name |
Acronis Cyber Backup 12.5 SCS Hardened Edition Server v12.5 |
imagio Security Card Type 9 (Japanese name), DataOverwriteSecurity Unit Type I (English name) Version: 1.02m |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
27.08.2022 |
01.09.2019 |
not_valid_before |
27.08.2020 |
29.11.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11071-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11071-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0417_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11071-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0417_est.pdf |
manufacturer |
Acronis SCS |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.acronisscs.com |
https://www.ricoh.com/ |
security_level |
{} |
EAL3 |
dgst |
1f3933644970d3fa |
221bca7fbf6eb6af |
heuristics/cert_id |
CCEVS-VR-VID-11071-2020 |
JISEC-CC-CRP-C0417 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
cpe:2.3:a:acronis:cyber_backup:12.5:-:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2020-16171 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
12.5 |
1.02 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Application Software
- certification_date: 27.08.2020
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 27.08.2022
- id: CCEVS-VR-VID11071
- product: Acronis Cyber Backup 12.5 SCS Hardened Edition Server v12.5
- scheme: US
- url: https://www.niap-ccevs.org/product/11071
- vendor: Acronis SCS
|
- cert_id: JISEC-CC-CRP-C0417
- certification_date: 01.11.2013
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0417_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; - RICOH MP C3503 - RICOH MP C3003 - Ricoh MP C3003 - Ricoh MP C3003G - Ricoh MP C3503 - Ricoh MP C3503G - Savin MP C3003 - Savin MP C3003G - Savin MP C3503 - Savin MP C3503G - Lanier MP C3003 - Lanier MP C3003G - Lanier MP C3503 - Lanier MP C3503G - nashuatec MP C3003 - nashuatec MP C3503 - Rex-Rotary MP C3003 - Rex-Rotary MP C3503 - Gestetner MP C3003 - Gestetner MP C3503 - infotec MP C3003 - infotec MP C3503 TOE security functionality Same as above.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: imagio Security Card Type 9 (Japanese name) DataOverwriteSecurity Unit Type I (English name)
- product_type: Software to overwrite data
- report_link: https://www.ipa.go.jp/en/security/c0417_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0417_est.pdf
- toe_version: 1.02m
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.12.2018
- revalidations: [frozendict({'date': '2015-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0417_it3459_05.html'})]
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: imagio Security Card Type 91.02m
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0417_it3459.html
- toe_overseas_name: DataOverwriteSecurity Unit Type I1.02m
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, a1cc4a4e079f4d1f |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
{} |
pdf_data/cert_filename |
st_vid11071-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11071-2020: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20200831143455-04'00'
- /ModDate: D:20200831143455-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181889
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11071-vr.pdf |
c0417_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11071-2020
- cert_item: for Acronis Cyber Backup 12.5 SCS Hardened Edition Server v12.5
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11071-2020: 1
|
- JP:
- CRP-C0417-01: 1
- Certification No. C0417: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_RBG_EXT.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSS_EXT.1.1: 1
- FMT:
- FPT:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IPsec:
- TLS:
- TLS:
- TLS: 17
- TLS 1.2: 1
- TLS v1.2: 1
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20140204162732+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140204162753+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 173623
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
st_vid11071-st.pdf |
c0417_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.1: 6
- FCS_CKM_EXT.1.1: 1
- FCS_COP.1: 24
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.2: 6
- FCS_RBG_EXT.2.1: 1
- FCS_RBG_EXT.2.2: 1
- FCS_STO_EXT.1: 9
- FCS_STO_EXT.1.1: 1
- FCS_TLSS_EXT.1: 8
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.4: 5
- FCS_TLSS_EXT.4.1: 1
- FCS_TLSS_EXT.4.2: 1
- FCS_TLS_EXT.1: 5
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_DAR_EXT.1: 6
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT.1: 6
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 1
- FDP_NET: 1
- FDP_NET_EXT.1: 5
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT.1: 6
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 1
- FMT_MEC_EXT.1: 6
- FMT_MEC_EXT.1.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FPR:
- FPR_ANO_EXT.1: 6
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT.1: 6
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 1
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT.1: 6
- FPT_API_EXT.1.1: 1
- FPT_API_EXT.2: 1
- FPT_IDV_EXT.1: 6
- FPT_IDV_EXT.1.1: 1
- FPT_LIB_EXT.1: 6
- FPT_LIB_EXT.1.1: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 1
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTP:
- FTP_DIT_EXT.1: 6
- FTP_DIT_EXT.1.1: 1
|
- FDP:
- FDP_RIP: 5
- FDP_RIP.1.1: 1
- FDP_SIP: 1
- FDP_SIP.1: 15
- FDP_SIP.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- O.QUALITY: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- TLS:
- SSL:
- SSL: 2
- SSL 2.0: 1
- SSL 3.0: 2
- TLS:
- TLS: 54
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 1
- TLS v1.2: 9
- TLSv1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 2
- P-384: 2
- P-521: 2
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186-4: 3
- FIPS19: 1
- NIST:
- NIST SP 800-57: 1
- NIST SP 800-57A: 1
- SP 800-90A: 1
- RFC:
- RFC 2818: 2
- RFC 5246: 1
- RFC 5288: 2
- RFC 5289: 4
- RFC 5746: 2
- RFC 8017: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Corsec Security, Inc.
- /CreationDate: D:20200819165740-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20200819165740-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: <TOE Name>
- /Title: Security Target
- pdf_file_size_bytes: 780507
- pdf_hyperlinks: http://www.corsec.com/, https://www.niap-ccevs.org/MMO/PP/-439-/#ajq_56, http://www.acronisscs.com/, mailto:[email protected], https://www.niap-ccevs.org/MMO/PP/-429-/#FPT_TUD_EXT.2.1, https://www.niap-ccevs.org/MMO/PP/-439-/#FCS_TLSS_EXT.4.2, https://www.niap-ccevs.org/MMO/PP/-429-/#FPT_TUD_EXT.2.2, https://www.niap-ccevs.org/MMO/PP/-439-/#FCS_TLS_EXT.1.1, https://github.com/acronisscs/public_disclosure, mailto:[email protected], https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=31780, https://www.niap-ccevs.org/MMO/PP/-439-/#ajq_189, https://localhost:9877/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author:
- /CreationDate: D:20140131135801+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20140131135802+09'00'
- /Producer: GPL Ghostscript 9.06; modified using iText® 5.3.2 ©2000-2012 1T3XT BVBA (AGPL-version)
- /Subject:
- /Title:
- pdf_file_size_bytes: 153617
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |