Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ALE Omniswitch 6250, 6350, and 6450 with the AOS 6.7.1.79.R04 firmware and ALE Omniswitch 6860, 6865, 6900, 9900, and 10K with the AOS 8.3.1.348.R01 firmware
CSEC2016005
MOzART Command Center Web Portal v1.1
ISCB-5-RPT-C117-CR-v1
name ALE Omniswitch 6250, 6350, and 6450 with the AOS 6.7.1.79.R04 firmware and ALE Omniswitch 6860, 6865, 6900, 9900, and 10K with the AOS 8.3.1.348.R01 firmware MOzART Command Center Web Portal v1.1
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme SE MY
status archived active
not_valid_after 12.05.2022 26.07.2026
not_valid_before 12.05.2017 26.07.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CertificateCCRAandSOGIS.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C117-CERTIFICATE-V1_.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Omniswitch.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C117-CR-v1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ALE_OmniSwitch_EAL2M_ST_1.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Mozart%20Command%20Center%20Web%20Portal%20Security%20Target%20v1.26.pdf
manufacturer ALE USA Inc Certis CISCO Security Pte Ltd (Certis)
manufacturer_web https://www.al-enterprise.com/ https://www.certisgroup.com/
security_level EAL2, ALC_FLR.2 EAL2
dgst 0926688c27a813eb d297d3b91330b408
heuristics/cert_id CSEC2016005 ISCB-5-RPT-C117-CR-v1
heuristics/extracted_sars ASE_TSS.1, ASE_ECD.1, ALC_CMC.2, AGD_PRE.1, ATE_IND.2, ASE_OBJ.2, AGD_OPE.1, ATE_FUN.1, ASE_REQ.2, ADV_TDS.1, ADV_ARC.1, ATE_COV.1, AVA_VAN.2, ALC_DEL.1, ALC_FLR.2, ASE_INT.1, ALC_CMS.2, ASE_CCL.1, ADV_FSP.2, ASE_SPD.1 ASE_TSS.1, ASE_ECD.1, ALC_CMC.2, AGD_PRE.1, ATE_IND.2, ASE_OBJ.2, AGD_OPE.1, ATE_FUN.1, ASE_REQ.2, ADV_TDS.1, ADV_ARC.1, ATE_COV.1, AVA_VAN.2, ALC_DEL.1, ASE_INT.1, ALC_CMS.2, ASE_CCL.1, ADV_FSP.2, ASE_SPD.1
heuristics/extracted_versions 8.3.1.348, 6.7.1.79 1.1
heuristics/scheme_data
  • cert_no: 2021-006-C117
  • certification_date: 26.07.2021
  • developer: Certis CISCO Security Pte Ltd
  • enhanced:
    • assurance_level: EAL2
    • category: Other Devices and Systems
    • cert_id: C117
    • certification_date: 26.07.2021
    • developer: 20 Jalan AfifiSingapore 409179 T: +65 6747 2888F: +65 6744 0039Email: [email protected]: +65 6856 8799 https://www.certisgroup.com
    • expiration_date: 26.07.2026
    • mutual_recognition: CCRA
    • product: MOzART Command Center Web Portal v1.1
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C117/ISCB-5-RPT-C117-CR-v1.pdf
    • scope: The Target of Evaluation (TOE) is a web-based application portal called the MOzART Command Center Web Portal (MOzART CC) which provides TOE users means of monitoring, operating, managing and administering physical security incidents through the Intranet (private network). The MOzART CC allows consumers to have a “one-to-all” control over many integrated physical security appliances such as fire alarm triggers, surveillance cameras, parameter sensors and entry alarm triggers around a designated premise. All modules/functions on the same private network related to the querying of live data, feeds by the third-party APIs (supporting non-TOE software) and displayed by the TOE will not require Internet connection. The MOzART CC is a highly sophisticated Command Center, acting as the user interface for TOE users (in their respective roles as an operator, supervisor or administrator) to monitor events, operate cases, manage cases, and administer the MOzART CC itself.
    • status: Valid
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C117/Mozart_Command_Center_Web_Portal_Security_Target_v1.26.pdf
    • type: A collection of appliances that form a security infrastructure for an enterprise network
  • expiration_date: 26.07.2026
  • level: EAL2
  • product: MOzART Command Center Web Portal v1.1
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/129
pdf_data/cert_filename CertificateCCRAandSOGIS.pdf ISCB-5-CERT-C117-CERTIFICATE-V1_.pdf
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • atsec:
    • atsec: 1
pdf_data/report_filename Certification Report Omniswitch.pdf ISCB-5-RPT-C117-CR-v1.pdf
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2016005: 1
  • MY:
    • ISCB-5-RPT-C117-CR-v1: 37
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 3
  • EAL:
    • EAL 2: 5
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 36
    • FAU_GEN.2: 10
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACF.1: 8
  • FIA:
    • FIA_AFL.1: 3
    • FIA_ATD.1: 8
    • FIA_SOS.1: 5
    • FIA_UAU.1: 1
    • FIA_UAU.5: 3
    • FIA_UID.1: 1
  • FTP:
    • FTP_TRP.1: 39
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.SERVICES_RELIABLE: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.INFORMATION_FLOW_POLICY_VIOLATION: 1
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.ADMINISTRATOR: 1
    • A.DDOS: 1
    • A.MALWARE: 1
    • A.PHYSICAL_ENVIRONMENT: 1
    • A.THIRDPARTY: 1
    • A.TIMESTAMP: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 5
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 2
    • SSHv2: 2
  • TLS:
    • TLS:
      • TLS: 2
      • TLS v1.1: 1
  • TLS:
    • TLS:
      • TLSv1.2: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author: jyjoh
  • /CreationDate: D:20170511192155
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20170511192155
  • /Producer: GPL Ghostscript 8.15
  • /Title: Microsoft Word - Certification Report Omniswitch Draft.doc
  • pdf_file_size_bytes: 320092
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /CreationDate: D:20210805054112Z00'00'
  • /Creator: Word
  • /ModDate: D:20210805054112Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
  • pdf_file_size_bytes: 901437
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename ALE_OmniSwitch_EAL2M_ST_1.9.pdf Mozart Command Center Web Portal Security Target v1.26.pdf
pdf_data/st_keywords/cc_cert_id
  • SE:
    • CSEC 2016005: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 133
  • EAL:
    • EAL 2: 2
    • EAL2: 22
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 9
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 5
    • FAU_STG_EXT.1: 14
    • FAU_STG_EXT.1.1: 2
    • FAU_STG_EXT.1.2: 2
    • FAU_STG_EXT.1.3: 4
    • FAU_STG_EXT.2: 4
    • FAU_STG_EXT.2.1: 1
    • FAU_STG_EXT.3: 4
    • FAU_STG_EXT.3.1: 1
  • FCS:
    • FCS_CKM.1: 37
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 18
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 108
    • FCS_COP.1.1: 8
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 16
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 3
    • FCS_SSHC_EXT: 32
    • FCS_SSHC_EXT.1: 18
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHS_EXT: 29
    • FCS_SSHS_EXT.1: 18
    • FCS_TLSC_EXT: 23
    • FCS_TLSC_EXT.1: 5
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.2: 18
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC.1: 21
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 16
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 12
    • FIA_PMG_EXT.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 3
    • FIA_UAU_EXT.2: 12
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT: 3
    • FIA_UIA_EXT.1: 15
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 34
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 18
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 18
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 3
    • FPT_APW_EXT.1: 12
    • FPT_APW_EXT.1.1: 2
    • FPT_APW_EXT.1.2: 2
    • FPT_SKP_EXT: 3
    • FPT_SKP_EXT.1: 12
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 12
    • FPT_TST_EXT.1.1: 3
    • FPT_TST_EXT.2: 6
    • FPT_TST_EXT.2.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 13
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 3
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.2: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 8
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 4
    • FTA_SSL_EXT.1: 12
    • FTA_SSL_EXT.1.1: 2
    • FTA_TAB.1: 12
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.3: 2
  • FPT:
    • FPT_STM.1: 2
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 3
    • A.LIMITED_FUNCTIONALITY: 3
    • A.PHYSICAL_PROTECTION: 3
    • A.REGULAR_UPDATES: 3
    • A.SERVICES_RELIABLE: 4
    • A.TRUSTED_ADMINISTRATOR: 3
  • O:
    • O.ACCESS_BANNER: 5
    • O.ADMIN_ACCESS: 15
    • O.ADMIN_SESSION: 7
    • O.AUDIT: 13
    • O.COMMUNICATION_CHANNELS: 18
    • O.CRYPTOGRAPHY: 18
    • O.MEDIATE: 16
    • O.SELF_TESTS: 4
    • O.STRONG_PASSWORDS: 8
    • O.TRUSTED_UPDATES: 8
    • O.TSF_DATA_PROTECTION: 11
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.PHYSICAL: 2
    • OE.SERVICES_RELIABLE: 3
    • OE.TRUSTED_ADMIN: 2
    • OE.UPDATES: 2
  • T:
    • T.INFORMATION_FLOW_POLICY_VIOLATION: 2
    • T.PASSWORD_CRACKING: 3
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
    • T.UNDETECTED_ACTIVITY: 3
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 3
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 2
    • T.WEAK_CRYPTOGRAPHY: 3
  • A:
    • A.ADMINISTRATOR: 4
    • A.DDOS: 4
    • A.MALWARE: 3
    • A.PHYSICAL_ENVIRONMENT: 4
    • A.THIRDPARTY: 3
    • A.TIMESTAMP: 3
  • O:
    • O.SEC_ACCESS: 5
    • O.SEC_AUTHENTICATE: 5
    • O.SEC_COMMUNICATION: 5
  • OE:
    • OE.ADMINISTRATOR: 3
    • OE.ANTI_DDOS: 3
    • OE.ANTI_MALWARE: 3
    • OE.SAFE_PHYSICAL_ENV: 3
    • OE.SYN_TIMESTAMP: 3
    • OE.THIRDPARTY: 3
  • T:
    • T.BROKEN_AUTH: 4
    • T.INTERCEPTION: 4
    • T.UNAUTHORIZED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 9
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 256
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
  • DES:
    • 3DES:
      • Triple-DES: 7
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 11
    • SHA2:
      • SHA-2: 5
      • SHA-224: 1
      • SHA-256: 8
      • SHA-384: 4
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 4
  • MAC:
    • MAC: 39
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 44
  • SSH:
    • SSH: 111
    • SSHv2: 49
  • TLS:
    • SSL:
      • SSL: 1
      • SSLv1.0: 1
      • SSLv2.0: 1
      • SSLv3.0: 1
    • TLS:
      • TLS: 72
      • TLS 1.1: 4
      • TLS 1.2: 4
      • TLS v1.1: 6
      • TLS v1.2: 4
      • TLSv1.0: 1
      • TLSv1.1: 18
      • TLSv1.2: 18
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 2
      • TLS 1.2: 4
      • TLSv1.2: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 14
  • GCM:
    • GCM: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 14
    • P-384: 12
    • P-521: 12
    • secp256r1: 4
    • secp384r1: 4
    • secp521r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 7
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 5
    • TLS_RSA_WITH_AES_256_CBC_SHA: 5
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 5
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 35
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
    • FIPS PUB 186-4: 6
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 4
    • ISO/IEC 9796-2: 2
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 5280: 2
    • RFC 6125: 2
    • RFC2451: 3
    • RFC2560: 4
    • RFC2986: 4
    • RFC3268: 15
    • RFC3602: 7
    • RFC4106: 3
    • RFC4251: 5
    • RFC4252: 8
    • RFC4253: 12
    • RFC4254: 2
    • RFC4301: 3
    • RFC4303: 4
    • RFC4346: 5
    • RFC4492: 14
    • RFC5246: 21
    • RFC5280: 5
    • RFC5289: 19
    • RFC5656: 2
    • RFC5759: 4
    • RFC6125: 5
    • RFC6460: 2
    • RFC6668: 2
  • X509:
    • X.509: 27
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. The TSF shall ensure that the SSH protocol: 2
    • out of scope: 2
  • OutOfScope:
    • out of scope: 2
    • physical scope of the TOE boxed in dotted lines. Both Video Stream and API Services are deemed as out of scope. All hardware appliances/devices, software components and integrated third‐party physical security: 1
    • to the integrated third‐party APIs which feeds data to the TOE. The following are categorized as out of scope from the selected TOE: Database server web application server application server The table: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20210630170155+08'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210721081156+08'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Title:
  • pdf_file_size_bytes: 955878
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different