL_PURPOSE: 5
- OE.ONE_WCS_ADMIN: 5
- OE.PHYSICAL: 2
- OE.PROTECT_MGMT_COMMS: 7
- OE.RESIDUAL_INFORMATION: 5
- OE.SELF_PROTECTION: 8
- OE.TIME_STAMPS: 4
- OE.TOE: 1
- OE.TOE_ACCESS: 7
- OE.TOE_NO_BYPASS: 6
- T:
- T.ACCIDENTAL_: 3
- T.ACCIDENTAL_ADMIN_: 1
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_: 1
- T.MASQUERADE: 1
- T.POOR_: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 3
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 3
- T.UNATTENDED_: 2
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ADMIN_: 1
- T.UNAUTH_ADMIN_ACCESS: 2
- T.UNIDENTIFIED_: 4
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 267
- Cisco Systems: 3
- Cisco Systems, Inc: 5
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- PKCS:
- PKCS #11: 2
- PKCS#11: 4
- PKCS11: 2
- RFC:
- RFC 5321: 1
- RFC 5322: 1
- RFC 6120: 1
- RFC 6121: 1
- RFC 6477: 1
- RFC 7622: 2
- RFC3507: 2
- RFC5905: 1
- RFC6120: 2
- RFC6121: 1
- X509:
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 140: 3
- FIPS 140-1: 1
- FIPS 140-2: 21
- FIPS 180-2: 1
- FIPS 46-3: 1
- FIPS PUB 140-2: 6
- FIPS PUB 180-2: 2
- FIPS PUB 46-3: 2
- NIST:
- RFC:
- RFC 2246: 1
- RFC 2284: 1
- RFC 2716: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Radical
- /CreationDate: D:20220510093219+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220510093219+02'00'
- /Producer: Microsoft® Word 2016
- /Title: System/Subsystem Specification
- pdf_file_size_bytes: 3028038
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /Author: lholmqui
- /CreationDate: D:20090526110050-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20090526110251-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: WLAN_ST.fm
- pdf_file_size_bytes: 672856
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 112
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |