| name |
Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 |
Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 Series Fabric Interconnects with UCSM 1.4(1m) |
| category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
MY |
US |
| status |
active |
archived |
| not_valid_after |
17.05.2027 |
22.04.2015 |
| not_valid_before |
17.05.2022 |
30.12.2011 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C124-CERTIFICATE-v1.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C124-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Archer%20Suite%20v6.9.1.2%20with%20the%20Archer%20IRM%20Mobile%20V1.4%20_ST_v1.0-final.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-st.pdf |
| manufacturer |
RSA Security LLC |
Cisco Systems, Inc. |
| manufacturer_web |
https://rsa.com |
https://www.cisco.com |
| security_level |
EAL2+, ALC_FLR.2 |
EAL4+, ALC_FLR.2 |
| dgst |
0f38dd1ae9d80dfa |
442b9af734a0ecb2 |
| heuristics/cert_id |
ISCB-5-RPT-C124-CR-v1 |
CCEVS-VR-VID-10403-2011 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
cpe:2.3:a:rsa:archer:6.9:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2022-37317, CVE-2022-37316, CVE-2022-26950, CVE-2020-26884, CVE-2021-33615, CVE-2022-26947, CVE-2021-41594, CVE-2020-29538, CVE-2022-26951, CVE-2022-30584, CVE-2021-29252, CVE-2022-26949, CVE-2022-30585, CVE-2022-26948, CVE-2021-33616, CVE-2020-29535, CVE-2021-38362, CVE-2021-29253 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, ATE_DPT.2, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ALC_FLR.2, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1 |
| heuristics/extracted_versions |
6.9.1.2, 1.4 |
1.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2022-002-C124
- certification_date: 17.05.2022
- developer: RSA Security LLC
- enhanced:
- assurance_level: EAL2+ ALC_FLR.2
- category: Other Devices and Systems
- cert_id: C124
- certification_date: 17.05.2022
- developer: RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America
- expiration_date: 17.05.2027
- mutual_recognition: CCRA
- product: Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/ISCB-5-RPT-C124-CR-v1.pdf
- scope: Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/Archer_Suite_v6912_with_the_Archer_IRM_Mobile_V14__ST_v10-final.pdf
- type: Other Devices and Systems
- expiration_date: 17.05.2027
- level: EAL2+ ALC_FLR.2
- product: Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/128
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10403/
- categories: ['Network Management']
- category: Network Management
- certification_date: 30.12.2011
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 18.04.2015
- id: CCEVS-VR-VID10403
- product: Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 and 6200 Series Fabric Interconnects with UCSM 2.0(4b)
- scheme: US
- url: https://www.niap-ccevs.org/products/10403
- vendor: Cisco Systems, Inc.
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
- maintenance_date: 18.04.2013
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-add1.pdf
- maintenance_st_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-st.pdf
- maintenance_title: Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 and 6200 Series Fabric Interconnects with UCSM 2.0(4b) with TOE hardware: Cisco UCS 5108 Blade Server Chassis, Cisco UCS B200 M1/M2/M3, B230 M1/M2, B250 M1/M2, B420 M3, B440 M1/M2, and M22 M3 Blade Servers, Cisco UCS C200 M1/M2/M2SFF, C210 M1/M2, C220 M3, C240 M3, C250 M1/M2, C260 M2, C460 M2, C22 M3, and C24 M3 Rack-Mount Servers, Cisco UCS 6120XP, 6140XP, 6248UP, and 6296UP Fabric Interconnects, Cisco UCS 2104XP, 2204XP, 2208XP and 2232PP Fabric Extenders
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
ISCB-5-CERT-C124-CERTIFICATE-v1.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20220522024333Z00'00'
- /Creator: Word
- /ModDate: D:20220522024333Z00'00'
- /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
- /Title: ISCB-5-CERT-C124-CERTIFICATE-v1
- pdf_file_size_bytes: 808672
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C124-CR-v1.pdf |
st_vid10403-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10403-2011
- cert_item: Cisco Unified Computing System (UCS
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C124-CR-v1: 39
|
- US:
- CCEVS-VR-VID10403-2011: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 11
- EAL 4 augmented: 2
- EAL4: 4
- EAL4 augmented: 1
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1.1: 7
- FAU_GEN.1.2: 7
- FAU_GEN.2.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2.1: 1
- FAU_SAR.3.1: 1
- FDP:
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1.1: 2
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 7
- FIA_UAU.5.1: 7
- FIA_UAU.5.2: 7
- FIA_UAU.6.1: 2
- FIA_UID.2.1: 6
- FMT:
- FMT_MOF.1.1: 1
- FMT_MSA.1.1: 2
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1.1: 4
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FTA:
- FTA_SSL.3.1: 2
- FTA_SSL.4.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE.1.1: 1
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.MANAGE: 1
- A.PROTECT: 1
- A.SECURE_COMMS: 1
- A.TIME: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Broadcom:
- Cisco:
- Cisco: 134
- Cisco Systems, Inc: 3
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20220522032040Z00'00'
- /Creator: Word
- /ModDate: D:20220522032040Z00'00'
- /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
- /Title: ISCB-5-RPT-C124-CR-v1
- pdf_file_size_bytes: 1221299
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
- /Author: Evaluation Team
- /CreationDate: D:20120113071326
- /Creator: Microsoft® Office Word 2007
- /Keywords: VR
- /ModDate: D:20120113071326
- /Producer: Microsoft® Office Word 2007
- /Subject: Validator Report
- /Title: Validation Report for IronPort Messaging Gateway
- pdf_file_size_bytes: 412791
- pdf_hyperlinks: http://www.cisco.com/en/US/prod/ps10265/ps10280/cna_models_comparison.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
| pdf_data/st_filename |
Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 _ST_v1.0-final.pdf |
st_vid10403-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 2
- EAL2: 1
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.2: 11
- ADV_TDS: 1
- ADV_TDS.1: 11
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 8
- ALC_CMS: 1
- ALC_CMS.2: 6
- ALC_DEL: 1
- ALC_DEL.1: 5
- ALC_FLR: 1
- ALC_FLR.2: 16
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 14
- ASE_ECD: 1
- ASE_ECD.1: 10
- ASE_INT: 1
- ASE_INT.1: 12
- ASE_OBJ: 1
- ASE_OBJ.2: 10
- ASE_REQ: 1
- ASE_REQ.2: 13
- ASE_SPD: 1
- ASE_SPD.1: 7
- ASE_TSS: 1
- ASE_TSS.1: 5
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 8
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR: 9
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FCS:
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF: 3
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 7
- FIA_UAU.1: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID: 2
- FIA_UID.1: 5
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 5
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 2
- FMT_REV: 3
- FMT_REV.1: 4
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_SSL: 6
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_TAB: 3
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE: 3
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 10
- FAU_SAR.3: 6
- FAU_STG.1: 7
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 6
- FDP_ACC.2: 16
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 20
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 22
- FDP_IFC.1.1: 2
- FDP_IFF.1: 18
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 2
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 4
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 2
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 29
- FMT_MSA.1.1: 18
- FMT_MSA.3: 26
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 18
- FMT_MTD.1: 10
- FMT_MTD.1.1: 10
- FMT_SAE.1: 6
- FMT_SAE.1.1: 3
- FMT_SAE.1.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.2: 6
- FPT_ITT.2.1: 1
- FPT_ITT.2.2: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 3
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 3
- A.MANAGE: 2
- A.PROTECT: 2
- A.SECURE_COMMS: 3
- A.TIME: 2
- O:
- O.ACCESS_CONTROL: 4
- O.AUDIT: 4
- O.AUDIT_REVIEW: 4
- O.I_AND_A: 3
- O.LOGON_BANNER: 4
- O.PASSWORD_CONTROLS: 3
- O.SECURITY_MANAGEMENT: 4
- O.SESSION_LIMITATION: 3
- O.SESSION_TERMINATION: 4
- O.THROTTLE: 3
- OE:
- OE.CRYPTO: 3
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- OE.SECURE_COMMS: 2
- OE.TIME: 3
- T:
- T.BRUTE_FORCE: 3
- T.DATA_COMPROMISE: 2
- T.INAPPROPRIATE_USE: 2
- T.INAPPRORIATE_USE: 1
- T.NO_ACCOUNTABILITY: 2
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACTIVITY: 3
|
- A:
- A.ADMIN: 3
- A.AUTHENTICATION_SERVER: 2
- A.BOUNDARY: 3
- A.PHYSICAL: 3
- A.POWER: 3
- A.REDUNDANT_NET: 3
- A.VSAN: 3
- O:
- O.ACCOUN: 5
- O.ADMIN: 4
- O.AUDREC: 8
- O.ENCRYP: 9
- O.IDAUTH: 10
- O.SECFUN: 23
- O.VLANSEC: 4
- O.VSANSEC: 6
- OE:
- OE.ADMIN: 3
- OE.AUTHENTICATION_: 1
- OE.AUTHENTICATION_SERVER: 2
- OE.BOUNDARY: 3
- OE.PHYSICAL: 2
- OE.POWER: 3
- OE.REDUNDANT_NET: 2
- OE.VSAN: 2
- T:
- T.ACCOUNTABILITY: 4
- T.ATTACK_ANOTHER: 4
- T.CONFIGURE_NO: 2
- T.NOAUTH: 5
- T.NORMAL_USE: 2
- T.NORMAL_USER: 2
- T.ROLE_ADMIN: 2
- T.SNIFF: 4
|
| pdf_data/st_keywords/vendor |
|
- Broadcom:
- Cisco:
- Cisco: 206
- Cisco Systems: 3
- Cisco Systems, Inc: 64
- Microsoft:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 2
- FIPS PUB 197: 1
- RFC:
- RFC 2246: 1
- RFC 2631: 1
- RFC 3268: 1
- RFC 3826: 1
- RFC 4251: 1
- RFC 4252: 1
- RFC2401: 1
- RFC3414: 1
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20220522032525Z00'00'
- /Creator: Word
- /ModDate: D:20220522032525Z00'00'
- /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
- /Title: RSA Archer 6.9.1_ST_v1.0-final
- pdf_file_size_bytes: 1012560
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
- /Author: Cisco Systems, Inc.
- /CreationDate: D:20130418125245
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130418125245
- /Producer: Microsoft® Office Word 2007
- /Title: Cisco UCS Security Target
- pdf_file_size_bytes: 1177547
- pdf_hyperlinks: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |