Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
secunet SBC Container Version 5.2
BSI-DSZ-CC-1089-V3-2024
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258)
ANSSI-CC-2023/18
name secunet SBC Container Version 5.2 Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258)
category Network and Network-Related Devices and Systems Mobility
scheme DE FR
not_valid_after 25.06.2029 27.03.2028
not_valid_before 26.06.2024 27.03.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_18.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_18fr-2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_18en.pdf
manufacturer Secunet Security Networks AG Apple Inc.
manufacturer_web https://www.secunet.com/en/ https://www.apple.com/
security_level ASE_TSS.2, ALC_FLR.2, AVA_VAN.5, EAL4+ EAL2+, ADV_FSP.3, ALC_FLR.3
dgst 1fbbc802399645af e70bd18f9606a20a
heuristics/cert_id BSI-DSZ-CC-1089-V3-2024 ANSSI-CC-2023/18
heuristics/cert_lab BSI []
heuristics/cpe_matches {} cpe:2.3:o:apple:iphone_os:15.4.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-27791, CVE-2022-32927, CVE-2024-27801, CVE-2022-32847, CVE-2023-32416, CVE-2024-23215, CVE-2023-41073, CVE-2023-40400, CVE-2022-32849, CVE-2024-54542, CVE-2023-23523, CVE-2022-32816, CVE-2024-44254, CVE-2024-27796, CVE-2024-23226, CVE-2023-32390, CVE-2024-40863, CVE-2023-42836, CVE-2024-40850, CVE-2022-46690, CVE-2023-35993, CVE-2023-23540, CVE-2024-40784, CVE-2023-41982, CVE-2023-42870, CVE-2023-41074, CVE-2024-27821, CVE-2025-24127, CVE-2024-54514, CVE-2022-43454, CVE-2022-42840, CVE-2022-32948, CVE-2024-23296, CVE-2024-54551, CVE-2022-32833, CVE-2025-24113, CVE-2024-27808, CVE-2023-42941, CVE-2025-24117, CVE-2024-54470, CVE-2024-40822, CVE-2025-24200, CVE-2022-32821, CVE-2024-44179, CVE-2024-44198, CVE-2024-44201, CVE-2024-27871, CVE-2023-27929, CVE-2025-24177, CVE-2024-54530, CVE-2022-32894, CVE-2023-42890, CVE-2022-46716, CVE-2024-27830, CVE-2022-32802, CVE-2023-40384, CVE-2024-23293, CVE-2022-42830, CVE-2024-44297, CVE-2023-42946, CVE-2024-27851, CVE-2024-40774, CVE-2025-30463, CVE-2023-40441, CVE-2023-42869, CVE-2023-42947, CVE-2023-34425, CVE-2022-32935, CVE-2024-4558, CVE-2022-32917, CVE-2025-24137, CVE-2024-27826, CVE-2023-28826, CVE-2024-44240, CVE-2023-32361, CVE-2023-41254, CVE-2024-40818, CVE-2023-32357, CVE-2023-23529, CVE-2022-32938, CVE-2022-42846, CVE-2024-44131, CVE-2022-32899, CVE-2024-44233, CVE-2023-38605, CVE-2024-44218, CVE-2022-32879, CVE-2024-23289, CVE-2022-32817, CVE-2025-24201, CVE-2023-27942, CVE-2023-38606, CVE-2023-45866, CVE-2024-40779, CVE-2024-27803, CVE-2024-54523, CVE-2022-32943, CVE-2023-42962, CVE-2024-23262, CVE-2024-40788, CVE-2022-42792, CVE-2022-32908, CVE-2022-26700, CVE-2022-1622, CVE-2024-54494, CVE-2022-42842, CVE-2024-23231, CVE-2022-42811, CVE-2022-32913, CVE-2023-42919, CVE-2022-32949, CVE-2023-32381, CVE-2024-44206, CVE-2024-54538, CVE-2023-40520, CVE-2023-41063, CVE-2023-38133, CVE-2023-32396, CVE-2022-46718, CVE-2025-30456, CVE-2023-32394, CVE-2022-32785, CVE-2023-28194, CVE-2023-23524, CVE-2022-32810, CVE-2024-40796, CVE-2024-54560, CVE-2024-27820, CVE-2022-32872, CVE-2022-32819, CVE-2023-32354, CVE-2024-23263, CVE-2023-23525, CVE-2023-23514, CVE-2023-32367, CVE-2023-40429, CVE-2024-44273, CVE-2022-42867, CVE-2023-41976, CVE-2022-42856, CVE-2024-23235, CVE-2024-54503, CVE-2024-23280, CVE-2023-23512, CVE-2022-32945, CVE-2023-27946, CVE-2022-42850, CVE-2023-23531, CVE-2023-40412, CVE-2022-42861, CVE-2023-38410, CVE-2023-42878, CVE-2022-32857, CVE-2025-24154, CVE-2023-23520, CVE-2025-24161, CVE-2024-40826, CVE-2024-23287, CVE-2024-54564, CVE-2023-27954, CVE-2024-44200, CVE-2024-54486, CVE-2023-27955, CVE-2022-46709, CVE-2022-46720, CVE-2023-41064, CVE-2024-27804, CVE-2024-54522, CVE-2023-23517, CVE-2024-40812, CVE-2024-54492, CVE-2023-32437, CVE-2023-27940, CVE-2023-32365, CVE-2024-54508, CVE-2023-41968, CVE-2022-42805, CVE-2022-42851, CVE-2023-23541, CVE-2023-23543, CVE-2023-23496, CVE-2024-27879, CVE-2022-42793, CVE-2024-44212, CVE-2024-44229, CVE-2022-42863, CVE-2023-38572, CVE-2024-23210, CVE-2023-28202, CVE-2023-40528, CVE-2022-37434, CVE-2024-40830, CVE-2022-42826, CVE-2023-42834, CVE-2024-44167, CVE-2022-32844, CVE-2023-40408, CVE-2025-24129, CVE-2022-42855, CVE-2024-27819, CVE-2024-0258, CVE-2024-40782, CVE-2024-44251, CVE-2023-38261, CVE-2024-27863, CVE-2022-32911, CVE-2022-23308, CVE-2022-32886, CVE-2023-40413, CVE-2022-46693, CVE-2024-44204, CVE-2022-48618, CVE-2022-32813, CVE-2023-41992, CVE-2022-32839, CVE-2022-26738, CVE-2022-32838, CVE-2022-32883, CVE-2023-42848, CVE-2023-23532, CVE-2023-37285, CVE-2024-54534, CVE-2025-24160, CVE-2023-41983, CVE-2023-32433, CVE-2024-27805, CVE-2023-28198, CVE-2023-40439, CVE-2023-42950, CVE-2022-26744, CVE-2022-32918, CVE-2023-28181, CVE-2024-27834, CVE-2024-23201, CVE-2023-32407, CVE-2024-54488, CVE-2022-32827, CVE-2025-24178, CVE-2024-40853, CVE-2024-44276, CVE-2022-32828, CVE-2024-23257, CVE-2024-44269, CVE-2022-42817, CVE-2023-40414, CVE-2024-44127, CVE-2023-32734, CVE-2024-23297, CVE-2023-41990, CVE-2024-27840, CVE-2023-39434, CVE-2024-44235, CVE-2024-40835, CVE-2024-23255, CVE-2022-42803, CVE-2024-27850, CVE-2025-31183, CVE-2023-42974, CVE-2022-46689, CVE-2022-32825, CVE-2022-46696, CVE-2023-41070, CVE-2024-44244, CVE-2022-26740, CVE-2023-42884, CVE-2024-23290, CVE-2023-32423, CVE-2023-32366, CVE-2022-46694, CVE-2023-23503, CVE-2023-23494, CVE-2022-32790, CVE-2022-32919, CVE-2023-40447, CVE-2023-32434, CVE-2024-54479, CVE-2022-26739, CVE-2024-54517, CVE-2024-27811, CVE-2024-54499, CVE-2024-23288, CVE-2024-44261, CVE-2023-38603, CVE-2023-42953, CVE-2022-26765, CVE-2022-40304, CVE-2024-23246, CVE-2022-42823, CVE-2024-40794, CVE-2023-42841, CVE-2023-42942, CVE-2025-24167, CVE-2022-32909, CVE-2024-23225, CVE-2025-24086, CVE-2024-23205, CVE-2022-32925, CVE-2024-44170, CVE-2024-54497, CVE-2022-26701, CVE-2022-48610, CVE-2022-26981, CVE-2023-40443, CVE-2022-32865, CVE-2022-26760, CVE-2024-23208, CVE-2024-27815, CVE-2024-40839, CVE-2022-40303, CVE-2023-27956, CVE-2023-38580, CVE-2024-27799, CVE-2024-23220, CVE-2022-42813, CVE-2023-27932, CVE-2022-42790, CVE-2022-32824, CVE-2024-40854, CVE-2023-32389, CVE-2022-22677, CVE-2022-42843, CVE-2022-32922, CVE-2022-42827, CVE-2022-26709, CVE-2024-44227, CVE-2024-44124, CVE-2023-27933, CVE-2024-27852, CVE-2022-42825, CVE-2023-41984, CVE-2022-32793, CVE-2024-44263, CVE-2022-42837, CVE-2022-32858, CVE-2024-27818, CVE-2022-46715, CVE-2023-36495, CVE-2024-40785, CVE-2024-44164, CVE-2024-44282, CVE-2022-42808, CVE-2025-31191, CVE-2024-44123, CVE-2023-42922, CVE-2023-32388, CVE-2022-32854, CVE-2022-32788, CVE-2022-32823, CVE-2024-27806, CVE-2023-40394, CVE-2023-27961, CVE-2023-32400, CVE-2024-44155, CVE-2024-23217, CVE-2025-24126, CVE-2024-23270, CVE-2024-27832, CVE-2022-26764, CVE-2024-27845, CVE-2024-23250, CVE-2023-32384, CVE-2023-32424, CVE-2023-38599, CVE-2023-27969, CVE-2022-46691, CVE-2023-32410, CVE-2023-41075, CVE-2022-26736, CVE-2022-32924, CVE-2024-40852, CVE-2023-42949, CVE-2024-23286, CVE-2024-54510, CVE-2023-40385, CVE-2022-42865, CVE-2023-41232, CVE-2022-32929, CVE-2022-32946, CVE-2025-24145, CVE-2022-32837, CVE-2023-41997, CVE-2023-28191, CVE-2022-46717, CVE-2022-32939, CVE-2024-54558, CVE-2023-32413, CVE-2023-42916, CVE-2022-32926, CVE-2023-38600, CVE-2023-27941, CVE-2024-44239, CVE-2025-24163, CVE-2024-44180, CVE-2024-44234, CVE-2022-42829, CVE-2023-23537, CVE-2023-40449, CVE-2024-40867, CVE-2023-23536, CVE-2023-28204, CVE-2023-40420, CVE-2023-42871, CVE-2023-42865, CVE-2023-38425, CVE-2024-23273, CVE-2023-28206, CVE-2022-32928, CVE-2024-44258, CVE-2023-38590, CVE-2024-40809, CVE-2023-41974, CVE-2023-32371, CVE-2024-23241, CVE-2022-26702, CVE-2022-32914, CVE-2022-32903, CVE-2025-24085, CVE-2022-46699, CVE-2023-32397, CVE-2023-40398, CVE-2022-42798, CVE-2024-23264, CVE-2023-41993, CVE-2023-23530, CVE-2024-44252, CVE-2024-44277, CVE-2023-40391, CVE-2022-46705, CVE-2024-44232, CVE-2023-40416, CVE-2023-37450, CVE-2025-30467, CVE-2024-54502, CVE-2023-42833, CVE-2022-32941, CVE-2022-32867, CVE-2022-42848, CVE-2022-42831, CVE-2024-40771, CVE-2022-26737, CVE-2023-23511, CVE-2022-32893, CVE-2024-44191, CVE-2022-32888, CVE-2023-35990, CVE-2022-26714, CVE-2024-27835, CVE-2022-32944, CVE-2023-40409, CVE-2022-32832, CVE-2024-23228, CVE-2024-40798, CVE-2023-42846, CVE-2024-40793, CVE-2024-23222, CVE-2023-32408, CVE-2024-27880, CVE-2023-42852, CVE-2022-32829, CVE-2024-27876, CVE-2024-40844, CVE-2023-41977, CVE-2024-44299, CVE-2023-27963, CVE-2022-26710, CVE-2023-42928, CVE-2023-40410, CVE-2024-44126, CVE-2023-40446, CVE-2023-40396, CVE-2022-32784, CVE-2023-35074, CVE-2024-27873, CVE-2022-32840, CVE-2023-40452, CVE-2024-23291, CVE-2024-44158, CVE-2023-41061, CVE-2023-34352, CVE-2024-23219, CVE-2024-40857, CVE-2022-32841, CVE-2023-38611, CVE-2025-24243, CVE-2024-54485, CVE-2022-32826, CVE-2023-32399, CVE-2022-32792, CVE-2023-40431, CVE-2022-46725, CVE-2022-42849, CVE-2023-40428, CVE-2023-32422, CVE-2023-42952, CVE-2023-41071, CVE-2022-32795, CVE-2024-54527, CVE-2023-41060, CVE-2023-23527, CVE-2024-27855, CVE-2024-27838, CVE-2024-44139, CVE-2024-40813, CVE-2023-42899, CVE-2023-23499, CVE-2023-42934, CVE-2023-32403, CVE-2023-23505, CVE-2023-28205, CVE-2023-40417, CVE-2024-40776, CVE-2023-42923, CVE-2024-44144, CVE-2023-40399, CVE-2023-42830, CVE-2022-46710, CVE-2023-42957, CVE-2024-54550, CVE-2023-23535, CVE-2022-42859, CVE-2024-27839, CVE-2024-23239, CVE-2022-42795, CVE-2023-28185, CVE-2025-24104, CVE-2025-24131, CVE-2024-40815, CVE-2023-23528, CVE-2023-28208, CVE-2023-42896, CVE-2023-38565, CVE-2024-44176, CVE-2022-32932, CVE-2024-27869, CVE-2023-32392, CVE-2024-44242, CVE-2023-40432, CVE-2024-44136, CVE-2023-27931, CVE-2022-22658, CVE-2022-46695, CVE-2022-32889, CVE-2022-42845, CVE-2023-38597, CVE-2024-27800, CVE-2024-27810, CVE-2023-40434, CVE-2022-42791, CVE-2022-26731, CVE-2022-32864, CVE-2023-23504, CVE-2023-42925, CVE-2022-46698, CVE-2023-28178, CVE-2023-32368, CVE-2024-54512, CVE-2023-40529, CVE-2023-32428, CVE-2022-42824, CVE-2024-23243, CVE-2024-27817, CVE-2024-54467, CVE-2023-32439, CVE-2023-42883, CVE-2022-3970, CVE-2022-46700, CVE-2024-54658, CVE-2024-40799, CVE-2022-42832, CVE-2024-27828, CVE-2023-32419, CVE-2023-42917, CVE-2024-27859, CVE-2022-46692, CVE-2023-42956, CVE-2023-32373, CVE-2023-42831, CVE-2023-23502, CVE-2023-27959, CVE-2023-42862, CVE-2023-41991, CVE-2024-44274, CVE-2023-32432, CVE-2023-32372, CVE-2024-27874, CVE-2023-41986, CVE-2023-41995, CVE-2023-27930, CVE-2023-27943, CVE-2023-27937, CVE-2024-23251, CVE-2022-26706, CVE-2024-44184, CVE-2024-44169, CVE-2024-54526, CVE-2024-23242, CVE-2022-26716, CVE-2024-23218, CVE-2023-38598, CVE-2022-42820, CVE-2022-32845, CVE-2024-54518, CVE-2022-48503, CVE-2022-32787, CVE-2022-26762, CVE-2023-42914, CVE-2023-42936, CVE-2023-42872, CVE-2023-40427, CVE-2023-40454, CVE-2023-32412, CVE-2024-44207, CVE-2023-41174, CVE-2024-40789, CVE-2024-23240, CVE-2024-44255, CVE-2022-42806, CVE-2024-44302, CVE-2023-42951, CVE-2024-27857, CVE-2023-42849, CVE-2022-32875, CVE-2023-32359, CVE-2024-44192, CVE-2022-42810, CVE-2023-40419, CVE-2023-38593, CVE-2022-32870, CVE-2022-42799, CVE-2023-27928, CVE-2024-27848, CVE-2023-32409, CVE-2022-42796, CVE-2024-23283, CVE-2024-54525, CVE-2022-32859, CVE-2023-32425, CVE-2022-32820, CVE-2024-44278, CVE-2024-54469, CVE-2024-40806, CVE-2023-40395, CVE-2023-40424, CVE-2023-28182, CVE-2023-23519, CVE-2022-42862, CVE-2023-23500, CVE-2025-24123, CVE-2022-32907, CVE-2023-32441, CVE-2023-23498, CVE-2023-41981, CVE-2023-38610, CVE-2024-40786, CVE-2025-31182, CVE-2023-32376, CVE-2024-44183, CVE-2024-40833, CVE-2022-26763, CVE-2023-41069, CVE-2024-44194, CVE-2024-40795, CVE-2024-40824, CVE-2023-40423, CVE-2024-23278, CVE-2022-42800, CVE-2024-40840, CVE-2023-35984, CVE-2022-26719, CVE-2024-23284, CVE-2023-42866, CVE-2024-27802, CVE-2022-32887, CVE-2024-44308, CVE-2022-32835, CVE-2024-23292, CVE-2025-24097, CVE-2024-23259, CVE-2024-27847, CVE-2023-32385, CVE-2023-42939, CVE-2024-44296, CVE-2023-40438, CVE-2024-54468, CVE-2022-32912, CVE-2024-44290, CVE-2023-32435, CVE-2025-30471, CVE-2024-23271, CVE-2022-26768, CVE-2024-23265, CVE-2022-26771, CVE-2022-26711, CVE-2025-24158, CVE-2023-42824, CVE-2024-44187, CVE-2022-32885, CVE-2024-44202, CVE-2023-41065, CVE-2022-32814, CVE-2022-32815, CVE-2022-26757, CVE-2023-42893, CVE-2025-24173, CVE-2023-32352, CVE-2022-32898, CVE-2023-32398, CVE-2023-32393, CVE-2024-27823, CVE-2022-42844, CVE-2023-40442, CVE-2023-27949, CVE-2022-32781, CVE-2024-54507, CVE-2025-30469, CVE-2023-42873, CVE-2023-38136, CVE-2022-26766, CVE-2025-24124, CVE-2024-54500, CVE-2023-38424, CVE-2024-27807, CVE-2024-27833, CVE-2024-27831, CVE-2024-27816, CVE-2024-44205, CVE-2022-32855, CVE-2022-42864, CVE-2022-46724, CVE-2024-27884, CVE-2023-42843, CVE-2024-44215, CVE-2021-36690, CVE-2023-27970, CVE-2022-32940, CVE-2023-32445, CVE-2025-24159, CVE-2023-41980, CVE-2023-23518, CVE-2022-32891, CVE-2024-44309, CVE-2024-54543, CVE-2023-42839, CVE-2024-54501, CVE-2023-38594, CVE-2022-42866, CVE-2024-27841, CVE-2025-24162, CVE-2024-40856, CVE-2023-40456, CVE-2024-23282, CVE-2023-40437, CVE-2022-26751, CVE-2023-38604, CVE-2024-54478, CVE-2022-42839, CVE-2025-30470, CVE-2024-44145, CVE-2025-24128, CVE-2022-2294, CVE-2024-44241, CVE-2024-40791, CVE-2022-32868, CVE-2023-32391, CVE-2023-32420, CVE-2023-40403, CVE-2024-54513, CVE-2024-1580, CVE-2024-40777, CVE-2023-42857, CVE-2024-40787, CVE-2022-26703, CVE-2023-42855, CVE-2024-40805, CVE-2023-40392, CVE-2024-44185, CVE-2022-26717, CVE-2024-40829, CVE-2025-24237, CVE-2024-44217, CVE-2024-40778, CVE-2023-28201, CVE-2024-44147, CVE-2024-23256, CVE-2024-54535, CVE-2023-38612, CVE-2023-38596, CVE-2022-32916, CVE-2022-32860, CVE-2022-32830, CVE-2023-23526, CVE-2024-44171, CVE-2025-24141, CVE-2024-54505, CVE-2023-41068, CVE-2024-44259, CVE-2023-27936, CVE-2024-54541, CVE-2024-40780, CVE-2024-27856, CVE-2022-42852, CVE-2024-27836, CVE-2025-24150, CVE-2022-32892, CVE-2025-24264, CVE-2024-23254, CVE-2023-38595, CVE-2022-32871, CVE-2024-44165, CVE-2022-32923, CVE-2023-40448, CVE-2022-46703, CVE-2025-24238, CVE-2024-40851, CVE-2023-42823, CVE-2025-24149, CVE-2024-27789, CVE-2025-24107, CVE-2024-40836, CVE-2023-28200, CVE-2022-32947, CVE-2023-32438, CVE-2024-23223
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 5.2 15.4.1
heuristics/report_references/directly_referencing BSI-DSZ-CC-1089-V2-2022 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1089-V2-2022, BSI-DSZ-CC-1089-2020 {}
heuristics/scheme_data
  • category: Network and Network related Devices and Systems
  • cert_id: BSI-DSZ-CC-1089-V3-2024
  • certification_date: 26.06.2024
  • enhanced:
    • applicant: secunet Security Networks AG Weidenauer Straße 223-225 57076 Siegen
    • assurance_level: EAL4+,AVA_VAN.5,ASE_TSS.2,ALC_FLR.2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 26.06.2024
    • description: The secunet SBC Container is a Session Border Controller Container, a Linux systemd-nspawn container which can be deployed on a Linux operating system. The main purpose of the secunet SBC Container is a secure bridging between an SIP caller and the SIP callee. Concretely, the SBC supports a safeguarded initiation of SIP sessions (also called signaling) and bridging of media communication streams such as RTP or SRTP. A Session Border Controller (SBC) is a device which is deployed in Voice-over-IP (VoIP) networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the intended operation in a secure manner.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1089-V3-2024 (26.06.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1089-V2-2022 (19.05.2022)', 'description': ') networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the in-tended operation in a secure manner.'}), frozendict({'id': 'BSI-DSZ-CC-1089-2020 (08.07.2020)', 'description': 'Certificate'})]
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • expiration_date: 25.06.2029
    • product: secunet SBC Container Version 5.2
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3b_pdf.pdf?__blob=publicationFile&v=2
  • product: secunet SBC Container Version 5.2
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1089.html
  • vendor: secunet Security Networks AG
pdf_data/cert_filename 1089V3c_pdf.pdf certificat-cc-2023_18.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1089-V3-2024: 1
  • FR:
    • ANSSI-CC-2023/18: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
  • /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
  • /Title: Certificate BSI-DSZ-CC-1089-V3-2024
  • pdf_file_size_bytes: 230700
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1089V3a_pdf.pdf anssi-cc-2023_18fr-2.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ASE_TSS.2, ALC_FLR.2 and AVA_VAN.5 valid until: 25 Month 2029 SOGIS Recognition Agreement for components up to EAL 4
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1089-V3-2024
    • cert_item: secunet SBC Container, Version 5.2
    • cert_lab: BSI
    • developer: secunet Security Networks AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • FR:
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1089-V2-2022: 2
    • BSI-DSZ-CC-1089-V3-2024: 13
  • FR:
    • ANSSI-CC-2023/18: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 2
    • EAL 5+: 1
    • EAL 6: 1
  • EAL:
    • EAL2: 3
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 5
  • ASE:
    • ASE_TSS.2: 5
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/report_keywords/crypto_protocol
  • PGP:
    • PGP: 2
  • SSH:
    • SSH: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 1.4, 25.04.2024, file name: SBC_TAT_CMS, Frafos GmbH (confidential document) [9] Secunet SBC container – User Guidance, Frafos GmbH, 28.05.2024, v3.6, file name: SBC – AGD v3: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • secunet SBC Container, Version 2.1, Date 31.05.2024, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE as part of Tools and Techniques / Configuration, secunet SBC: 1
pdf_data/report_metadata
pdf_data/st_filename 1089V3b_pdf.pdf anssi-cible-cc-2023_18en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1089: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 11
    • EAL4 augmented: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 3
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR: 1
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 1
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 4
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF: 13
    • FMT_SMF.1: 7
    • FMT_SMR: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FDP:
    • FDP_ACC: 23
    • FDP_ACC.1: 11
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 19
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 8
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 9
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 15
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 10
    • FDP_SDI.1.1: 1
    • FDP_UCT: 9
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 14
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.LDAP: 4
  • A:
    • A.CDCVM: 3
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.WATCH_USER: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • OT:
    • OT.-: 1
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 14
  • TLS:
    • TLS:
      • TLS: 6
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • ted to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
pdf_data/st_metadata
  • /Author: SRC
  • pdf_file_size_bytes: 914085
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different