name |
Data Security Kit(D) Software V1.00J |
Cisco Nexus 5600 Series Switches with 2000 Series Fabric Extenders running NX-OS 7.2(1)N1(1) |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
archived |
not_valid_after |
31.01.2013 |
13.06.2021 |
not_valid_before |
31.10.2006 |
13.06.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0056_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-15-77333-CR%20(revised).pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Nexus%202k%205k%20Switch%20ST%20v1.0_060316.pdf |
manufacturer |
KYOCERA MITA Corporation |
Cisco Systems, Inc. |
manufacturer_web |
|
https://www.cisco.com |
security_level |
EAL3 |
EAL2 |
dgst |
28a5dbecb883b240 |
90cc9f355fabbec2 |
heuristics/cert_id |
JISEC-CC-CRP-C0056 |
NSCIB-CC-15-77333-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
cpe:2.3:o:cisco:nx-os:7.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:7.2\(0\)n1\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:7.2\(0\)n1\(0.1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:7.2\(1\)n1\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:7.2\(1\)d\(1\):*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2017-6770, CVE-2016-1409, CVE-2018-0102, CVE-2016-1453 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ADV_FSP.2, AGD_OPE.1, AVA_VAN.2, ATE_COV.1, ALC_CMC.2, ADV_TDS.1, ATE_IND.2, ALC_CMS.2 |
heuristics/extracted_versions |
1.00 |
7.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0056
- certification_date: 01.10.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0056_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-C2520/KM-C3225/KM-C3232" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
- evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
- product: Data Security Kit(D) Software
- product_type: IT Product (data protection function in digital Multi Function Device)
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2007-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0056_it5064_02.html'})]
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0056_it5064.html
- toe_japan_name: Data Security Kit(D) Software V1.00J
- toe_overseas_link: None
- toe_overseas_name: Data Security Kit(D) Software V2.10J
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0056_ecvr.pdf |
[CR] NSCIB-CC-15-77333-CR (revised).pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id:
- cert_item: Cisco Nexus 5600 Series Switches with 2000 Series Fabric Extenders, running NX-OS 7.2(1)N1(1
- cert_lab: Brightsight
- developer: Cisco Systems Inc
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0056: 1
|
- NL:
- CC-16-77333: 1
- NSCIB-CC-15-77333: 1
- NSCIB-CC-15-77333-CR: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 19
- Cisco Systems: 4
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061102201015+09'00'
- /ModDate: D:20061102201015+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12181
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: p646
- /CreationDate: D:20160822150540+02'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20160822150540+02'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: [CR] NSCIB-CC-15-77333-CR.pdf
- pdf_file_size_bytes: 459020
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
|
[ST] Nexus 2k 5k Switch ST v1.0_060316.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSH_EXT: 2
- FCS_SSH_EXT.1: 13
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 14
- FIA_PMG_EXT.1.1: 2
- FIA_SOS.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 1
- FIA_UAU.7: 6
- FIA_UAU_EXT: 1
- FIA_UAU_EXT.2: 13
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 1
- FIA_UIA_EXT.1: 14
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 11
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.2: 3
- FTA:
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NO_GENERAL_PURPOSE: 4
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 4
- O:
- O.DATA_FLOW_CONTROL: 6
- O.DISPLAY_BANNER: 4
- O.PROTECTED_COMMUNICA: 1
- O.PROTECTED_COMMUNICAT: 1
- O.PROTECTED_COMMUNICATIONS: 5
- O.RESIDUAL_INFORMATION_: 2
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.SYSTEM_MONITORING: 6
- O.TOE_ADMINISTRATION: 4
- O.TSF_SELF_TEST: 6
- OE:
- OE.NO_GENERAL_PURPOSE: 3
- OE.PHYSICAL: 3
- OE.TRUSTED_ADMIN: 3
- T:
- T.NET_TRAFFIC: 2
- T.TSF_FAILURE: 4
- T.UNAUTHORIZED_ACCESS: 3
- T.UNDETECTED_ACTIONS: 4
- T.USER_DATA_REUSE: 2
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 54
- Cisco Systems, Inc: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-512: 1
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 14
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-2: 3
- FIPS PUB 186-3: 5
- FIPS PUB 197: 2
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 2
- NIST SP 800-56A: 2
- SP 800-90: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |