name |
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 |
Fidelis XPS |
category |
Other Devices and Systems |
Detection Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.11.2014 |
not_valid_before |
09.09.2005 |
07.08.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10449-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10449-st.pdf |
manufacturer |
Canon Inc. |
Fidelis Security Systems, Inc. |
manufacturer_web |
https://www.canon.com/ |
https://www.fidelissecurity.com/ |
security_level |
EAL3 |
EAL2+, ALC_FLR.3 |
dgst |
0b61e662b1de9f6c |
14fad481adb43f88 |
heuristics/cert_id |
JISEC-CC-CRP-C0036 |
CCEVS-VR-VID-10449-2012 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 |
heuristics/extracted_versions |
2.03 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0386
- certification_date: 01.04.2013
- claim: EAL3+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
- product_type: Multifunction Product
- protection_profile: IEEE Std 2600.1-2009
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date: 01.05.2018
- supplier: Canon Inc.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
- toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Wireless Monitoring
- certification_date: 07.08.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10449
- product: Fidelis XPS
- scheme: US
- url: https://www.niap-ccevs.org/product/10449
- vendor: Fidelis Cybersecurity Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0036_ecvr.pdf |
st_vid10449-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10449-2012
- cert_item: For Fidelis XPS
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0036: 1
|
- US:
- CCEVS-VR-VID10449-2012: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 3
- EAL2: 4
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.PROTCT: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20060123172731+09'00'
- /ModDate: D:20060123172731+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 14795
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Jerry Mancini
- /CreationDate: D:20120907122419
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120907122419
- /Producer: Microsoft® Office Word 2007
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 261561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
|
st_vid10449-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 5
- EAL 2 augmented: 5
- EAL2: 1
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 14
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 18
- ADV_TDS: 1
- ADV_TDS.1: 17
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 10
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 9
- ALC_CMS: 1
- ALC_CMS.2: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_FLR: 2
- ALC_FLR.2: 2
- ALC_FLR.3: 25
- ATE:
- ATE_COV: 1
- ATE_COV.1: 8
- ATE_FUN: 1
- ATE_FUN.1: 12
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 10
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_STG: 12
- FAU_STG.1: 1
- FAU_STG.2: 5
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 3
- FAU_STG.4.1: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_ATD: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU: 8
- FIA_UAU.2: 4
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 4
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MTD: 6
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_ITT: 3
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_STM: 4
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS: 3
- A.ASCOPE: 2
- A.DYNMIC: 3
- A.LOCATE: 2
- A.MANAGE: 3
- A.NOEVIL: 2
- A.NOTRST: 3
- A.PROTCT: 2
- O:
- O.ACCESS: 12
- O.AUDITS: 9
- O.AUDIT_PROTECTION: 5
- O.AUDIT_SORT: 6
- O.EADMIN: 6
- O.EXPORT: 2
- O.IDANLZ: 7
- O.IDAUTH: 21
- O.IDSCAN: 1
- O.IDSEN: 1
- O.IDSENS: 8
- O.INTEGR: 7
- O.OFLOWS: 5
- O.PROTCT: 10
- O.RESPON: 4
- O.TIME: 7
- OE:
- OE.AUDIT_PROTECTION: 1
- OE.AUDIT_SORT: 1
- OE.CREDEN: 5
- OE.INSTAL: 5
- OE.INTROP: 5
- OE.PERSON: 6
- OE.PHYCAL: 7
- OE.TIME: 1
- T:
- T.COMDIS: 3
- T.COMINT: 2
- T.FACCNT: 3
- T.FALACT: 2
- T.FALASC: 4
- T.FALREC: 3
- T.IMPCON: 4
- T.INADVE: 2
- T.INFLUX: 3
- T.LOSSOF: 2
- T.MISACT: 3
- T.MISUSE: 2
- T.NOHALT: 3
- T.PRIVIL: 2
- T.SCNCFG: 2
- T.SCNMLC: 2
- T.SCNVUL: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 1
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- but can serve to effectively bypass some of those security functions. As a result, the IMM is out of scope of the evaluated configuration and its available connections should not be used (i.e., connected: 1
- in the underlying Linux can log directly into an appliance. This interface is generally considered out of scope of the evaluation since it is intended to be used for installation and setup purposes and not for: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
- /Author: SAIC
- /CreationDate: D:20120907110447
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120907110447
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: Fidelis XPS Security Target
- pdf_file_size_bytes: 1129377
- pdf_hyperlinks: http://www.pcre.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |