name |
bizhub 500 / bizhub 420 / bizhub 360 /ineo 500 / ineo 420 / ineo 360 Control Software 50GA-0100-G00-30-000 |
IBM AIX 7.2.5, Service Pack 3 (SP3) Standard Edition (SE) |
category |
Multi-Function Devices |
Operating Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
28.12.2010 |
07.07.2027 |
not_valid_before |
27.04.2007 |
08.07.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1165c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0094_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1165a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0094_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1165b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
IBM Corporation |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.ibm.com |
security_level |
EAL3 |
ASE_SPD.1, ATE_IND.1, ALC_CMS.1, ASE_INT.1, ALC_TSU_EXT.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, AGD_PRE.1, AVA_VAN.1 |
dgst |
209eac708b383bf5 |
bf493412d5058337 |
heuristics/cert_id |
JISEC-CC-CRP-C0094 |
BSI-DSZ-CC-1165-2022 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
500, 000, 0100, 30, 420, 360 |
7.2.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0094
- certification_date: 01.04.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0094_eimg.pdf
- description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub 500 / bizhub 420 / bizhub 360 /ineo 500 / ineo 420 / ineo 360) (Hereinafter referred to as "MFP") . This software is on the flash memory on the MFP controller carried in MFP, and this controls the whole operation of MFP such as the operation control processing and the image data management received from the panel of MFP body or the network. This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover, this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: bizhub 500 / bizhub 420 / bizhub 360 /ineo 500 /ineo 420 / ineo 360 Control Software
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0094_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0094_est.pdf
- toe_version: 50GA-0100-G00-30-000
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 500 / bizhub 420 / bizhub 360 /ineo 500 / ineo 420 / ineo 360 Control Software 50GA-0100-G00-30-000
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0094_it7127.html
- toe_overseas_name: bizhub 500 / bizhub 420 / bizhub 360 /ineo 500 / ineo 420 / ineo 360 Control Software 50GA-0100-G00-30-000
|
- category: Operating systems
- cert_id: BSI-DSZ-CC-1165-2022
- certification_date: 08.07.2022
- enhanced:
- applicant: IBM Corporation 11400 Burnet Road Austin, TX 78758 USA
- assurance_level: ADV_FSP.1,AGD_OPE.1,AGD_PRE.1,ALC_CMC.1,ALC_CMS.1,ALC_TSU_EXT.1,ASE_CCL.1,ASE_ECD.1,ASE_INT.1,ASE_OBJ.2,ASE_REQ.2,ASE_SPD.1,ASE_TSS.1,ATE_IND.1,AVA_VAN.1
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1165c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 08.07.2022
- description: The AIX operating system is a general purpose, multi-user, multi-tasking operating system. It is compliant with major international standards for UNIX systems, such as the Portable Operating System Interface (POSIX) standards, X/Open Portability Guide (XPG) 4, and Spec 1170. It provides a platform for a variety of applications in the governmental and commercial environment. AIX is available on a broad range of computer systems from IBM, ranging from departmental Servers to multi-processor enterprise servers, and is capable of running in a Logical Partition (LPAR) environment.
- evaluation_facility: atsec information security GmbH
- expiration_date: 07.07.2027
- product: IBM AIX 7.2.5, Service Pack 3 (SP3) Standard Edition (SE)
- protection_profile: Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR-PP-0047, NIAP Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039, NIAP
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1165a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1165b_pdf.pdf?__blob=publicationFile&v=3
- product: IBM AIX 7.2.5, Service Pack 3 (SP3) Standard Edition (SE)
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1165.html
- vendor: IBM Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
1165c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_FLR: 1
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220718070622+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM Corporation, IBM AIX 7.2.5, Certification Report, BSI-DSZ-CC-1165-2022"
- /ModDate: D:20220719073246+02'00'
- /Producer: LibreOffice 6.3
- /Subject: IBM Corporation, IBM AIX 7.2.5,
- /Title: Certification Report BSI-DSZ-CC-1165-2022
- pdf_file_size_bytes: 366167
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0094_erpt.pdf |
1165a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 extended ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1165-2022
- cert_item: IBM AIX 7.2.5 Service Pack 3 (SP3) Standard Edition (SE
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR- PP-0047, NIAP, Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039, NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0094-01: 1
- Certification No. C0094: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 3
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_FLR: 3
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVER: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS: 1
- T.ACCESS-NET: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC: 1
- T.ACCESS-SECURE-PRINT: 1
- T.BACKUP: 1
- T.BRING-OUT: 1
- T.DISCARD-MFP: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 7
- HMAC-SHA-256: 3
- HMAC-SHA-512: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 9
- SHA-256: 3
- SHA-384: 1
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 6
- NIST P-521: 1
- P-256: 6
- P-384: 4
- P-521: 7
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- BSI:
- AIS 20: 2
- AIS 31: 2
- AIS 32: 1
- FIPS:
- FIPS 180-4: 6
- FIPS 186-4: 15
- FIPS 197: 4
- FIPS 198: 2
- FIPS140-2: 1
- FIPS140-3: 1
- FIPS180-4: 3
- FIPS198-1: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC 5246: 2
- RFC 5656: 1
- RFC0793: 1
- RFC1321: 2
- RFC2104: 1
- RFC3447: 3
- RFC4251: 1
- RFC4252: 3
- RFC4253: 9
- RFC4254: 1
- RFC4306: 1
- RFC4344: 1
- RFC5246: 7
- RFC5288: 3
- RFC5289: 4
- RFC5647: 1
- RFC5656: 2
- RFC6668: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- the panel of MFP body or the network. This TOE offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user’s intention: 1
|
- ConfidentialDocument:
- Report, Version 7, 2022-06-28, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20071003155417+09'00'
- /ModDate: D:20071003155417+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 208011
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220718070622+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, IBM Corporation, IBM AIX 7.2.5, Certification Report, BSI-DSZ-CC-1165-2022"
- /ModDate: D:20220718130447+02'00'
- /Producer: LibreOffice 6.3
- /Subject: IBM Corporation, IBM AIX 7.2.5,
- /Title: Certification Report BSI-DSZ-CC-1165-2022
- pdf_file_size_bytes: 1182707
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
c0094_est.pdf |
1165b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_COP: 2
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 6
- FDP_ACC.1: 42
- FDP_ACC.1.1: 3
- FDP_ACF: 3
- FDP_ACF.1: 45
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 4
- FDP_ITC.1: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 74
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_NEW.1: 12
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 58
- FIA_SOS.1.1: 6
- FIA_SOS.2: 10
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 10
- FIA_UAU.1: 15
- FIA_UAU.2: 82
- FIA_UAU.2.1: 6
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 16
- FIA_UAU.7.1: 2
- FIA_UID: 14
- FIA_UID.1: 18
- FIA_UID.2: 52
- FIA_UID.2.1: 6
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MOF.1: 159
- FMT_MOF.1.1: 3
- FMT_MSA: 10
- FMT_MSA.1: 22
- FMT_MSA.1.1: 2
- FMT_MSA.2: 2
- FMT_MSA.3: 22
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 3
- FMT_MTD.1: 154
- FMT_MTD.1.1: 12
- FMT_SMF: 31
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 81
- FMT_SMR.1.1: 5
- FMT_SMR.1.2: 5
- FPT:
- FPT_RVM.1: 18
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 9
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 2
- FCS_COP.1: 43
- FCS_COP.1.1: 7
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RNG.1: 7
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 3
- FCS_SSHC_EXT: 8
- FCS_SSHC_EXT.1: 15
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHS_EXT: 7
- FCS_SSHS_EXT.1: 16
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.4: 1
- FCS_SSH_EXT.1: 7
- FCS_SSH_EXT.1.1: 1
- FCS_STO_EXT.1: 6
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.2: 6
- FDP:
- FDP_ACF_EXT.1: 9
- FDP_ACF_EXT.1.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 2
- FPT:
- FPT_ACF_EXT.1: 6
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 1
- FPT_ASLR_EXT.1: 6
- FPT_SBOP_EXT: 1
- FPT_SBOP_EXT.1: 6
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 6
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SERVER: 1
- A.SETTING: 1
- O:
- O.CHECK-HDD: 2
- O.CONFIG: 9
- O.CRYPT-KEY: 3
- O.OVERWRITE-ALL: 2
- O.PRIVATE-BOX: 3
- O.PUBLIC-BOX: 5
- O.REGISTERED-USER: 9
- O.SECURE-PRINT: 3
- OE:
- OE.CRYPT: 4
- OE.FEED-BACK: 9
- OE.LOCK-HDD: 1
- T:
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 1
- T.DISCARD-MFP: 1
|
- A:
- A.PLATFORM: 4
- A.PROPER_ADMIN: 4
- A.PROPER_USER: 4
- O:
- O.ACCOUNTABILITY: 3
- O.INTEGRITY: 3
- O.MANAGEMENT: 4
- O.PROTECTED_COMMS: 5
- O.PROTECTED_STORAGE: 2
- OE:
- OE.PLATFORM: 3
- OE.PROPER_AD: 1
- OE.PROPER_ADMIN: 2
- OE.PROPER_US: 1
- OE.PROPER_USER: 2
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 3
- T.NETWORK_ATTACK: 7
- T.NETWORK_EAVESDROP: 5
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA2: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 12
- P-384: 12
- P-521: 12
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- FIPS 180-1: 2
- FIPS PUB 197: 2
|
- BSI:
- FIPS:
- FIPS PUB 186-4: 4
- FIPS140-2: 2
- FIPS140-3: 2
- FIPS180-4: 6
- FIPS186-4: 13
- FIPS198-1: 7
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-57: 1
- PKCS:
- RFC:
- RFC 4251: 2
- RFC 4253: 4
- RFC 5246: 9
- RFC 5280: 2
- RFC 5288: 8
- RFC 5289: 16
- RFC 5759: 1
- RFC 6125: 1
- RFC 6960: 1
- RFC 8017: 1
- RFC4252: 3
- RFC4253: 5
- RFC5280: 4
- RFC5759: 2
- RFC6668: 3
- RFC6960: 2
- RFC8017: 5
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt all data including the image data written in HDD for: 1
|
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /CreationDate: D:20071003095154+09'00'
- /ModDate: D:20071003095154+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 724686
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 112
|
- /Author: Scott Chapman (generated by CCTool version 2.8.4.61)
- /CreationDate: D:20220621132447Z
- /Creator: Unknown
- /Keywords: AIX, OS, operating system
- /ModDate: D:20220621132447Z
- /Producer: XEP 4.18 build 20100322
- /Subject: the IBM AIX
- /Title: IBM AIX 7.2 Technology Level 5 Service Pack 3 Standard Edition Operating System Security Target (version 1.3 as of 2022-06-21)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 902061
- pdf_hyperlinks: https://hackerone.com/IBM, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0332, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0493, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0600, https://csrc.nist.gov/publications/detail/fips/198/1/final, https://csrc.nist.gov/publications/detail/sp/800-38a/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0496, https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL?rev=1.31, http://www.ietf.org/rfc/rfc5759.txt, http://www.ietf.org/rfc/rfc8017.txt, https://csrc.nist.gov/publications/detail/fips/140/2/final, http://www.ietf.org/rfc/rfc5280.txt, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0446, https://csrc.nist.gov/publications/detail/fips/140/3/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0331, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0386, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0420, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0365, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0598, http://www.ietf.org/rfc/rfc6668.txt, http://www.ietf.org/rfc/rfc6960.txt, https://csrc.nist.gov/publications/detail/fips/186/4/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0525, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_pdf.pdf?__blob=publicationFile, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463, https://www.niap-ccevs.org/MMO/pp/pp_ssh_ep_v1.0.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0578, https://aix.software.ibm.com/aix/efixes/cc/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0240, http://www.ietf.org/rfc/rfc4252.txt, https://www.niap-ccevs.org/MMO/PP/PP_OS_V4.2.1.pdf, https://csrc.nist.gov/publications/detail/fips/180/4/final, https://supportcontent.ibm.com/support/pages/common-criteria-administration-guidance-aix-7253, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_pdf.pdf?__blob=publicationFile, http://www.ietf.org/rfc/rfc4253.txt, https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0501, https://csrc.nist.gov/publications/detail/sp/800-38d/final, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, https://aix.software.ibm.com/aix/efixes/security/
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |