Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RSA Archer Suite v6.7
ISCB-5-RPT-C113-CR-v1
Privileged Access Security - Windows Components including PSM v10.4, CPM v10.4 and PVWA v10.4
CCEVS-VR-11005-2019
name RSA Archer Suite v6.7 Privileged Access Security - Windows Components including PSM v10.4, CPM v10.4 and PVWA v10.4
scheme MY US
not_valid_after 15.10.2025 30.09.2021
not_valid_before 15.10.2020 30.09.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C113-CERTIFICATE-v1%20signed.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11005-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C113-CR-V1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11005-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%206.7_ST_v1.0_09-29-2020.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11005-st.pdf
manufacturer RSA Security LLC CyberArk Software, Ltd
manufacturer_web https://rsa.com https://www.cyberark.com/
security_level ALC_FLR.2, EAL2+ {}
dgst 15b820d1481c0d81 ae34216294288cf1
heuristics/cert_id ISCB-5-RPT-C113-CR-v1 CCEVS-VR-11005-2019
heuristics/cert_lab [] US
heuristics/cpe_matches cpe:2.3:a:rsa:archer:6.7:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2021-33616, CVE-2021-41594, CVE-2020-5333, CVE-2020-5337, CVE-2020-5334, CVE-2020-5335, CVE-2020-5336, CVE-2022-30585, CVE-2020-29538, CVE-2020-29535, CVE-2022-26950, CVE-2021-29252, CVE-2020-29537, CVE-2020-5332, CVE-2022-26951, CVE-2021-29253, CVE-2022-37317, CVE-2022-26948, CVE-2021-33615, CVE-2022-30584, CVE-2021-38362, CVE-2020-5331, CVE-2022-26947, CVE-2020-29536, CVE-2022-26949 {}
heuristics/extracted_sars ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ALC_CMS.2, AGD_OPE.1, ATE_COV.1, ASE_CCL.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ADV_FSP.2, AGD_PRE.1, ALC_CMC.2, ASE_TSS.1, ALC_FLR.2, ASE_REQ.2, ASE_OBJ.2 ASE_SPD.1, ALC_CMS.1, ASE_OBJ.1, AGD_OPE.1, ASE_ECD.1, AVA_VAN.1, AGD_PRE.1, ASE_CCL.1, ASE_REQ.1, ASE_TSS.1, ASE_INT.1, ALC_CMC.1, ALC_TSU_EXT.1, ATE_IND.1, ADV_FSP.1
heuristics/extracted_versions 6.7 10.4
heuristics/scheme_data
  • cert_no: 2020-006-C113
  • certification_date: 24.11.2017
  • developer: RSA Security LLC
  • enhanced:
    • assurance_level: EAL2+ ALC_FLR.2
    • category: Other Devices and Systems
    • cert_id: C113
    • certification_date: 24.11.2017
    • developer: 13200 Metcalf Avenue,Suite 300 Overland Park,Kansas 66213,The United States of America Name & Tel: Jeremy Fisher (913-549-1565)Email: [email protected]: https://www.rsa.com/
    • expiration_date: 24.11.2022
    • mutual_recognition: CCRA
    • product: RSA Archer Suite v6.7
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/ISCB-5-RPT-C113-CR-V1.pdf
    • scope: The Target of Evaluation (TOE) is RSA Archer Suite v6.7. It is a software product that supports business-level management of governance, risk management and compliance. Users access the TOE via a web-based graphical user interface (GUI). All users require an account in order to log on to the TOE. The user account specifies the user’s groups and access roles. An access role is a collection of application-level and page-level rights that an administrator can create and assign to any number of users and groups to control user privileges (create, read, update, and delete). The Content API, Web Services API and RESTful APIs programmatically extend the functionality of the TOE to external applications through several classes and methods which expose many of its features, allowing for a high level of integration with other products. All users must be successfully identified and authenticated by the TOE before gaining access to any other TOE services.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C113/RSA_Archer_6.7_ST_v1.0_09-29-2020.pdf
    • type: Other Devices and Systems
  • expiration_date: 24.11.2022
  • level: EAL2+ ALC_FLR.2
  • product: RSA Archer Suite v6.7
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/139
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11005/
  • categories: ['Application Software']
  • category: Application Software
  • certification_date: 30.09.2019
  • evaluation_facility: DXC.technology
  • expiration_date: 30.09.2021
  • id: CCEVS-VR-VID11005
  • product: Privileged Access Security - Windows Components including PSM v10.4, CPM v10.4 and PVWA v10.4
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11005
  • vendor: CyberArk Software Ltd.
heuristics/protection_profiles {} 1aeebf1c5963b606
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf
pdf_data/cert_filename ISCB-5-CERT-C113-CERTIFICATE-v1 signed.pdf st_vid11005-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11005-2019: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/report_filename ISCB-5-RPT-C113-CR-V1.pdf st_vid11005-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-11005-2019
    • cert_item: CyberArk Privileged Access Security – Windows Components including PSM v10.04, CPM v10.04, and PVWA v10.04
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C113-CR-V1: 36
  • US:
    • CCEVS-VR-11005-2019: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 5
    • EAL2: 1
  • EAL:
    • EAL 4: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 9
pdf_data/report_keywords/cc_claims
  • A:
    • A.CRYPTO: 1
    • A.MANAGE: 1
    • A.PROTECT: 1
    • A.SECURE_COMMS: 1
    • A.TIME: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 11
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /CreationDate: D:20201019095731Z00'00'
  • /Creator: Word
  • /ModDate: D:20201019095731Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 817137
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
  • /CreationDate: D:20191009150752-04'00'
  • /ModDate: D:20191009150752-04'00'
  • pdf_file_size_bytes: 614353
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename RSA Archer 6.7_ST_v1.0_09-29-2020.pdf st_vid11005-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 16
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 6
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR: 9
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
  • FCS:
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS: 3
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 5
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 5
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 2
    • FMT_REV: 3
    • FMT_REV.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_TAB: 3
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE: 3
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP.1: 20
    • FCS_COP.1.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.2: 4
    • FCS_RBG_EXT.2.1: 1
    • FCS_RBG_EXT.2.2: 1
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 2
    • FCS_TLSC_EXT: 1
    • FCS_TLSC_EXT.1: 7
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.4: 5
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSS_EXT.1: 1
    • FCS_TLSS_EXT.1.1: 3
  • FDP:
    • FDP_DAR_EXT.1: 8
    • FDP_DAR_EXT.1.1: 1
    • FDP_DEC_EXT.1: 6
    • FDP_DEC_EXT.1.1: 1
    • FDP_DEC_EXT.1.2: 1
    • FDP_NET: 1
    • FDP_NET_EXT.1: 4
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 6
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 2
    • FMT_MEC_EXT.1: 7
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
  • FPR:
    • FPR_ANO_EXT.1: 6
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 6
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 6
    • FPT_API_EXT.1.1: 1
    • FPT_IDV_EXT.1: 2
    • FPT_LIB_EXT.1: 6
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 2
    • FPT_TUD_EXT.1.6: 1
  • FTP:
    • FTP_DIT_EXT.1: 6
    • FTP_DIT_EXT.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CRYPTO: 3
    • A.MANAGE: 2
    • A.PROTECT: 2
    • A.SECURE_COMMS: 3
    • A.TIME: 2
  • O:
    • O.ACCESS_CONTROL: 4
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.I_AND_A: 3
    • O.LOGON_BANNER: 4
    • O.PASSWORD_CONTROLS: 3
    • O.SECURITY_MANAGEMENT: 4
    • O.SESSION_LIMITATION: 3
    • O.SESSION_TERMINATION: 4
    • O.THROTTLE: 3
  • OE:
    • OE.CRYPTO: 3
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
    • OE.SECURE_COMMS: 2
    • OE.TIME: 3
  • T:
    • T.BRUTE_FORCE: 3
    • T.DATA_COMPROMISE: 2
    • T.INAPPROPRIATE_USE: 2
    • T.INAPPRORIATE_USE: 1
    • T.NO_ACCOUNTABILITY: 2
    • T.UNATTENDED_SESSION: 3
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACTIVITY: 3
  • A:
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
  • O:
    • O.B: 1
    • O.INTEGRITY: 3
    • O.MANAGEMENT: 5
    • O.PROTECTED_COMMS: 5
    • O.PROTECTED_STORAGE: 3
    • O.QUALITY: 5
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 5
    • T.NETWORK_EAVESDROP: 4
    • T.PHYSICAL_ACCESS: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 13
  • Microsoft:
    • Microsoft: 7
    • Microsoft Corporation: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DHE: 1
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-384: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 6
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 79
      • TLS 1.2: 1
      • TLS v1.2: 7
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 12
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • FIPS:
    • FIPS PUB 186-4: 4
    • FIPS8: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-57: 1
  • RFC:
    • RFC 5246: 2
    • RFC 5280: 5
    • RFC 5289: 8
    • RFC 5759: 1
    • RFC 6125: 2
    • RFC5280: 1
    • RFC5759: 1
  • X509:
    • X.509: 5
pdf_data/st_metadata
  • /CreationDate: D:20201019095805Z00'00'
  • /Creator: Word
  • /ModDate: D:20201019095805Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 765259
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different