name |
Dell EMC XtremIO v6.3.1-5 with the 6.3.1-5 Storage Controller Software |
MX-FR15 Version C.10 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
CA |
JP |
status |
active |
archived |
not_valid_after |
14.10.2025 |
02.06.2015 |
not_valid_before |
14.10.2020 |
26.05.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/489%20EWA%202019%20CT%20no%20sig%20Eng%20v1.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/489%20EWA%202019%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XtremIO_EAL2_ST_1.7.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_est.pdf |
manufacturer |
Dell EMC |
Sharp Corporation |
manufacturer_web |
https://www.dellemc.com/en-ca/index.htm |
https://sharp-world.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
3cba86c4f89746a6 |
630ebe8ce3aab74e |
heuristics/cert_id |
489-EWA-2019 |
JISEC-CC-CRP-C0255 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
6.3.1 |
10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 14.10.2020
- level: EAL 2+ (ALC_FLR.2)
- product: Dell EMC XtremIO v6.3.1-5 with the 6.3.1-5 Storage Controller Software
- vendor: Dell EMC
|
- cert_id: JISEC-CC-CRP-C0255
- certification_date: 01.05.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0255_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as "MFD"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. TOE security functionality To counter attempts to steal image data in an MFD, the TOE provides such security functions as: - The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD, - The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-FR15
- product_type: Data protection function in Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0255_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0255_est.pdf
- toe_version: C.10
- vendor: Sharp Corporation
- expiration_date: 01.06.2015
- supplier: Sharp Corporation
- toe_japan_name: MX-FR15 C.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html
- toe_overseas_name: MX-FR15 C.10
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
489 EWA 2019 CT no sig Eng v1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20201014183908-05'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1640325
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
489 EWA 2019 CR v1.0.pdf |
c0255_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0255-01: 1
- Certification No. C0255: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110530111145+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110530111242+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 441982
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
XtremIO_EAL2_ST_1.7.pdf |
c0255_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 11
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UID.1: 9
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
|
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 2
- FDP_ITC.2: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 11
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.ACCESS: 11
- O.ADMIN: 9
- O.AUDIT: 9
- O.CRYPTO: 5
- O.IDENTAUTH: 13
- O.SERVERACCESS: 5
- O.TIME: 9
- OE:
- OE.CREDENTIALS: 6
- OE.PERSON: 10
- OE.PHYSICAL: 4
- T:
- T.PRIVILEGE: 3
- T.UNAUTHSERVER: 3
- T.UNDETECT: 2
|
- A:
- O:
- O.MANAGE: 7
- O.REMOVE: 7
- O.RESIDUAL: 8
- OE:
- OE.ERASEALL: 3
- OE.OPERATE: 3
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS 197: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Teresa MacArthur
- /Client Short Name: Client Short Name
- /Comments: CC V3.1 Security Target
Template Version 1_0
- /Company: EWA-Canada
- /CreationDate: D:20201014095443-04'00'
- /Creator: Acrobat PDFMaker 17 for Word
- /ModDate: D:20201014095506-04'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20201014135428
- /Title: Security Target
- /client full name: Dell EMC
- /document number: 2133-000-D102
- /product_name: Dell EMC™ XtremIO® v6.3.1
- /st_date: 13 October 2020
- /st_version: 1.7
- pdf_file_size_bytes: 542103
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
- /Author: K.Nakagawa
- /Company: Sharp Corporation
- /CreationDate: D:20110525112546+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /GTS_PDFXConformance: PDF/X-1a:2001
- /GTS_PDFXVersion: PDF/X-1:2001
- /ModDate: D:20110526173154+09'00'
- /Producer: Acrobat Distiller 8.2.6 (Windows)
- /Subject: MX-FR15
- /Title: Security Target
- /Trapped: /False
- pdf_file_size_bytes: 797003
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 24
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |