Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv Secure KVM and Matrix models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165
CCEVS-VR-VID-10987-2019
iSAS, Release 1.0
BSI-DSZ-CC-0619-V2-2022
name Vertiv Secure KVM and Matrix models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165 iSAS, Release 1.0
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme US DE
status archived active
not_valid_after 01.08.2021 02.03.2027
not_valid_before 01.08.2019 02.03.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10987-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10987-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10987-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2b_pdf.pdf
manufacturer Vertiv Frequentis AG
manufacturer_web https://www.vertivco.com https://www.frequentis.com
security_level {} ASE_TSS.2, AVA_VAN.5, EAL4+, ADV_INT.3
dgst 327e1793402c8dab 56159ceb71850ff4
heuristics/cert_id CCEVS-VR-VID-10987-2019 BSI-DSZ-CC-0619-V2-2022
heuristics/cert_lab US BSI
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 1.0
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2019
  • evaluation_facility: DXC.technology
  • expiration_date: 01.08.2021
  • id: CCEVS-VR-VID10987
  • product: Vertiv Secure KVM and Matrix models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, and SC8165
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10987
  • vendor: Vertiv IT Systems
heuristics/protection_profiles da2e45c9b3fbb700 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf {}
pdf_data/cert_filename st_vid10987-ci.pdf 0619V2a_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10987-2019: 1
  • DE:
    • BSI-DSZ-CC-0619-V2-2022: 13
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL4+: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_INT.3: 5
  • ALC:
    • ALC_FLR: 3
  • ASE:
    • ASE_TSS.2: 5
pdf_data/cert_keywords/cc_claims
  • A:
    • A.VCS: 1
pdf_data/cert_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
pdf_data/cert_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/cert_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/cert_keywords/standard_id
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/cert_keywords/certification_process
  • ConfidentialDocument:
    • BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
    • Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190815123628-04'00'
  • /ModDate: D:20190815123628-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181955
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10987-vr.pdf 0619V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10987-2019
    • cert_item: Vertiv Secure KVM Models SC820, SC820D, SC820H, SCM120, SCM120H, SC920H, SC920D, SC920, SC920XD, SC840, SC845, SC945, SC940, SC840D, SC845D, SC940D, SC945D, SC840H, SC845H, SC940H, SC945H, SC945XD, SCM145, SCM145H, SC1045XD, SC885, SC985, SC8165
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0619-V2-2022
    • cert_item: iSAS Release 1.0
    • cert_lab: BSI
    • developer: Frequentis AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10987-2019: 1
  • DE:
    • BSI-DSZ-CC-0619-V2-2022: 13
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_INT.3: 5
  • ALC:
    • ALC_FLR: 3
  • ASE:
    • ASE_TSS.2: 5
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFF.1: 2
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 2
  • FMT:
    • FMT_MOF.1.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRI: 1
    • O.ANTI_TAMPERING_BACKUP_POWER: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTLY_D: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATION: 1
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_ENDPOINT: 1
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 1
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_CONTR: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.VCS: 1
pdf_data/report_keywords/eval_facility
  • DXC:
    • DXC Technology: 5
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
    • Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
pdf_data/report_metadata
  • /CreationDate: D:20190815120007-04'00'
  • /ModDate: D:20190815120007-04'00'
  • pdf_file_size_bytes: 962935
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
pdf_data/st_filename st_vid10987-st.pdf 0619V2b_pdf.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 1
    • EAL4: 8
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_INT.3: 5
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 79
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 87
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 14
    • FDP_RIP: 1
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 3
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FAU:
    • FAU_ARP.1: 11
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 1
    • FAU_SAA.1: 11
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FDP:
    • FDP_ETC.1: 12
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 5
    • FDP_IFF: 69
    • FDP_IFF.1: 30
    • FDP_IFF.5: 4
    • FDP_IFF.5.1: 1
    • FDP_ITC: 20
    • FDP_ITC.1: 10
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 5
    • FMT_MSA.3: 8
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 4
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 11
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 2
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 9
    • O.PERIPHERAL_PORTS_ISOLATION: 12
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 9
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 8
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 7
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 9
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.VCS: 5
  • OE:
    • OE.TEMPEST_: 1
    • OE.VCS: 5
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 14
  • FI:
    • Malfunction: 5
    • malfunction: 7
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • touch entry device). Protection of TSF The TOE provides a Fail Secure security function. 1.4.2.3 Out of Scope The following firmware and hardware features are outside the scope of the defined TSF and are: 1
    • 12 1.4.2.3 Out of Scope: 2
    • Microphone_Inputs/Earpiece_Outputs are connected to the BLACK or RED VCS. The touch entry device is out of scope of the TOE. Therefore, this setup requires that the MOD iSAS-P is mounted visible, and the operator: 1
    • Out of Scope: 2
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Frequentis
  • /CreationDate: D:20220202143605+01'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: Secure audio switch, Trusted audio switch, Red/Black separation, Audio interface
  • /ModDate: D:20220202143605+01'00'
  • /Producer: Microsoft® Word 2019
  • /Subject: Security Target Lite
  • /Title: iSAS
  • pdf_file_size_bytes: 898592
  • pdf_hyperlinks: http://www.frequentis.com/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 81
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different