name |
HP 3PAR StoreServ Storage Systems Version 3.2.1 MU3 |
FUJIFILM Apeos C5240 modelwith Copy, Print, Fax, Scan and Overwrite StorageController ROM Ver. 1.0.7 |
category |
Network and Network-Related Devices and Systems |
Multi-Function Devices |
scheme |
CA |
JP |
status |
archived |
active |
not_valid_after |
07.12.2020 |
01.07.2027 |
not_valid_before |
07.12.2015 |
01.07.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-341%20CT%20v1.0e.docx |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0745_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-341%20CR%20v1.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0745_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-341%20HP_3PAR_StoreServ_ST_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0745_est.pdf |
manufacturer |
Hewlett-Packard Ltd. |
FUJIFILM Business Innovation Corp. |
manufacturer_web |
https://www.hp.com |
https://www.fujifilm.com/fb/eng |
security_level |
EAL2+, ALC_FLR.2 |
{} |
dgst |
1def098ef01f7473 |
bf8ac457f4be0040 |
heuristics/cert_id |
383-4-341 |
JISEC-CC-CRP-C0745-01-2022 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
cpe:2.3:h:hp:3par_storeserv:-:*:*:*:*:*:*:* |
cpe:2.3:h:fujifilm:apeos_c5240:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ALC_CMC.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
3.2.1 |
1.0.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0745
- certification_date: 01.06.2022
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0745
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000f20-att/c0745_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax, document storage and retrieval. The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: Identification and Authentication Access Control Data Encryption Trusted Communications Security Management Security Auditing Trusted Operation PSTN Fax-Network Separation Overwrite Storage
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: FUJIFILM Apeos C5240 model with Copy, Print, Fax, Scan and Overwrite Storage
- product_type: Multi-Function Device
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000f20-att/c0745_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000f20-att/c0745_est.pdf
- toe_version: Controller ROM Ver. 1.0.7
- vendor: FUJIFILM Business Innovation Corp.
- expiration_date:
- supplier: FUJIFILM Business Innovation Corp.
- toe_japan_name: FUJIFILM Apeos C5240 modelwith Copy, Print, Fax, Scan and Overwrite StorageController ROM Ver. 1.0.7
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0745_it1789.html
- toe_overseas_name: FUJIFILM Apeos C5240 model with Copy, Print, Fax, Scan and Overwrite StorageController ROM Ver. 1.0.7
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b2cfec7a92fa2940 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename |
383-4-341 CT v1.0e.docx |
c0745_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0745-01-2022: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20220705120322+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20220705120422+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 89993
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
383-4-341 CR v1.0e.pdf |
c0745_erpt.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-341-CR
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0745-01-2022: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL 2+: 2
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FPT:
- FPT_APW_EXT.1: 1
- FPT_TST_EXT.1: 1
|
- FCS:
- FCS_RBG_EXT.1: 1
- FCS_TLS_EXT.1.1: 1
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 197: 1
- ISO:
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: White, Debra E.
- /CreationDate: D:20151223135714-05'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151223135714-05'00'
- /Producer: Microsoft® Word 2010
- /Title: 383-4-XXX CR vxe
- pdf_file_size_bytes: 229454
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /CreationDate: D:20220629170138+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20220629170219+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 367160
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
383-4-341 HP_3PAR_StoreServ_ST_pdf.pdf |
c0745_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 4
- EAL2: 1
- EAL2 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 7
- ADV_TDS: 1
- ADV_TDS.1: 6
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 5
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR: 9
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG: 6
- FAU_STG.1: 5
- FAU_STG.1.1: 2
- FAU_STG.1.2: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP.1: 16
- FCS_COP.1.1: 16
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 3
- FDP_ACC.2: 9
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_AVL_EXT: 4
- FDP_AVL_EXT.1: 7
- FDP_IFC.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 9
- FIA_ATD.1.1: 6
- FIA_UAU: 9
- FIA_UAU.1: 7
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.5: 5
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID: 3
- FIA_UID.1: 1
- FIA_UID.2: 9
- FIA_UID.2.1: 2
- FMT:
- FMT_MSA: 6
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 3
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 4
- FMT_SMR.2: 6
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 8
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS: 3
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FRU:
- FRU_FLT: 3
- FRU_FLT.1: 6
- FRU_FLT.1.1: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 13
- FAU_GEN.1: 24
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 15
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 29
- FCS_CKM.1.1: 2
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 22
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 85
- FCS_COP.1.1: 8
- FCS_KDF_EXT.1: 5
- FCS_KYC_EXT: 1
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 5
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 15
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 1
- FDP_DSK_EXT.1: 6
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 1
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 3
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 1
- FPT_KYP_EXT.1: 7
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 7
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.HOST_IDENTITY: 2
- A.PHYSICAL: 2
- A.PHYSICAL_CLIENT_HOSTS: 2
- A.PHYSICAL_MANAGEABILITY: 2
- A.TRUSTED_ADMIN: 3
- O:
- O.ACCESS_CONTROL_DATA: 2
- O.ACCESS_CONTROL_MANAGEABILITY: 4
- O.ACESS_CONTROL_DATA: 1
- O.ACESS_CONTROL_MANAGEABILITY: 1
- O.AVAILABILITY: 5
- O.FAIL_SECURE: 3
- O.PROTECTED_COMMUNICATIONS: 5
- O.RESIDUAL_INFORMATION_CLEARING: 3
- O.SELF_TEST: 1
- O.SYSTEM_MONITORING: 5
- O.TOE_ADMINISTRATION: 3
- O.TSF_SEFL_TEST: 2
- O.TSF_SELF_TEST: 2
- OE:
- OE.PHYSICAL_CLIENT_HOSTS: 2
- OE.PHYSICAL_MANAGEABILITY: 2
- OE.TRUSTED_ADMIN: 2
- T:
- T.ADMIN_ERROR: 3
- T.DATA_AVAILABILITY: 2
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS_C: 1
- T.UNAUTHORIZED_ACCESS_CODE: 2
- T.UNAUTHORIZED_ACCESS_TSF_DATA: 2
- T.UNAUTHORIZED_ACCESS_U: 1
- T.UNAUTHORIZED_ACCESS_USER_DATA: 2
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 2
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 9
- O.COMMS: 1
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE: 1
- O.UPDATE_VERIFICATION: 1
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAININ: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROT: 1
- OE.PHYSICAL_PROTE: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_A: 1
- T.UNAUTHORIZED_U: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 4
- SHA-512: 3
- SHA256: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 70
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 3
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 12
- FIPS PUB 186-2: 2
- FIPS PUB 186-3: 1
- FIPS PUB 197: 2
- NIST:
- RFC:
|
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 7
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 4
- ISO/IEC18031:2011: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-90A: 2
- RFC:
- RFC 2246: 2
- RFC 2818: 3
- RFC 4346: 2
- RFC 5246: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- provide an operating environment for optional software features. All controller-hosted software is out of scope for this evaluation. 6 The iSCSI ports are dedicated Gb Ethernet ports distinct from management: 1
|
|
pdf_data/st_metadata |
- /Author: <<author>>
- /CreationDate: D:20151208084526-05'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151208084526-05'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: Hewlett-Packard StoreServ Storage Systems Security Target
- pdf_file_size_bytes: 1169902
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |