Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
2017-48-INF-3131
Red Hat Enterprise Linux 7.6
CCEVS-VR-VID-11039-2020
name Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+) Red Hat Enterprise Linux 7.6
category Network and Network-Related Devices and Systems Operating Systems
scheme ES US
status active archived
not_valid_after 29.05.2025 17.07.2022
not_valid_before 29.05.2020 17.07.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-Diploma.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-INF-3131.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11039-st.pdf
manufacturer Fortinet, Inc. Red Hat, Inc.
manufacturer_web https://www.fortinet.com/ https://www.redhat.com
security_level EAL4+, ALC_FLR.3 {}
dgst 27ade261a5b0a226 cc3d2ca9465d2b00
heuristics/cert_id 2017-48-INF-3131 CCEVS-VR-VID-11039-2020
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian:7.6:*:*:*:*:*:*:*, cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_aus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2018-18492, CVE-2011-2767, CVE-2017-3144, CVE-2018-20615, CVE-2014-7169, CVE-2018-2815, CVE-2018-17961, CVE-2017-1000111, CVE-2017-12899, CVE-2018-8786, CVE-2016-3715, CVE-2018-18356, CVE-2017-10078, CVE-2018-2640, CVE-2017-3136, CVE-2015-0797, CVE-2019-14287, CVE-2017-10274, CVE-2015-7529, CVE-2017-3157, CVE-2017-15129, CVE-2018-12373, CVE-2016-2775, CVE-2015-0382, CVE-2017-10087, CVE-2019-9506, CVE-2017-5203, CVE-2017-12902, CVE-2016-1838, CVE-2016-5018, CVE-2017-12987, CVE-2015-3276, CVE-2018-14645, CVE-2018-1301, CVE-2014-0384, CVE-2018-17972, CVE-2014-2497, CVE-2019-3855, CVE-2016-8610, CVE-2018-12372, CVE-2015-7852, CVE-2017-3243, CVE-2018-12386, CVE-2017-5208, CVE-2017-9775, CVE-2020-27779, CVE-2018-1106, CVE-2017-10102, CVE-2018-12377, CVE-2017-10356, CVE-2018-3760, CVE-2015-5739, CVE-2017-6011, CVE-2018-16511, CVE-2018-14618, CVE-2019-2422, CVE-2015-4752, CVE-2018-8777, CVE-2018-14362, CVE-2018-17456, CVE-2016-7426, CVE-2017-10074, CVE-2019-3816, CVE-2016-5444, CVE-2017-6009, CVE-2018-2798, CVE-2018-12364, CVE-2018-5950, CVE-2015-4830, CVE-2018-19134, CVE-2018-14633, CVE-2018-18498, CVE-2017-10346, CVE-2018-2952, CVE-2017-10107, CVE-2017-3533, CVE-2016-9446, CVE-2018-12359, CVE-2016-8743, CVE-2018-14638, CVE-2015-3214, CVE-2017-3143, CVE-2021-20225, CVE-2017-1000116, CVE-2018-12385, CVE-2018-15688, CVE-2018-12390, CVE-2018-2814, CVE-2017-3302, CVE-2017-3651, CVE-2017-3135, CVE-2018-12379, CVE-2018-2665, CVE-2018-16540, CVE-2018-17183, CVE-2017-0902, CVE-2018-18445, CVE-2017-3265, CVE-2016-2857, CVE-2015-0374, CVE-2019-6454, CVE-2016-3718, CVE-2013-5704, CVE-2017-3291, CVE-2016-3710, CVE-2018-2668, CVE-2015-5165, CVE-2018-2761, CVE-2018-5345, CVE-2017-7668, CVE-2018-12374, CVE-2017-10135, CVE-2014-8139, CVE-2018-2781, CVE-2015-8896, CVE-2016-2518, CVE-2017-10378, CVE-2016-4578, CVE-2015-4757, CVE-2018-19475, CVE-2016-6794, CVE-2014-9584, CVE-2018-18494, CVE-2017-3142, CVE-2018-18559, CVE-2015-1779, CVE-2016-5403, CVE-2016-0762, CVE-2016-4020, CVE-2016-7035, CVE-2018-5379, CVE-2018-5740, CVE-2017-3453, CVE-2018-12393, CVE-2017-10350, CVE-2018-18314, CVE-2016-10165, CVE-2018-2771, CVE-2016-9401, CVE-2018-19409, CVE-2017-10384, CVE-2018-12383, CVE-2017-3137, CVE-2018-10850, CVE-2018-5155, CVE-2020-14372, CVE-2018-16864, CVE-2018-2800, CVE-2017-16541, CVE-2016-5612, CVE-2018-5146, CVE-2018-2678, CVE-2017-15710, CVE-2016-3627, CVE-2018-12366, CVE-2017-6010, CVE-2018-16850, CVE-2019-12384, CVE-2017-10268, CVE-2016-2125, CVE-2018-5168, CVE-2014-5353, CVE-2015-0381, CVE-2014-8964, CVE-2018-3169, CVE-2015-7702, CVE-2017-10349, CVE-2014-2431, CVE-2017-10115, CVE-2018-11763, CVE-2020-25647, CVE-2022-0330, CVE-2017-17405, CVE-2015-2648, CVE-2018-8088, CVE-2018-5750, CVE-2017-3238, CVE-2017-18017, CVE-2014-8141, CVE-2018-2813, CVE-2015-3152, CVE-2018-12389, CVE-2018-1000140, CVE-2018-18397, CVE-2018-2755, CVE-2018-18500, CVE-2018-5185, CVE-2017-3258, CVE-2015-2571, CVE-2018-7550, CVE-2018-2602, CVE-2017-5848, CVE-2016-3712, CVE-2018-2618, CVE-2019-6116, CVE-2018-14354, CVE-2020-25632, CVE-2018-5162, CVE-2015-3281, CVE-2014-9585, CVE-2014-2419, CVE-2018-1000156, CVE-2015-2573, CVE-2015-2808, CVE-2015-0499, CVE-2019-1010238, CVE-2018-2579, CVE-2015-4792, CVE-2018-10873, CVE-2017-10110, CVE-2017-10108, CVE-2014-6271, CVE-2015-4816, CVE-2017-10193, CVE-2014-6568, CVE-2016-5011, CVE-2014-4341, CVE-2017-15715, CVE-2014-8140, CVE-2014-3468, CVE-2018-2622, CVE-2018-18506, CVE-2018-12378, CVE-2018-2790, CVE-2018-5157, CVE-2016-5126, CVE-2017-3653, CVE-2018-12387, CVE-2018-14646, CVE-2018-2629, CVE-2017-9287, CVE-2017-10198, CVE-2017-15121, CVE-2018-11806, CVE-2018-18073, CVE-2018-14357, CVE-2015-5160, CVE-2016-9600, CVE-2017-3464, CVE-2016-5624, CVE-2018-8778, CVE-2018-5748, CVE-2019-3813, CVE-2018-16802, CVE-2018-7225, CVE-2018-5407, CVE-2018-12396, CVE-2018-16866, CVE-2018-6797, CVE-2018-3214, CVE-2018-12360, CVE-2018-12376, CVE-2015-0441, CVE-2018-2599, CVE-2014-2430, CVE-2016-9811, CVE-2018-15909, CVE-2018-3139, CVE-2017-10978, CVE-2017-3167, CVE-2018-16865, CVE-2017-10053, CVE-2017-10285, CVE-2017-3145, CVE-2018-2641, CVE-2018-1000001, CVE-2014-2440, CVE-2014-8160, CVE-2019-3835, CVE-2014-3469, CVE-2017-12617, CVE-2014-2438, CVE-2016-1833, CVE-2017-1000251, CVE-2017-10357, CVE-2015-4826, CVE-2017-1000115, CVE-2019-3856, CVE-2018-2796, CVE-2018-7566, CVE-2015-0505, CVE-2018-5733, CVE-2019-10160, CVE-2018-2677, CVE-2018-15127, CVE-2018-5170, CVE-2017-10090, CVE-2018-2817, CVE-2019-14816, CVE-2018-2588, CVE-2018-12405, CVE-2015-0391, CVE-2016-1839, CVE-2017-5645, CVE-2018-5183, CVE-2016-1837, CVE-2018-12365, CVE-2019-3838, CVE-2016-6796, CVE-2015-7703, CVE-2016-6797, CVE-2018-16539, CVE-2018-5188, CVE-2018-6574, CVE-2015-4643, CVE-2021-3656, CVE-2019-11811, CVE-2014-2432, CVE-2017-10345, CVE-2018-6871, CVE-2017-5333, CVE-2018-9568, CVE-2014-7815, CVE-2017-0899, CVE-2016-5387, CVE-2018-1283, CVE-2015-2590, CVE-2016-3492, CVE-2018-14665, CVE-2016-5824, CVE-2018-8787, CVE-2017-5205, CVE-2018-7858, CVE-2015-3195, CVE-2017-10379, CVE-2017-5332, CVE-2015-8631, CVE-2015-2582, CVE-2016-5440, CVE-2018-1312, CVE-2017-15041, CVE-2018-3639, CVE-2015-4815, CVE-2017-17833, CVE-2021-4034, CVE-2018-12392, CVE-2015-4861, CVE-2016-1908, CVE-2017-3539, CVE-2019-14835, CVE-2017-9776, CVE-2018-16871, CVE-2017-10295, CVE-2018-2634, CVE-2015-8391, CVE-2015-5740, CVE-2018-6927, CVE-2021-20233, CVE-2017-10388, CVE-2017-0903, CVE-2018-5683, CVE-2017-3244, CVE-2019-3878, CVE-2018-16863, CVE-2016-1762, CVE-2015-7701, CVE-2018-12363, CVE-2017-3308, CVE-2018-16396, CVE-2018-2819, CVE-2019-0223, CVE-2017-10355, CVE-2017-12896, CVE-2018-14622, CVE-2017-3309, CVE-2015-0501, CVE-2018-10675, CVE-2019-8308, CVE-2015-4913, CVE-2017-15906, CVE-2018-1000805, CVE-2016-4448, CVE-2016-3427, CVE-2018-5158, CVE-2015-3196, CVE-2018-14634, CVE-2018-15911, CVE-2018-18312, CVE-2019-11235, CVE-2017-3641, CVE-2018-2562, CVE-2019-10182, CVE-2014-7844, CVE-2016-1834, CVE-2018-5156, CVE-2017-10348, CVE-2017-10111, CVE-2015-7692, CVE-2015-4495, CVE-2018-18501, CVE-2019-7221, CVE-2016-7091, CVE-2018-6914, CVE-2015-4836, CVE-2018-18493, CVE-2018-19476, CVE-2014-7840, CVE-2015-8126, CVE-2018-5161, CVE-2016-1836, CVE-2019-6133, CVE-2017-3318, CVE-2018-1068, CVE-2019-3863, CVE-2016-0651, CVE-2019-11135, CVE-2017-12613, CVE-2017-5202, CVE-2020-27749, CVE-2017-1000407, CVE-2017-1000366, CVE-2017-10067, CVE-2018-3180, CVE-2018-2797, CVE-2018-5150, CVE-2015-4870, CVE-2018-5154, CVE-2018-2767, CVE-2018-14650, CVE-2018-2663, CVE-2015-4858, CVE-2018-12020, CVE-2018-2637, CVE-2014-2436, CVE-2018-5159, CVE-2018-2794, CVE-2018-5184, CVE-2015-2568, CVE-2018-16541, CVE-2017-10089, CVE-2018-18311, CVE-2017-10347, CVE-2017-9462, CVE-2016-9675, CVE-2018-2799, CVE-2019-10167, CVE-2015-4879, CVE-2017-7980, CVE-2016-7163, CVE-2016-6662, CVE-2017-3544, CVE-2018-5145, CVE-2017-10281, CVE-2017-10116, CVE-2018-18284, CVE-2017-3600, CVE-2016-5629, CVE-2019-3815, CVE-2018-15908, CVE-2017-10101, CVE-2014-3581, CVE-2014-3615, CVE-2017-14064, CVE-2017-10109, CVE-2015-8629, CVE-2018-19477, CVE-2016-5626, CVE-2018-3136, CVE-2018-3149, CVE-2018-17466, CVE-2018-1049, CVE-2014-9529, CVE-2017-3456, CVE-2018-2633, CVE-2017-10243, CVE-2018-18505, CVE-2015-0433, CVE-2019-10168, CVE-2015-7691, CVE-2016-9583, CVE-2017-8291, CVE-2018-2795, CVE-2017-10096, CVE-2017-12615, CVE-2017-9788, CVE-2018-12207, CVE-2016-8864, CVE-2015-2643, CVE-2017-0901, CVE-2019-6974, CVE-2018-14624, CVE-2017-0900, CVE-2018-11784, CVE-2019-3857, CVE-2018-1086, CVE-2017-5204, CVE-2017-3636, CVE-2017-1000410, CVE-2016-0642, CVE-2017-10664, CVE-2017-3317, CVE-2017-9461, CVE-2015-3147, CVE-2019-10166, CVE-2017-1000083, CVE-2018-19115, CVE-2018-2603, CVE-2015-4802, CVE-2016-1840, CVE-2016-9131, CVE-2018-3693, CVE-2016-9560, CVE-2018-3183, CVE-2016-8635, CVE-2015-4864, CVE-2015-7704, CVE-2018-12362, CVE-2018-6560, CVE-2018-5178, CVE-2018-18313, CVE-2014-3467
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions 5.6.6 7.6
heuristics/scheme_data
  • category: Others
  • certification_date: 29.05.2020
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=939
    • certification_date: 29.05.2020
    • description: TOE Overview The TOE provides network management to one or more Fortinet network security devices. Authorized administrators are able to configure and manage devices, using functions that include verification and update of firmware and license information. Administrators can create and modify policies and objects and push them to the devices. The TOE is able to retrieve up-to-date antivirus and intrusion prevention signatures from Fortinet’s FortiGuard service to push to the managed devices. The TOE is capable of grouping devices into administrative domains (ADOMs), which simplifies the application of policies, distribution of content security and firmware updates for large implementations. ADOMs are implemented in the evaluated configuration. The TOE has extensive logging capabilities which include the logging of administrative actions and logging of use of the trusted cryptographic channels. The TOE is a software only TOE. It is supported by the FortiManager appliance hardware, which is in the operational environment.
    • evaluation_facility: Applus Laboratories
    • level: EAL4 + ALC_FLR.3
    • manufacturer: Fortinet, Inc.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=940
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=938
    • type: Product
  • manufacturer: Fortinet, Inc.
  • product: Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/368-fortinet-fortimanager-5-6-6-build-7352-190510-eal4
  • category: Operating System
  • certification_date: 17.07.2020
  • evaluation_facility: Acumen Security
  • expiration_date: 17.07.2022
  • id: CCEVS-VR-VID11039
  • product: Red Hat Enterprise Linux 7.6
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11039
  • vendor: Red Hat, Inc.
heuristics/protection_profiles {} e34797b67a3163c5, 236bced46aeb26ba
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf
pdf_data/cert_filename 2017-48-Diploma.pdf st_vid11039-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11039-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL4: 2
    • EAL4+: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 868949
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20200723090200-04'00'
  • /ModDate: D:20200723090200-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181023
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 2017-48-INF-3131.pdf st_vid11039-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID11039-2020
    • cert_item: for the Red Hat Enterprise Linux Version 7.6, Version 1.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2017-48-INF-3131-v1: 1
  • US:
    • CCEVS-VR-VID11039-2020: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 10
    • EAL4+: 11
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 9
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 1
  • FDP:
    • FDP_ACC.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_UAU.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MTD.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITC.1: 1
  • FTA:
    • FTA_SSL.3: 1
  • FTP:
    • FTP_ITC.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.2: 2
    • FCS_COP.1: 7
    • FCS_DRBG_EXT.1: 1
    • FCS_SSHC_EXT.1: 5
    • FCS_SSHS_EXT.1: 2
    • FCS_TLSC_EXT.1: 4
    • FCS_TLSC_EXT.4: 1
  • FPT:
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 5
  • Acumen:
    • Acumen Security: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 6
  • RSA:
    • RSA 2048: 1
    • RSA 4096: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
  • SSH:
    • SSH: 33
    • SSHv2: 4
  • TLS:
    • TLS:
      • TLS: 13
      • TLSv1.2: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 16
    • P-521: 12
pdf_data/report_keywords/crypto_library
  • NSS:
    • NSS: 2
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
pdf_data/st_filename 2017-48-ST.pdf st_vid11039-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL4: 2
    • EAL4+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 15
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 35
    • FCS_CKM.2: 3
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 4
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 9
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 8
    • FPT_ITC.1.1: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 6
    • FCS_DRBG_EXT.1: 1
    • FCS_RBG_EXT.1: 3
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 7
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSH_EXT.1: 3
    • FCS_SSH_EXT.1.1: 1
    • FCS_STO_EXT.1: 3
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 1
  • FDP:
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 3
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT.1: 3
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT.1: 3
    • FPT_SBOP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 2
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.DELIVER: 3
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NOEVIL: 3
  • O:
    • O.ACCESS: 9
    • O.ADMIN: 9
    • O.AUDIT: 11
    • O.ENCRYP: 6
    • O.IDAUTH: 14
    • O.PROTCT: 9
    • O.TIME: 11
  • OE:
    • OE.ADMIN: 10
    • OE.PHYCAL: 6
  • T:
    • T.AUDACC: 3
    • T.NOAUTH: 2
    • T.PRIVIL: 3
    • T.PROCOM: 2
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
      • AES-128: 1
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 3
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDHE: 1
  • FF:
    • DH:
      • DH: 5
      • DHE: 1
      • Diffie-Hellman: 4
  • ECC:
    • ECC:
      • ECC: 7
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • Diffie-Hellman: 8
  • RSA:
    • RSA 2048: 4
    • RSA 4096: 2
    • RSA2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 9
      • SHA-384: 7
      • SHA-512: 7
      • SHA2: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLS: 8
      • TLS 1.1: 2
      • TLS 1.2: 2
  • VPN:
    • VPN: 1
  • SSH:
    • SSH: 92
    • SSHv2: 5
  • TLS:
    • TLS:
      • TLS: 32
      • TLS 1.2: 1
      • TLSv1.2: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 2
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 34
    • P-384: 36
    • P-521: 22
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 3
  • OpenSSL:
    • OpenSSL: 8
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 197: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS1: 1
  • RFC:
    • RFC 2631: 1
    • RFC 4346: 1
    • RFC 5246: 2
    • RFC4346: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 3
    • FIPS 197: 1
    • FIPS 198-1: 1
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 800-56A: 2
    • SP 800-56B: 1
  • RFC:
    • RFC 3526: 1
    • RFC 4251: 1
    • RFC 4253: 2
    • RFC 5246: 13
    • RFC 5280: 4
    • RFC 5288: 8
    • RFC 5289: 16
    • RFC 5759: 1
    • RFC 6125: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 608207
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different