| name |
Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 |
Cisco Catalyst 2960 and 3560 Wired Access Switches running IOS 15.2 |
| category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
MY |
US |
| status |
active |
archived |
| not_valid_after |
17.05.2027 |
29.11.2020 |
| not_valid_before |
17.05.2022 |
29.11.2018 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C124-CERTIFICATE-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10905-ci.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C124-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10905-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Archer%20Suite%20v6.9.1.2%20with%20the%20Archer%20IRM%20Mobile%20V1.4%20_ST_v1.0-final.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10905-st.pdf |
| manufacturer |
RSA Security LLC |
Cisco Systems, Inc. |
| manufacturer_web |
https://rsa.com |
https://www.cisco.com |
| security_level |
EAL2+, ALC_FLR.2 |
{} |
| dgst |
0f38dd1ae9d80dfa |
dc223ffcfeb7411a |
| heuristics/cert_id |
ISCB-5-RPT-C124-CR-v1 |
CCEVS-VR-10905-2018 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
cpe:2.3:a:rsa:archer:6.9:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2022-37317, CVE-2022-37316, CVE-2022-26950, CVE-2020-26884, CVE-2021-33615, CVE-2022-26947, CVE-2021-41594, CVE-2020-29538, CVE-2022-26951, CVE-2022-30584, CVE-2021-29252, CVE-2022-26949, CVE-2022-30585, CVE-2022-26948, CVE-2021-33616, CVE-2020-29535, CVE-2021-38362, CVE-2021-29253 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
6.9.1.2, 1.4 |
15.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2022-002-C124
- certification_date: 17.05.2022
- developer: RSA Security LLC
- enhanced:
- assurance_level: EAL2+ ALC_FLR.2
- category: Other Devices and Systems
- cert_id: C124
- certification_date: 17.05.2022
- developer: RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America
- expiration_date: 17.05.2027
- mutual_recognition: CCRA
- product: Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/ISCB-5-RPT-C124-CR-v1.pdf
- scope: Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/Archer_Suite_v6912_with_the_Archer_IRM_Mobile_V14__ST_v10-final.pdf
- type: Other Devices and Systems
- expiration_date: 17.05.2027
- level: EAL2+ ALC_FLR.2
- product: Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/128
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10905/
- categories: ['Network Device']
- category: Network Device
- certification_date: 29.11.2018
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 29.11.2020
- id: CCEVS-VR-VID10905
- product: Cisco Catalyst 2960 and 3560 Wired Access Switches running IOS 15.2
- scheme: US
- url: https://www.niap-ccevs.org/products/10905
- vendor: Cisco Systems, Inc.
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
48ac4778e4272298 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
| pdf_data/cert_filename |
ISCB-5-CERT-C124-CERTIFICATE-v1.pdf |
st_vid10905-ci.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10905-2018: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20220522024333Z00'00'
- /Creator: Word
- /ModDate: D:20220522024333Z00'00'
- /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
- /Title: ISCB-5-CERT-C124-CERTIFICATE-v1
- pdf_file_size_bytes: 808672
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
- /CreationDate: D:20181210145105-05'00'
- /ModDate: D:20181210145105-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181556
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ISCB-5-RPT-C124-CR-v1.pdf |
st_vid10905-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10905-2018
- cert_item: Cisco Systems, Inc. Catalyst 2960 and 3560 Series Wired Access Switches running IOS 15.2
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C124-CR-v1: 39
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1.1: 7
- FAU_GEN.1.2: 7
- FAU_GEN.2.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2.1: 1
- FAU_SAR.3.1: 1
- FDP:
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1.1: 2
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 7
- FIA_UAU.5.1: 7
- FIA_UAU.5.2: 7
- FIA_UAU.6.1: 2
- FIA_UID.2.1: 6
- FMT:
- FMT_MOF.1.1: 1
- FMT_MSA.1.1: 2
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1.1: 4
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FTA:
- FTA_SSL.3.1: 2
- FTA_SSL.4.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE.1.1: 1
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.MANAGE: 1
- A.PROTECT: 1
- A.SECURE_COMMS: 1
- A.TIME: 1
|
|
| pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 32
- Cisco Systems, Inc: 4
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 1
- Key exchange: 1
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20220522032040Z00'00'
- /Creator: Word
- /ModDate: D:20220522032040Z00'00'
- /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
- /Title: ISCB-5-RPT-C124-CR-v1
- pdf_file_size_bytes: 1221299
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
- /CreationDate: D:20181207110806-05'00'
- /ModDate: D:20181207110806-05'00'
- pdf_file_size_bytes: 809951
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
| pdf_data/st_filename |
Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 _ST_v1.0-final.pdf |
st_vid10905-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 2
- EAL2: 1
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.2: 11
- ADV_TDS: 1
- ADV_TDS.1: 11
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 8
- ALC_CMS: 1
- ALC_CMS.2: 6
- ALC_DEL: 1
- ALC_DEL.1: 5
- ALC_FLR: 1
- ALC_FLR.2: 16
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 14
- ASE_ECD: 1
- ASE_ECD.1: 10
- ASE_INT: 1
- ASE_INT.1: 12
- ASE_OBJ: 1
- ASE_OBJ.2: 10
- ASE_REQ: 1
- ASE_REQ.2: 13
- ASE_SPD: 1
- ASE_SPD.1: 7
- ASE_TSS: 1
- ASE_TSS.1: 5
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 8
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR: 9
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FCS:
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF: 3
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 7
- FIA_UAU.1: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID: 2
- FIA_UID.1: 5
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 5
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 2
- FMT_REV: 3
- FMT_REV.1: 4
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_SSL: 6
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_TAB: 3
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE: 3
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
|
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 22
- FCS_COP.1: 4
- FCS_DTLS: 1
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHC_EXT.1.8: 2
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT.1: 5
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 3
- FCS_TLSC_EXT: 1
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSS_EXT.1: 1
- FCS_TLSS_EXT.2: 1
- FCS_TLSS_EXT.2.4: 1
- FCS_TLSS_EXT.2.5: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 1
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 1
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT.1: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.2: 1
- FTP_TRP: 3
- FTP_TRP.1: 5
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 3
- A.MANAGE: 2
- A.PROTECT: 2
- A.SECURE_COMMS: 3
- A.TIME: 2
- O:
- O.ACCESS_CONTROL: 4
- O.AUDIT: 4
- O.AUDIT_REVIEW: 4
- O.I_AND_A: 3
- O.LOGON_BANNER: 4
- O.PASSWORD_CONTROLS: 3
- O.SECURITY_MANAGEMENT: 4
- O.SESSION_LIMITATION: 3
- O.SESSION_TERMINATION: 4
- O.THROTTLE: 3
- OE:
- OE.CRYPTO: 3
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- OE.SECURE_COMMS: 2
- OE.TIME: 3
- T:
- T.BRUTE_FORCE: 3
- T.DATA_COMPROMISE: 2
- T.INAPPROPRIATE_USE: 2
- T.INAPPRORIATE_USE: 1
- T.NO_ACCOUNTABILITY: 2
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACTIVITY: 3
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
| pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 43
- Cisco Systems: 1
- Cisco Systems, Inc: 3
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 18
- AES128: 2
- AES256: 2
- constructions:
- MAC:
- HMAC: 8
- HMAC-SHA-256: 4
- HMAC-SHA-512: 3
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 14
- Diffie-Hellman: 10
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-512: 10
- SHA512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 30
- IKEv1: 11
- IKEv2: 9
- IPsec:
- SSH:
- TLS:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 3
- FIPS 186-4: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-3: 1
- FIPS PUB 186-4: 7
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-56B: 2
- SP 800-56A: 1
- SP 800-56B: 2
- SP 800-90: 2
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 2986: 1
- RFC 3526: 4
- RFC 3602: 2
- RFC 4109: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 1
- RFC 4945: 1
- RFC 5280: 4
- RFC 5759: 1
- RFC 6187: 1
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20220522032525Z00'00'
- /Creator: Word
- /ModDate: D:20220522032525Z00'00'
- /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
- /Title: RSA Archer 6.9.1_ST_v1.0-final
- pdf_file_size_bytes: 1012560
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |