This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
DiskCrypt M10 (Enterprise) Version M321P32J1E1 CSA_CC_19002 |
IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3 CCEVS-VR-VID-10438-2010 |
|
---|---|---|
name | DiskCrypt M10 (Enterprise) Version M321P32J1E1 | IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3 |
category | Data Protection | Detection Devices and Systems |
scheme | SG | US |
status | active | archived |
not_valid_after | 01.02.2026 | 01.11.2014 |
not_valid_before | 01.02.2021 | 01.12.2010 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/DiskCrypt%20M10%20(Enterprise)%20Certificate.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/DiskCrypt%20M10%20(Enterprise)%20Certification%20Report%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10438-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/STEE-InfoSec%20Security%20Target%20DiskCrypt%20M10%20(Enterprise)%20v1.0%2017Feb2020.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10438-st.pdf |
manufacturer | ST Engineering Electronics | Cisco Systems, Inc. |
manufacturer_web | https://www.stengg.com | https://www.cisco.com |
security_level | EAL2 | EAL2+, ALC_FLR.2 |
dgst | 207a919f2a0731ec | 8000ecd5144388da |
heuristics/cert_id | CSA_CC_19002 | CCEVS-VR-VID-10438-2010 |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | {} | cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch6:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.1:hot_patch2:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.3.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.1:build47:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.3.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:-:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5-102:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch5:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.3.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:7.1.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.2:hot_patch2:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:7.1.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.1:build101:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:7.3.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch4:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.2:-:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.2:hot_patch:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2020-3181, CVE-2016-6356, CVE-2020-3134, CVE-2020-3137, CVE-2019-1983, CVE-2020-3132, CVE-2020-3370, CVE-2022-20960, CVE-2019-12706, CVE-2022-20664, CVE-2020-3447, CVE-2019-15971, CVE-2019-15988, CVE-2020-3568, CVE-2022-20653, CVE-2020-3367, CVE-2021-1566, CVE-2014-3381, CVE-2023-20009, CVE-2022-20798, CVE-2020-3164, CVE-2020-3133 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ALC_CMC.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions | - | 7.1, 7.3 |
heuristics/scheme_data |
|
|
pdf_data/cert_filename | DiskCrypt M10 (Enterprise) Certificate.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | DiskCrypt M10 (Enterprise) Certification Report v1.0.pdf | st_vid10438-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | STEE-InfoSec Security Target DiskCrypt M10 (Enterprise) v1.0 17Feb2020.pdf | st_vid10438-st.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |