| name |
d'COMPASS version 2.0.0 |
McAfee Host Intrusion Prevention 8 and ePolicy Orchestrator 4.5 |
| category |
Other Devices and Systems |
Detection Devices and Systems |
| scheme |
MY |
US |
| status |
archived |
archived |
| not_valid_after |
24.12.2019 |
01.11.2014 |
| not_valid_before |
24.12.2014 |
18.11.2011 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C056-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10377-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/d'COMPASS%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10377-st.pdf |
| manufacturer |
TriAset Sdn Bhd |
McAfee, Inc. |
| manufacturer_web |
https://triaset.com/ |
https://www.mcafee.com/ |
| security_level |
EAL2 |
EAL2+, ALC_FLR.2 |
| dgst |
2437da21a2df0903 |
fb02cba82bf2ff44 |
| heuristics/cert_id |
ISCB-5-RPT-C056-CR-v1 |
CCEVS-VR-VID-10377-2011 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
2.0.0 |
4.5 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2014-004-C056
- certification_date: 24.12.2014
- developer: TriAset Sdn Bhd
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C056
- certification_date: 24.12.2014
- developer: Elaine TanCorporate Service ManagerTriAset Sdn BhdUnit 23-5, 5th Floor Block E1 Jalan PJU 1/42Dataran Prima 47301 Petaling Jaya, Selangor, Malaysia URL: http://triaset.com/Email: [email protected]: +603 7880 9562Fax: +603 7880 9563
- expiration_date: 24.12.2019
- mutual_recognition: CCRA
- product: d'COMPASS version 2.0.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C056/ISCB-5-RPT-C056-CR-v1.pdf
- scope: d'COMPASS v2.0.0 is an online Treasury Management System that caters for managing and operating treasury, financial asset investment and financial risks. It is a web application that is developed entirely from Java-based technologies which is installed into a Java EE-compliant application server and accessible via a web browser and it also provides a complete solution from back to the front office fund management operation. Following are the major security functions provided by the TOE: Access control - the TOE manages access control within each organisation based on user Ids, user roles and access control lists. Each ACL maps users and roles to the operations that they are permitted to perform on the object. Identification and Authentication - the TOE requires that each user is successfully identified (user IDs) and authenticated (password) before any interaction with protected resources is permitted. Security Management - the TOE provides functions that allow management of the TOE and its security functions. The TOE restricts access to the management functions based on the role of the user. Security Communication - the TOE is able to protect the user data from disclosure and modification using SSL as a secure communication between users’ browser and the TOE.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C056/d'COMPASS%20Security%20Target%20v1.0.pdf
- type: Online Treasury Management System that caters for managing and operating treasury, financial asset investment and financial risks.
- expiration_date: 24.12.2019
- level: EAL2
- product: d'COMPASS version 2.0.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/146
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10377/
- categories: ['Wireless Monitoring']
- category: Wireless Monitoring
- certification_date: 18.11.2011
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10377
- product: McAfee Host Intrusion Prevention 8 and ePolicy Orchestrator 4.5
- scheme: US
- url: https://www.niap-ccevs.org/products/10377
- vendor: McAfee, LLC
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
44cdd911811b36d2 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C056-CR-v1.pdf |
st_vid10377-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10377-2011
- cert_item: Host Intrusion Prevention 8 and ePolicy Orchestrator 4.5
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C056-CR-v1: 25
|
- US:
- CCEVS-VR-VID10377-2011: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 4
- EAL 2 augmented: 2
- EAL 4: 1
- EAL2: 2
- EAL4: 2
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 2
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.PROTCT: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author: Evaluation Team
- /CreationDate: D:20111116161843
- /Creator: Microsoft® Office Word 2007
- /Keywords: VR
- /ModDate: D:20111116161843
- /Producer: Microsoft® Office Word 2007
- /Subject: Validator Report
- /Title: Validation Report for IronPort Messaging Gateway
- pdf_file_size_bytes: 410462
- pdf_hyperlinks: http://secunia.com/, http://web.nvd.nist.gov/, http://osvdb.org/, http://www.securityfocus.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
| pdf_data/st_filename |
d'COMPASS Security Target v1.0.pdf |
st_vid10377-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL2 augmented: 1
- EAL4: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 1
- ASE_INT.1: 4
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.3: 1
- ADV_TDS: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.3: 1
- ALC_CMS: 1
- ALC_CMS.3: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 3
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MTD: 14
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.ENVIRONMENT: 2
- A.PASSWORD: 3
- A.PATCH: 2
- A.PHYSICAL: 3
- A.SSL_CONFIG: 2
- O:
- O.ACCESS: 5
- O.COMM: 4
- O.MANAGE: 4
- O.PASSWORD_DAT: 1
- O.PASSWORD_DATA: 3
- O.USER: 5
- OE:
- OE.ADMIN: 2
- OE.AUTHDATA: 3
- OE.ENVIRONMENT: 2
- OE.PATCH: 2
- OE.PHYSICAL: 2
- OE.SSL_CONFIG: 3
- T:
- T.EAVESDROP: 3
- T.MANAGEMENT: 2
- T.PASSWORD_DATA: 3
- T.UNAUTHORISED_A: 1
- T.UNAUTHORISED_AC: 1
|
- A:
- A.ACCESS: 3
- A.ASCOPE: 2
- A.DYNMIC: 3
- A.LOCATE: 2
- A.MANAGE: 3
- A.NOEVIL: 3
- A.NOTRST: 1
- A.NOTRUST: 2
- A.PROTCT: 3
- O:
- O.ACCESS: 10
- O.AUDITS: 5
- O.EADMIN: 4
- O.IDANLZ: 5
- O.IDAUTH: 19
- O.IDSCAN: 7
- O.IDSENS: 7
- O.INTEGR: 5
- O.OFLOWS: 4
- O.PROTCT: 8
- O.RESPON: 3
- OE:
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_SORT: 2
- OE.CREDEN: 4
- OE.INSTAL: 4
- OE.INTROP: 4
- OE.PERSON: 5
- OE.PHYCAL: 6
- OE.PROTECT: 4
- OE.SD_PROTECTION: 6
- OE.TIME: 5
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.FACCNT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 2
- T.IMPCON: 3
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MISACT: 3
- T.MISUSE: 3
- T.NOHALT: 2
- T.PRIVIL: 3
- T.SCNCFG: 3
- T.SCNMLC: 3
- T.SCNVUL: 3
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20150205003146+08'00'
- /Creator:
- /Keywords:
- /ModDate: D:20150205003255+08'00'
- /Producer: Foxit Reader PDF Printer Version 7.0.1.831
- /Subject:
- /Title:
- pdf_file_size_bytes: 748344
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /AAPL:Keywords: []
- /Author: Ray Potter
- /CreationDate: D:20110909160824Z
- /Creator: Word
- /Keywords:
- /ModDate: D:20111108081726-05'00'
- /Producer: Mac OS X 10.7.1 Quartz PDFContext
- /Title: Microsoft Word - MFE HIP 8 EAL2 ST v1.1.doc
- pdf_file_size_bytes: 777843
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |