name |
Dell EqualLogic PS Series Storage Array Firmware Version 5.1.1-H2 |
SUSE Linux Enterprise Server Version 15 SP2 |
category |
Other Devices and Systems |
Operating Systems |
scheme |
DE |
DE |
status |
archived |
active |
not_valid_after |
01.09.2019 |
10.11.2026 |
not_valid_before |
28.03.2013 |
11.11.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0688a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0688b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168b_pdf.pdf |
manufacturer |
Dell, Inc. |
SUSE LLC |
manufacturer_web |
https://www.dell.com |
https://www.suse.com |
security_level |
EAL2+, ALC_FLR.1 |
{} |
dgst |
348424202a3e9ab3 |
4754212f2600e7b2 |
heuristics/cert_id |
BSI-DSZ-CC-0688-2013 |
BSI-DSZ-CC-1168-2021 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:sap:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2020-8025, CVE-2019-18903, CVE-2020-8013, CVE-2020-15705, CVE-2002-20001, CVE-2020-15706, CVE-2022-27239, CVE-2019-18902, CVE-2023-29552, CVE-2021-45082, CVE-2018-20105, CVE-2018-17962, CVE-2019-18897, CVE-2021-4034, CVE-2018-12116, CVE-2018-12122, CVE-2023-23005, CVE-2019-18901, CVE-2020-15707 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.1, ADV_ARC.1, ALC_CMS.2, ADV_FSP.2, ALC_DVS.2, ALC_CMC.2, ASE_OBJ.2, ALC_FLR.1, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, APE_SPD.1, ALC_DEL.1, ATE_FUN.1, AVA_VAN.2, ALC_TAT.3, ADV_IMP.2, APE_ECD.1, ASE_ECD.1, APE_CCL.1, ASE_REQ.2, ASE_TSS.1, ASE_INT.1, APE_REQ.2, ALC_LCD.2, APE_OBJ.2, ADV_INT.3, ATE_DPT.4, ASE_CCL.1, ADV_TDS.1, ADV_SPM.1, AGD_OPE.1, APE_INT.1 |
ASE_SPD.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, ASE_REQ.2, ALC_TSU_EXT.1, ATE_IND.1, ASE_OBJ.2, ALC_CMS.1, ASE_TSS.1, ASE_INT.1, ALC_CMC.1 |
heuristics/extracted_versions |
5.1.1 |
15 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0902-2017 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1008-2017, BSI-DSZ-CC-0902-2017 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
236bced46aeb26ba, e34797b67a3163c5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf |
pdf_data/cert_filename |
|
1168c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211112103541+01'00'
- /Creator: Writer
- /Keywords: """Common Criteria, Certification, Zertifizierung, Linux-basiertes Betriebssystem, Operating System Protection Profile, Virtualization"""
- /ModDate: D:20211116101139+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Zertifizierung SUSE Linux EnterpriseServer 15 SP2
- /Title: Certification Report BSI-DSZ-CC-1151-2021
- pdf_file_size_bytes: 367408
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0688a_pdf.pdf |
1168a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0688-2013
- cert_item: Dell EqualLogic PS Series Storage Array Firmware Version 5.1.1-H2
- cert_lab: BSI
- developer: Dell Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 extended
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1168-2021
- cert_item: SUSE Linux Enterprise Server, Version 15 SP2
- cert_lab: BSI
- developer: SUSE LLC
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR- PP-0047, NIAP, Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039, NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 3
- EAL 4: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 3
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ALC:
- ALC_FLR: 3
- ALC_TSU_EXT.1: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 5
- SHA-256: 2
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- KEX:
- MAC:
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 3
- P-256: 7
- P-384: 8
- P-521: 8
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 180-4: 1
- FIPS 186-3: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- RFC:
- RFC2140: 1
- RFC4253: 1
- RFC4419: 1
|
- BSI:
- AIS 20: 2
- AIS 23: 1
- AIS 32: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 5
- FIPS180-4: 8
- FIPS186-4: 3
- FIPS197: 3
- FIPS198: 2
- FIPS198-1: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC 4253: 1
- RFC 5246: 1
- RFC0768: 1
- RFC0791: 1
- RFC0792: 1
- RFC0793: 1
- RFC0826: 1
- RFC0903: 1
- RFC2104: 3
- RFC2119: 1
- RFC2367: 1
- RFC2401: 1
- RFC2460: 1
- RFC2898: 1
- RFC3376: 1
- RFC3447: 3
- RFC4251: 2
- RFC4252: 4
- RFC4253: 9
- RFC4301: 1
- RFC4306: 3
- RFC4344: 2
- RFC4419: 2
- RFC5246: 9
- RFC5288: 2
- RFC5647: 2
- RFC5656: 3
- RFC5903: 3
- RFC6668: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Inc. [7] Evaluation Technical Report, Version 3, 26 February 2013, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, Version 1, 5.1.1-H2-cm-lists-v1.sh (confidential document) [9: 1
|
- ConfidentialDocument:
- NIAP), Version 0.16, 2021-09-22 [10] Configuration list for the TOE, 2021-10-01, MASTER CM List (confidential document) [11] Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039: 1
- Report, Version 5, 2021-11-09, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130507081653+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Storage Area Network, Storage Array, Dell EqualLogic"
- /ModDate: D:20130507082459+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0688-2013
- pdf_file_size_bytes: 644680
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211112103541+01'00'
- /Creator: Writer
- /Keywords: """Common Criteria, Certification, Zertifizierung, Linux-basiertes Betriebssystem, Operating System Protection Profile, Virtualization"""
- /ModDate: D:20211112131217+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Zertifizierung SUSE Linux EnterpriseServer 15 SP2
- /Title: Certification Report BSI-DSZ-CC-1151-2021
- pdf_file_size_bytes: 1181740
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/cc/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
0688b_pdf.pdf |
1168b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_COP: 13
- FCS_COP.1: 3
- FCS_COP.1.1: 2
- FCS_RNG: 2
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 1
- FCS_COP.1: 37
- FCS_COP.1.1: 5
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RNG.1: 4
- FCS_SSHC_EXT: 8
- FCS_SSHC_EXT.1: 8
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHS_EXT: 7
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_STO_EXT.1: 6
- FCS_STO_EXT.1.1: 2
- FCS_TLSC_EXT: 3
- FCS_TLSC_EXT.1: 10
- FCS_TLSC_EXT.2: 5
- FDP:
- FDP_ACF_EXT.1: 6
- FDP_ACF_EXT.1.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_SMF_EXT.1: 6
- FMT_SMF_EXT.1.1: 2
- FPT:
- FPT_ACF_EXT.1: 6
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 1
- FPT_ASLR_EXT.1: 6
- FPT_SBOP_EXT: 1
- FPT_SBOP_EXT.1: 6
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTP:
- FTP_ITC_EXT.1: 8
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- OE:
- OE.DNS: 3
- OE.NTP: 3
- OE.SNMP: 3
- OE.TOE: 3
|
- A:
- A.CONNECT: 1
- A.PLATFORM: 4
- A.PROPER_ADMIN: 4
- A.PROPER_USER: 4
- O:
- O.ACCOUNTABILITY: 7
- O.INTEGRITY: 19
- O.MANAGEMENT: 8
- O.PROTECTED_COMMS: 21
- O.PROTECTED_STORAGE: 8
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_PHYSICAL_ACCESS: 3
- T.LOCAL_ATTACK: 2
- T.NETWORK_ATTACK: 10
- T.NETWORK_EAVESDROP: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 4
- AES-256: 1
- AES128: 1
- AES256: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 2
- SHA2: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- PGP:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 41
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 4
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 4
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- RFC:
- RFC 1994: 1
- RFC 2246: 1
- RFC 3268: 1
- RFC 4251: 1
- RFC 4253: 1
- RFC 4344: 1
- RFC 4419: 1
- RFC 5048: 1
- RFC1994: 2
- RFC2246: 5
- RFC3268: 3
- RFC4251: 3
- RFC4253: 5
- RFC4344: 2
- RFC4419: 2
- RFC5048: 2
|
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 186-4: 5
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-57: 1
- PKCS:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
- RFC 4251: 1
- RFC 4252: 4
- RFC 4253: 5
- RFC 5246: 13
- RFC 5280: 2
- RFC 5288: 4
- RFC 5289: 4
- RFC 5647: 1
- RFC 5656: 1
- RFC 5759: 1
- RFC 6125: 1
- RFC 6668: 1
- RFC 8017: 1
- RFC4252: 4
- RFC4253: 4
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. 3.2.1.2 Personnel A.PROPER_USER The user of the OS is not willfully negligent or: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: Scott Chapman (generated by CCTool version 2.7.2)
- /CreationDate: D:20130326152927Z
- /Creator: Unknown
- /Keywords: Dell, EqualLogic, SAN
- /ModDate: D:20130326152927Z
- /Producer: XEP 4.18 build 20100322
- /Subject:
- /Title: Dell EqualLogic PS Series Storage Array Firmware Version 5.1.1-H2 Security Target (version 2.5 as of 2013-01-21)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 606230
- pdf_hyperlinks: http://tools.ietf.org/rfc/rfc2246.txt, http://tools.ietf.org/rfc/rfc1994.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://tools.ietf.org/rfc/rfc3268.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf, http://tools.ietf.org/rfc/rfc4251.txt, http://tools.ietf.org/rfc/rfc5048.txt, http://tools.ietf.org/rfc/rfc4253.txt, http://tools.ietf.org/rfc/rfc4419.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://tools.ietf.org/rfc/rfc4344.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |