Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Voice Stream Interceptor (VSI)
SERTIT-072
Valari Web Application Firewall v10.3.11
ISCB-3-RPT-C083-CR-v1
name Voice Stream Interceptor (VSI) Valari Web Application Firewall v10.3.11
category Other Devices and Systems Boundary Protection Devices and Systems
scheme NO MY
not_valid_after 21.06.2022 24.11.2022
not_valid_before 21.06.2017 24.11.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR%20SERTIT-072_1.PDF https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C083-CR-v1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SV000073-Voice-Stream-Interceptor-Security-Target-Lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Valari_Security_Target_0.5.pdf
manufacturer Saab Danmark AS Kaapagam Technologies Sdn. Bhd.
manufacturer_web https://saabgroup.com https://www.kaapagamtech.com/
security_level EAL5+, ALC_FLR.3 EAL2
dgst 28228ddc7cba794e 572478fcd6b79542
heuristics/cert_id SERTIT-072 ISCB-3-RPT-C083-CR-v1
heuristics/extracted_sars ADV_TDS.4, ALC_FLR.3, AVA_VAN.4, ATE_COV.2, ALC_TAT.2 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions - 10.3.11
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 21.06.2017
  • developer: SAAB Danmark A/S
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-072
    • certification_date: 21.06.2017
    • description: Saab Voice Stream Interceptor (VSI) is a software security product providing secure domain separation between voice with different classification level. VSI has very few requirements to the underlying platform and can be installed on a Common Criteria approved Linux Operating System with IPsec tunnel and Trusted Platform Module (TPM). VSI supports standardized Voice over IP (VoIP) communication and is used for VoIP clients. The VoIP client user application is completely separated from VSI and does not require being trusted for the secure separation of classified voice. The separation between the VoIP client user application and VSI gives the possibility to change or upgrade the user application and still maintain a secure domain separation of classified voice by an unchanged VSI. From an users point of view the VoIP client containing VSI can both be used for classified (RED) and lower classified or non-classified (BLACK) voice communication. In this way, a conversation can start as non-classified and during the conversation be switched to a classified conversation. Operational modes on radio based communication are supported in this way. It is also possible to listen to both BLACK and RED voice at the same time. VSI also controls the suppression of RED incoming voice stream to the VoIP client, such that while sending BLACK voice the possible pickup and cross talk via the speaker to the microphone is eliminated. During authorized configuration the suppression functionality can either be enabled or disabled depending on the required operational procedure. Saab provides the Secure Tacticall VoIP client, where VSI has been integrated into a user friendly end product and can be used in a secure RED/BLACK system solution.
    • developer: SAAB Danmark A/S
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135133-1607953045/SERTIT/Sertifikater/2017/72/C%20SERTIT-072.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135136-1607953047/SERTIT/Sertifikater/2017/72/SV000073-Voice-Stream-Interceptor-Security-Target-Lite.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/137492-1633083420/SERTIT/Sertifikater/2017/72/SV000073-Voice-Stream-Interceptor-Security-Target-Lite-2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135139-1607953051/SERTIT/Sertifikater/2017/72/CR%20SERTIT-072_1.PDF'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/137486-1633083312/SERTIT/Sertifikater/2017/72/SERTIT-072%20MR%20v%201.0.pdf'})]})
    • evaluation_facility: NTT Com Security (Norway) AS
    • level: EAL 5
    • mutual_recognition: CCRA, SOG-IS
    • product: Stock no. SV000071, Version 1
    • sponsor: Norwegian Defence Logistics Organization Naval System
  • product: Voice Stream Interceptor
  • url: https://sertit.no/certified-products/product-archive/voice-stream-interceptor
  • cert_no: 2017-009-C083
  • certification_date: 24.11.2017
  • developer: Kaapagam Technologies Sdn Bhd.
  • enhanced:
    • assurance_level: EAL2
    • category: Boundary Protection Devices and Systems
    • cert_id: C083
    • certification_date: 24.11.2017
    • developer: B15-15, I-SOVO@I-City No. 6, Persiaran Multimedia, Section 7 40000 Shah Alam, Selangor Darul Ehsan URL: Valari Web Application Firewall Email: [email protected] Phone: +603 8992 3172
    • expiration_date: 24.11.2022
    • mutual_recognition: CCRA
    • product: Valari Web Application Firewall v10.3.11
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/ISCB-5-RPT-C083-CR-v1.pdf
    • scope: The TOE is designed to secure web applications from the attacks and provide a security layer by proxy-ing all HTTP(S) traffic and shield web servers and databases from direct access of the attackers irrespective of the underlying application vulnerabilities. The TOE primary features include: Identification and Authentication: The TOE enables audit functionality to tracks all activities within the TOE boundary network inclusive of its own operations as TOE Application Server. User Data Protection: The TOE protects the web application from external network intrusions by using information flow control between internal and external network. The TOE will log all HTTP requests and responses before allowing or rejecting the HTTP requests. Security Management: TOE functions can be managed through command-line interface. The TOE only allows limited user access to run a limited set of commands. These do not affect the running mode of the TOE. Security Audit: The TOE will generate audit records for HTTP Request and responses. Each audited events will be recorded along with date and time of event, source IP, account user who performed the event, event name, system filename related to event and other event details.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/Valari_Security_Target_0.5.pdf
    • type: Boundary Protection Devices and Systems
  • expiration_date: 24.11.2022
  • level: EAL2
  • product: Valari Web Application Firewall v10.3.11
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/58
maintenance_updates
pdf_data/report_filename CR SERTIT-072_1.PDF ISCB-5-RPT-C083-CR-v1.pdf
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-072: 6
  • MY:
    • ISCB-3-RPT-C083-CR-v1: 33
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 4: 1
    • EAL 5: 28
    • EAL 5 augmented: 26
    • EAL1: 1
    • EAL5: 1
    • EAL7: 1
  • EAL:
    • EAL2: 7
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_TDS.4: 1
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.3: 25
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 1
  • AVA:
    • AVA_VAN.4: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_IFC.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_STM.1: 1
    • FPT_TST.1: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.BLACK_VOICE_STREAM: 1
    • O.STREAM_SETUP: 1
  • OE:
    • OE.PREVENT_ACCESS: 2
    • OE.TRUSTED_RELEASE: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
pdf_data/report_keywords/crypto_protocol
  • VPN:
    • VPN: 6
  • SSH:
    • SSH: 10
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 8
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author: holthj-NSM-PC0709,44FD1973A6,CZC41336S0,CZC41336S0
  • /CreationDate: D:20170816091149+02'00'
  • /Creator: PixEdit Version 8.0.6.4, SN 357-92834-02, Nasjonal sikkerhetsmyndighet,(6A3791DF44),www.pixedit.com
  • /ModDate: D:20170816091149+02'00'
  • /Producer: Techsoft PixEdit Version 8.0.6.4, SN 357-92834-02, Nasjonal sikkerhetsmyndighet
  • /Subject: 385678 340600 VEDLEGG01
  • pdf_file_size_bytes: 7954615
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /Author: ISCB Department
  • /CreationDate: D:20171204082900+00'00'
  • /Creator: Microsoft Word
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20171204082900+00'00'
  • /Subject: Valari Web Application Firewall v10.3.11
  • /Title: C083 Certification Report
  • pdf_file_size_bytes: 983010
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename SV000073-Voice-Stream-Interceptor-Security-Target-Lite.pdf Valari_Security_Target_0.5.pdf
pdf_data/st_keywords/cc_cert_id
  • NO:
    • SERTIT-072: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL5: 1
  • EAL:
    • EAL2: 3
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 20
    • FDP_IFC.1.1: 3
    • FDP_IFF: 2
    • FDP_IFF.1: 22
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.1: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 4
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 4
  • FPT:
    • FPT_FLS: 2
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_STM.1: 4
    • FPT_TST: 2
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_TRP: 2
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.3: 15
    • FAU_GEN.3.1: 2
    • FAU_GEN.3.2: 2
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 2
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_MSA.5: 12
    • FMT_MSA.5.1: 2
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
    • FPT_STM.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.SECURE_IP: 4
    • A.SECURE_LOCATION: 3
    • A.SECURE_OS: 5
    • A.TRUSTED_VPN: 4
  • O:
    • O.BLACK_VOICE_STREAM: 9
    • O.RED_VOICE_STREAM: 6
    • O.STREAM_SETUP: 6
  • OE:
    • OE.ACOUSTIC_FEEDBACK: 3
    • OE.ENVIRONMENTAL: 4
    • OE.EVALUATED_OS: 7
    • OE.INSTRUCTED_ADMIN: 9
    • OE.INSTRUCTED_USERS: 7
    • OE.LOG_ACCESS: 4
    • OE.PREVENT_ACCESS: 7
    • OE.READ_LOG: 4
    • OE.SECURE_IP: 4
    • OE.SECURE_LOCATION: 6
    • OE.TRUSTED_REGISTRAR: 3
    • OE.TRUSTED_RELEASE: 8
  • OT:
    • OT.LOG: 8
    • OT.ROBUST: 6
    • OT.SANITY_CHECK: 10
    • OT.SELECTOR: 10
    • OT.SEND: 8
    • OT.SUBSTITUTION: 9
    • OT.SUPPRESS: 7
  • SA:
    • SA.VOICE_STREAM_CLASSIFICATION: 4
  • T:
    • T.CORRUPT_FORMAT: 3
    • T.CORRUPT_STREAM: 3
    • T.NETWORK_INTEGRITY: 3
    • T.SETUP: 4
    • T.TERMINAL_INTEGRITY: 4
    • T.WRONG_LABEL: 4
  • A:
    • A.ADMIN: 2
    • A.CONFIGRULE: 2
    • A.CONN: 2
    • A.FLOW: 2
    • A.KEY: 2
    • A.PHY: 2
    • A.TIME: 1
    • A.TIMEBACK: 1
  • O:
    • O.ACCESSLOG: 3
    • O.AUDIT: 3
    • O.CONFIG: 4
    • O.EXPLOIT: 3
    • O.NOAUTH: 3
  • OE:
    • OE.ADMIN: 2
    • OE.CONFIGRULE: 2
    • OE.CONN: 3
    • OE.FLOW: 2
    • OE.KEY: 3
    • OE.PHY: 2
    • OE.TIMEBACK: 2
  • T:
    • T.ACCESSLOG: 2
    • T.AUDIT: 2
    • T.CONFIG: 2
    • T.EXPLOIT: 2
    • T.NOAUTH: 2
    • T.REMOTE: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • VPN:
    • VPN: 14
  • SSH:
    • SSH: 15
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_metadata
  • /Author: Arne Stig Peters
  • /CreationDate: D:20170815121252+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170815121252+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1265855
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: AD
  • /CreationDate: D:20171102074055Z00'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171102074055Z00'00'
  • /Producer: Mac OS X 10.11.4 Quartz PDFContext
  • /Subject: Valari Security Target
  • pdf_file_size_bytes: 525664
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different