Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
ISCB-5-RPT-C124-CR-v1
TOSHIBA e-STUDIO2010AC/2510AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230) Version: SYS V1.0
JISEC-CC-CRP-C0629-01-2019
name Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 TOSHIBA e-STUDIO2010AC/2510AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230) Version: SYS V1.0
category Other Devices and Systems Multi-Function Devices
scheme MY JP
status active archived
not_valid_after 17.05.2027 13.03.2024
not_valid_before 17.05.2022 13.03.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C124-CERTIFICATE-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0629_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C124-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0629_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Archer%20Suite%20v6.9.1.2%20with%20the%20Archer%20IRM%20Mobile%20V1.4%20_ST_v1.0-final.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/C0629_est.pdf
manufacturer RSA Security LLC Toshiba TEC Corporation
manufacturer_web https://rsa.com https://www.toshibatec.co.jp/en/
security_level EAL2+, ALC_FLR.2 {}
dgst 0f38dd1ae9d80dfa 4abe91df17abb65a
heuristics/cert_id ISCB-5-RPT-C124-CR-v1 JISEC-CC-CRP-C0629-01-2019
heuristics/cpe_matches cpe:2.3:a:rsa:archer:6.9:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2022-37317, CVE-2022-37316, CVE-2022-26950, CVE-2020-26884, CVE-2021-33615, CVE-2022-26947, CVE-2021-41594, CVE-2020-29538, CVE-2022-26951, CVE-2022-30584, CVE-2021-29252, CVE-2022-26949, CVE-2022-30585, CVE-2022-26948, CVE-2021-33616, CVE-2020-29535, CVE-2021-38362, CVE-2021-29253 {}
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1
heuristics/extracted_versions 6.9.1.2, 1.4 1.0
heuristics/scheme_data
  • cert_no: 2022-002-C124
  • certification_date: 17.05.2022
  • developer: RSA Security LLC
  • enhanced:
    • assurance_level: EAL2+ ALC_FLR.2
    • category: Other Devices and Systems
    • cert_id: C124
    • certification_date: 17.05.2022
    • developer: RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America
    • expiration_date: 17.05.2027
    • mutual_recognition: CCRA
    • product: Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/ISCB-5-RPT-C124-CR-v1.pdf
    • scope: Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App.
    • status: Valid
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/Archer_Suite_v6912_with_the_Archer_IRM_Mobile_V14__ST_v10-final.pdf
    • type: Other Devices and Systems
  • expiration_date: 17.05.2027
  • level: EAL2+ ALC_FLR.2
  • product: Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/128
  • cert_id: JISEC-CC-CRP-C0629
  • certification_date: 01.03.2019
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0629
    • cert_link: https://www.ipa.go.jp/en/security/c0629_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE Security functions The TOE provides the following security features: - Identification and Authentication Function - Access Control Function - Stored Data Encryption Function - Network Protection Function - Security Management Function - Audit Function - Software Verification Function - Self-testing Function - Fax Line Separation Function
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO2010AC/2510AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230)
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/C0629_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/C0629_est.pdf
    • toe_version: SYS V1.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date: 01.04.2024
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: TOSHIBA e-STUDIO2010AC/2510AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230)SYS V1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0629_it8689.html
  • toe_overseas_name: TOSHIBA e-STUDIO2010AC/2510AC all of the above with FAX Unit(GD-1370J/GD-1370NA/GD-1370EU) and FIPS Hard Disk Kit(GE-1230) SYS V1.0
heuristics/protection_profiles {} b2cfec7a92fa2940
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf
pdf_data/cert_filename ISCB-5-CERT-C124-CERTIFICATE-v1.pdf c0629_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0629-01-2019: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_metadata
  • /CreationDate: D:20220522024333Z00'00'
  • /Creator: Word
  • /ModDate: D:20220522024333Z00'00'
  • /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
  • /Title: ISCB-5-CERT-C124-CERTIFICATE-v1
  • pdf_file_size_bytes: 808672
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20190424140032+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190424140202+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 85608
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename ISCB-5-RPT-C124-CR-v1.pdf C0629_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C124-CR-v1: 39
  • JP:
    • JISEC-CC-CRP-C0629-01-2019: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 5
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 8
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1.1: 7
    • FAU_GEN.1.2: 7
    • FAU_GEN.2.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_SAR.3.1: 1
  • FDP:
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 2
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 7
    • FIA_UAU.5.1: 7
    • FIA_UAU.5.2: 7
    • FIA_UAU.6.1: 2
    • FIA_UID.2.1: 6
  • FMT:
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1.1: 3
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 2
  • FTA:
    • FTA_SSL.3.1: 2
    • FTA_SSL.4.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1.1: 1
  • FDP:
    • FDP_DSK_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CRYPTO: 1
    • A.MANAGE: 1
    • A.PROTECT: 1
    • A.SECURE_COMMS: 1
    • A.TIME: 1
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 9
    • D.USER: 5
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 8
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-512: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA256: 1
      • SHA512: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • TLS:
    • TLS:
      • TLS: 4
      • TLS v1.2: 4
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20220522032040Z00'00'
  • /Creator: Word
  • /ModDate: D:20220522032040Z00'00'
  • /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
  • /Title: ISCB-5-RPT-C124-CR-v1
  • pdf_file_size_bytes: 1221299
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
  • /CreationDate: D:20190605144545+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190605144656+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 390607
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
pdf_data/st_filename Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 _ST_v1.0-final.pdf C0629_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL2: 1
  • EAL:
    • EAL1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 16
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 6
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR: 9
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
  • FCS:
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS: 3
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU: 7
    • FIA_UAU.1: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 5
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 5
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 2
    • FMT_REV: 3
    • FMT_REV.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_TAB: 3
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE: 3
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 14
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 43
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_CKM_EXT: 5
    • FCS_CKM_EXT.4: 27
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 124
    • FCS_COP.1.1: 6
    • FCS_ITC.1: 2
    • FCS_ITC_EXT.1: 1
    • FCS_KDF_EXT: 4
    • FCS_KDF_EXT.1: 20
    • FCS_KDF_EXT.1.1: 3
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 9
    • FCS_KYC_EXT.1.1: 4
    • FCS_PCC_EXT.1: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 36
    • FCS_RBG_EXT.1.1: 3
    • FCS_RBG_EXT.1.2: 3
    • FCS_RGB_EXT.1: 2
    • FCS_SMC_EXT: 2
    • FCS_SMC_EXT.1: 15
    • FCS_SMC_EXT.1.1: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1: 20
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 2
    • FDP_DSK_EXT.1: 8
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 8
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 4
    • FIA_PMG_EXT.1: 3
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 4
    • FPT_KYP_EXT.1.1: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 9
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 17
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CRYPTO: 3
    • A.MANAGE: 2
    • A.PROTECT: 2
    • A.SECURE_COMMS: 3
    • A.TIME: 2
  • O:
    • O.ACCESS_CONTROL: 4
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.I_AND_A: 3
    • O.LOGON_BANNER: 4
    • O.PASSWORD_CONTROLS: 3
    • O.SECURITY_MANAGEMENT: 4
    • O.SESSION_LIMITATION: 3
    • O.SESSION_TERMINATION: 4
    • O.THROTTLE: 3
  • OE:
    • OE.CRYPTO: 3
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
    • OE.SECURE_COMMS: 2
    • OE.TIME: 3
  • T:
    • T.BRUTE_FORCE: 3
    • T.DATA_COMPROMISE: 2
    • T.INAPPROPRIATE_USE: 2
    • T.INAPPRORIATE_USE: 1
    • T.NO_ACCOUNTABILITY: 2
    • T.UNATTENDED_SESSION: 3
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACTIVITY: 3
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 8
    • D.USER: 32
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 12
    • O.FAX_NET_SEPARATION: 1
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 3
    • O.STORAGE_ENCRYPTION: 8
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 11
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 19
      • HMAC-SHA-512: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 7
      • SHA-512: 12
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 40
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
      • TLS1.2: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 12
    • PRNG: 6
  • RNG:
    • RBG: 4
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • GCM:
    • GCM: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 2
    • FIPS140-2: 1
    • FIPSPUB 180-3: 1
  • ISO:
    • ISO/IEC 10116: 2
    • ISO/IEC 10118: 4
    • ISO/IEC 18031:2011: 5
  • NIST:
    • NIST SP 800-108: 2
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-90A: 7
    • NIST SP 800-90B: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 3
    • RFC 4346: 1
    • RFC 5246: 3
    • RFC2818: 1
pdf_data/st_metadata
  • /CreationDate: D:20220522032525Z00'00'
  • /Creator: Word
  • /ModDate: D:20220522032525Z00'00'
  • /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
  • /Title: RSA Archer 6.9.1_ST_v1.0-final
  • pdf_file_size_bytes: 1012560
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 45
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different