| name |
EPSON LM-C400/AM-C550/AM-C400 with FAX Ver.1.00 |
Logiciel Mistral Gateway IPSec version 9.0.7.2 |
| category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
active |
active |
| not_valid_after |
19.11.2029 |
28.06.2026 |
| not_valid_before |
19.11.2024 |
28.06.2021 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_32.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_32fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_32en.pdf |
| manufacturer |
SEIKO EPSON CORPORATION |
Thalès Communications |
| manufacturer_web |
https://www.epson.com/ |
https://www.thalescomminc.com/ |
| security_level |
ALC_FLR.2, EAL2 |
AVA_VAN.3, ALC_FLR.3, EAL3+ |
| dgst |
353b43f9ad2ee96e |
7bd6afa58e49bd4d |
| heuristics/cert_id |
JISEC-CC-CRP-C0832 |
ANSSI-CC-2021/32 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
1.00 |
9.0.7.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0832
- certification_date: 01.11.2024
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0832
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE security functionality The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
- evaluation_facility: Information Technology Security Center, Evaluation Department
- expiration_date: 19.11.2029
- product: EPSON LM-C400/AM-C550/AM-C400 with FAX
- product_type: Multifunction Peripheral
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_est.pdf
- toe_version: 1.00
- vendor: SEIKO EPSON CORPORATION
- expiration_date: 01.11.2029
- supplier: SEIKO EPSON CORPORATION
- toe_japan_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0832_it4873.html
- toe_overseas_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
43ce79b420f23a00 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
{} |
| pdf_data/cert_filename |
c0832_eimg.pdf |
certificat-2021_32.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: Information-technology Promotion Agency,Japan
- /CreationDate: D:20250109162218+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20250130161540+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /Subject:
- /Title: C0832_Certificate_01
- pdf_file_size_bytes: 234858
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /Author:
- /CreationDate: D:20210720171317+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210720171317+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 299643
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
c0832_erpt.pdf |
anssi-cc-2021_32fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0832-01-2024: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL2: 3
- EAL3: 2
- EAL4: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20250109170129+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20250130161123+09'00'
- /Producer: Adobe PDF Library 20.5.172
- /Title:
- pdf_file_size_bytes: 438507
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author:
- /CreationDate: D:20210720171215+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210720171215+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 188301
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
| pdf_data/st_filename |
c0832_est.pdf |
anssi-cible-cc-2021_32en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- NL:
- CC-01: 1
- CC-02: 2
- CC-03: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
|
- EAL:
- EAL3: 4
- EAL3 augmented: 1
- EAL3+: 4
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 9
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 3
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.1: 1
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_FLR.3: 6
- ALC_LCD.1: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 4
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 24
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 2
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 12
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 16
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 6
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT: 13
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 4
- FAU_STG_EXT.2: 2
- FAU_STG_EXT.4: 3
- FCO:
- FCO_CPC_EXT: 2
- FCO_CPC_EXT.1: 12
- FCO_CPC_EXT.1.1: 3
- FCO_CPC_EXT.1.2: 3
- FCO_CPC_EXT.1.3: 3
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 48
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 13
- FCS_CKM_EXT.5: 17
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 101
- FCS_COP.1: 18
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 21
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 10
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSC_EXT.2.4: 2
- FCS_TLSC_EXT.2.5: 2
- FCS_TLSS_EXT: 4
- FCS_TLSS_EXT.2: 6
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 2
- FCS_TLSS_EXT.2.3: 2
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 2
- FCS_TLSS_EXT.2.6: 2
- FDP:
- FDP_ACC.1: 5
- FDP_ETC: 2
- FDP_ETC.2: 8
- FDP_IFC: 19
- FDP_IFC.1: 9
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 13
- FDP_ITC.1: 16
- FDP_ITC.2: 26
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 10
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 14
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_PTD: 1
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_RCV.2: 5
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.2: 10
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 3
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 15
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TDC: 11
- FPT_TDC.1: 7
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 11
- D.DOC: 42
- D.FUNC: 26
- D.PROT: 8
- O:
- O.AUDIT: 5
- O.AUDIT_ACCESS: 4
- O.AUDIT_STORAGE: 4
- O.CONF: 10
- O.DOC: 10
- O.FUNC: 5
- O.INTERFACE: 5
- O.PROT: 5
- O.SOFTWARE: 5
- O.USER: 11
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHISICAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DE: 1
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 1
- A.ADMINISTRATION_NETWORK: 1
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.ALARM: 2
- A.AUDIT: 2
- A.DATA_TRANSPORTATION: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.NO_TRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_ENV_MANAGEMENT_DEVIC: 1
- A.PHYSICAL_ENV_MANAGEMENT_DEVICES: 1
- A.PHYSICAL_PROTECTION: 1
- A.POLICIES_CONTINUITY: 1
- A.REGULAR_UPDATES: 2
- A.SECURED_MANAGEMENT_DEVICES: 1
- A.SS_MMC_TO_TOE: 1
- A.TOE_ERASURE: 1
- A.TRUSTED_ADMINISTRATOR: 1
- O:
- O.AUDIT: 14
- O.AUDIT_PROTECTION: 5
- O.AUTHENTICATION_FAILURE: 9
- O.BOOT_CONTROL: 5
- O.CERTIFICATE_INJECTION: 4
- O.CRYPTO_PERIOD: 8
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 8
- O.DISPLAY_BANNER: 6
- O.LOCAL_DATA_PROTECTION: 14
- O.MANAGEMENT: 7
- O.POL_DEFAULT: 12
- O.POL_FILTERING: 8
- O.PROTECTED_COMMUNICATI: 1
- O.PROTECTED_COMMUNICATION: 2
- O.PROTECTED_COMMUNICATIONS: 12
- O.RESIDUAL_INFORMATION_C: 1
- O.RESIDUAL_INFORMATION_CLEAR: 4
- O.ROLES: 10
- O.SELF_TEST: 11
- O.SESSION_LOCK: 4
- O.SOFTWARE_UPDATES: 8
- O.SUPERVISION: 6
- O.SUPERVISION_IMPACT: 8
- O.TIME_BASE: 4
- O.VIEW_RULES: 11
- OE:
- OE.ACCESS_CONTROL_MANA: 1
- OE.ACCESS_CONTROL_MANAGEMENT_D: 1
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICE: 2
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICES: 2
- OE.ADMIN_CREDENTIALS_SEC: 1
- OE.ADMIN_CREDENTIALS_SECURE: 3
- OE.ALARM: 3
- OE.AUDIT: 2
- OE.AUDIT_RECORD: 3
- OE.DATA_TRANSPORTATION: 4
- OE.LMGT_CONNECTION: 5
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_THRU_TRAFFIC_PROTECTION: 2
- OE.PHYSICAL: 2
- OE.PHYSICAL_ENV_MANAGEM: 1
- OE.PHYSICAL_ENV_MANAGEMENT_DEVIC: 1
- OE.PHYSICAL_ENV_MANAGEMENT_DEVICES: 3
- OE.POLICIES_CONTINUITY: 2
- OE.SECURED_MANAGEMENT_: 1
- OE.SECURED_MANAGEMENT_DEVICES: 4
- OE.SS_MMC_TO_TOE: 5
- OE.TIME_TOE: 3
- OE.TOE_ERASURE: 5
- OE.TOE_INTEGRITY: 7
- OE.TOE_PRODUCTION: 3
- OE.TRUSTED_ADMIN: 3
- OE.UPDATES: 4
- T:
- T.MISUSE: 5
- T.PASSWORD_CRACKING: 5
- T.RESIDUAL_DATA: 5
- T.SECURITY_FUNCTIONALITY: 2
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 3
- T.SECURITY_FUNCTIONALITY_FAILURE: 3
- T.TIME_BASE: 3
- T.TOE_CAPTURE: 5
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
- T.UNDETECTED_ACTIVITY: 5
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 3
- T.UPDATE_COMPROMISE: 5
- T.USER_DATA_REUSE: 3
- T.WEAK_AUTHENTICATION_EN: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 3
- T.WEAK_CRYPTOGRAPHY: 3
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA256: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 23
- IKEv1: 5
- IKEv2: 21
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 4
- SSL 2.0: 1
- SSL 3.0: 2
- SSL2.0: 1
- TLS:
- TLS: 53
- TLS 1.0: 2
- TLS 1.1: 4
- TLS 1.2: 5
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 1
- curve P-256: 1
- secp256r1: 8
- secp384r1: 2
- secp521r1: 2
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 2
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 1
- RFC 4346: 2
- RFC 4868: 3
- RFC 4945: 2
- RFC 5246: 4
- RFC 5280: 5
- RFC 5282: 2
- RFC 5759: 2
- RFC 6125: 2
- RFC 6960: 1
- RFC 7296: 3
- RFC5289: 2
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope: 1
- System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY: 1
- of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20241209132032+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_ContentBits: 2
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Enabled: true
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Method: Standard
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_SiteId: 3ce358ea-700e-4f0f-bb37-fd0b7c21366c
- /ModDate: D:20250130161243+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1302442
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
- /Author: T0159776
- /CreationDate: D:20210607172705+02'00'
- /Creator: PDFCreator Free 4.2.0
- /Keywords:
- /ModDate: D:20210607172705+02'00'
- /Producer: GPL Ghostscript 9.52
- /Subject:
- /Title: CDS_Mistral IPVS9.0_63535113-306_-Llite
- pdf_file_size_bytes: 981294
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 119
|
| state/cert/convert_garbage |
False |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
False |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
False |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |