name |
Hitachi Command Suite Common Component Version: 7.0.1-00
|
HP StorageWorks P9000 Command View Advanced Edition Software Common Component Version: 7.0.1-00
|
category |
Access Control Devices and Systems
|
Access Control Devices and Systems
|
not_valid_before |
2011-08-15
|
2011-08-15
|
not_valid_after |
2016-09-01
|
2016-09-01
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Hitachi, Ltd.
|
Hewlett-Packard Company
|
manufacturer_web |
https://www.hitachi.com/
|
https://www.hp.com
|
security_level |
ALC_FLR.1, EAL2+ |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
|
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
6d53e443a9a706ec6d2e7b63ae3f23c093d26086e54354c4eefe2da8e5c35e90
|
5b5f5d2ff1a00f16a96a7defe6ddcd3f4c1a07cd8962e32ace3ea9ed954f221b
|
state/report/txt_hash |
5715eac33217710ca2e388d2a9cce5fe32f1a65cadc3bd0580d39d458f1a50ce
|
4ddbb9ff4df0fce457ef8fa8416a65d467cff3b92e078439c6b54f4b8dfb0be0
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f2f4098ecaac915ebf4b427ba932a01c2beb24bae1c44387fefb470a713cfb0e
|
8de42b7fd907145982402714b8e2d7ea70089bad3caa44fdb48e95f60a4e3bf4
|
state/st/txt_hash |
4e4e716e35185a7b2c3ddb981dbc6ac44b0e4f5b4d197685712c314bb84a98ad
|
28a17f907fb14ae008c7215b51b3619888f48f6537337491ca96ad43732e6809
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0303
|
JISEC-CC-CRP-C0305
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
cpe:2.3:h:hp:9000:-:*:*:*:*:*:*:*, cpe:2.3:a:hp:p9000_command_view_advanced_edition_software:-:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ADV_FSP.2, ALC_CMC.2, ALC_FLR.1, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
ADV_FSP.2, ALC_CMC.2, ALC_FLR.1, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2 |
heuristics/extracted_versions |
7.0.1 |
7.0.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
CVE-2016-2003, CVE-2010-4107 |
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0303
- supplier:
Hitachi, Ltd.
- toe_overseas_name:
-----
- expiration_date:
2016-09
- claim:
EAL2+
ALC_FLR.1
- certification_date:
2011-08
- toe_overseas_link:
None
- toe_japan_name:
Hitachi Command Suite Common Component
7.0.1-00
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
- enhanced:
- product:
Hitachi Command Suite Common Component
- toe_version:
7.0.1-00
- product_type:
Foundational Module Software
- certification_date:
2011-08-15
- cc_version:
3.1
- assurance_level:
EAL2 Augmented with ALC_FLR.1
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
- report_link:
https://www.ipa.go.jp/en/security/c0303_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0303_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products.
TOE security functionality
TOE provides the following security functionality:
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
|
- cert_id:
C0305
- supplier:
Hewlett-Packard Company
- toe_overseas_name:
HP StorageWorks P9000 Command View Advanced Edition Software Common Component
7.0.1-00
- expiration_date:
2016-09
- claim:
EAL2+
ALC_FLR.1
- certification_date:
2011-08
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0305_it0331.html
- toe_japan_name:
-----
- enhanced:
- product:
HP StorageWorks P9000 Command View Advanced Edition Software Common Component
- toe_version:
7.0.1-00
- product_type:
Foundational Module Software
- certification_date:
2011-08-15
- cc_version:
3.1
- assurance_level:
EAL2 Augmented with ALC_FLR.1
- vendor:
Hewlett-Packard Company
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
- report_link:
https://www.ipa.go.jp/en/security/c0305_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0305_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0305_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: HP StorageWorks P9000 Device Manager Software, HP StorageWorks P9000 Replication Manager Software, HP StorageWorks P9000 Tiered Storage Manager Software, and HP StorageWorks P9000 Tuning Manager Software. These products, in combination with TOE, are commonly referred to as HP StorageWorks P9000 Command View Advanced Edition Software. TOE is a foundational module for HP StorageWorks P9000 Command View Advanced Edition Software, and is packaged with all products.
TOE security functions
TOE provides the following security functionality:
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
|
heuristics/scheme_data/cert_id |
C0303
|
C0305
|
heuristics/scheme_data/certification_date |
2011-08
|
2011-08
|
heuristics/scheme_data/claim |
EAL2+
ALC_FLR.1
|
EAL2+
ALC_FLR.1
|
heuristics/scheme_data/enhanced |
- product:
Hitachi Command Suite Common Component
- toe_version:
7.0.1-00
- product_type:
Foundational Module Software
- certification_date:
2011-08-15
- cc_version:
3.1
- assurance_level:
EAL2 Augmented with ALC_FLR.1
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
- report_link:
https://www.ipa.go.jp/en/security/c0303_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0303_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products.
TOE security functionality
TOE provides the following security functionality:
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
|
- product:
HP StorageWorks P9000 Command View Advanced Edition Software Common Component
- toe_version:
7.0.1-00
- product_type:
Foundational Module Software
- certification_date:
2011-08-15
- cc_version:
3.1
- assurance_level:
EAL2 Augmented with ALC_FLR.1
- vendor:
Hewlett-Packard Company
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
- report_link:
https://www.ipa.go.jp/en/security/c0305_erpt.pdf
- cert_link: https://www.ipa.go.jp/en/security/c0305_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0305_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: HP StorageWorks P9000 Device Manager Software, HP StorageWorks P9000 Replication Manager Software, HP StorageWorks P9000 Tiered Storage Manager Software, and HP StorageWorks P9000 Tuning Manager Software. These products, in combination with TOE, are commonly referred to as HP StorageWorks P9000 Command View Advanced Edition Software. TOE is a foundational module for HP StorageWorks P9000 Command View Advanced Edition Software, and is packaged with all products.
TOE security functions
TOE provides the following security functionality:
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented with ALC_FLR.1
|
EAL2 Augmented with ALC_FLR.1
|
heuristics/scheme_data/enhanced/cc_version |
3.1
|
3.1
|
heuristics/scheme_data/enhanced/certification_date |
2011-08-15
|
2011-08-15
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products.
TOE security functionality
TOE provides the following security functionality:
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
|
PRODUCT DESCRIPTION
Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: HP StorageWorks P9000 Device Manager Software, HP StorageWorks P9000 Replication Manager Software, HP StorageWorks P9000 Tiered Storage Manager Software, and HP StorageWorks P9000 Tuning Manager Software. These products, in combination with TOE, are commonly referred to as HP StorageWorks P9000 Command View Advanced Edition Software. TOE is a foundational module for HP StorageWorks P9000 Command View Advanced Edition Software, and is packaged with all products.
TOE security functions
TOE provides the following security functionality:
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
|
heuristics/scheme_data/enhanced/evaluation_facility |
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
|
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
|
heuristics/scheme_data/enhanced/product |
Hitachi Command Suite Common Component
|
HP StorageWorks P9000 Command View Advanced Edition Software Common Component
|
heuristics/scheme_data/enhanced/product_type |
Foundational Module Software
|
Foundational Module Software
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0303_erpt.pdf
|
https://www.ipa.go.jp/en/security/c0305_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0303_est.pdf
|
https://www.ipa.go.jp/en/security/c0305_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
7.0.1-00
|
7.0.1-00
|
heuristics/scheme_data/enhanced/vendor |
Hitachi, Ltd.
|
Hewlett-Packard Company
|
heuristics/scheme_data/expiration_date |
2016-09
|
2016-09
|
heuristics/scheme_data/supplier |
Hitachi, Ltd.
|
Hewlett-Packard Company
|
heuristics/scheme_data/toe_japan_name |
Hitachi Command Suite Common Component
7.0.1-00
|
-----
|
heuristics/scheme_data/toe_overseas_link |
None
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0305_it0331.html
|
heuristics/scheme_data/toe_overseas_name |
-----
|
HP StorageWorks P9000 Command View Advanced Edition Software Common Component
7.0.1-00
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0303_erpt.pdf
|
c0305_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0303-01:
1
- Certification No. C0303:
1
|
- CRP-C0305-01:
1
- Certification No. C0305:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ILLEGAL_ACCESS:
2
- T.UNAUTHORISED_ACCESS:
2
- A:
- A.PHYSICAL:
1
- A.ADMINISTRATORS:
1
- A.PASSWORD:
1
- A.SECURE_CHANNEL:
1
- A.NETWORKS:
1
- A.SRV_MGMT:
1
- A.CLIENTS:
1
- A.VERSION:
1
|
- T:
- T.ILLEGAL_ACCESS:
2
- T.UNAUTHORISED_ACCESS:
2
- A:
- A.PHYSICAL:
1
- A.ADMINISTRATORS:
1
- A.PASSWORD:
1
- A.SECURE_CHANNEL:
1
- A.NETWORKS:
1
- A.SRV_MGMT:
1
- A.CLIENTS:
1
- A.VERSION:
1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_FLR.1:
3
- ALC_FLR.2:
1
|
- ALC:
- ALC_FLR.1:
3
- ALC_FLR.2:
1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2:
4
- EAL2 augmented:
1
|
- EAL:
- EAL2:
4
- EAL2 augmented:
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
IPA/JISEC
|
IPA/JISEC
|
pdf_data/report_metadata//Company |
IPA
|
IPA
|
pdf_data/report_metadata//CreationDate |
D:20110928100804+09'00'
|
D:20110927171053+09'00'
|
pdf_data/report_metadata//Creator |
Word 用 Acrobat PDFMaker 8.1
|
Word 用 Acrobat PDFMaker 8.1
|
pdf_data/report_metadata//Manager |
IPA
|
IPA
|
pdf_data/report_metadata//ModDate |
D:20110928100931+09'00'
|
D:20110928093233+09'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.3.0 (Windows)
|
Acrobat Distiller 8.3.0 (Windows)
|
pdf_data/report_metadata//Title |
CRP-e
|
CRP-e
|
pdf_data/report_metadata/pdf_file_size_bytes |
345195
|
347111
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
38
|
36
|
pdf_data/st_filename |
c0303_est.pdf
|
c0305_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL2:
7
- EAL2 augmented:
3
- cc_sar:
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
6
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
- cc_sfr:
- FDP:
- FDP_ACC.1:
15
- FDP_ACF.1:
12
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
2
- FDP_ACC:
1
- FDP_ACF:
1
- FIA:
- FIA_UAU.1:
11
- FIA_UID.1:
11
- FIA_SOS.1:
8
- FIA_ATD.1:
10
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.1.1:
1
- FIA_ATD.1.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UID:
1
- FIA_SOS:
1
- FIA_USB:
1
- FIA_AFL:
1
- FMT:
- FMT_MSA.3:
9
- FMT_MSA.1:
10
- FMT_SMR.1:
13
- FMT_SMF.1:
11
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
10
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA:
2
- FMT_MTD:
1
- FMT_SMF:
1
- FMT_SMR:
1
- FTA:
- FTA_TAB.1:
8
- FTA_TAB.1.1:
1
- FTA_TAB:
1
- cc_claims:
- O:
- O.MGMT:
9
- O.BANNER:
6
- O.PASSWORD:
7
- T:
- T.ILLEGAL_ACCESS:
4
- T.UNAUTHORISED_ACCESS:
3
- A:
- A.PHYSICAL:
4
- A.NETWORKS:
3
- A.ADMINISTRATORS:
3
- A.SECURE_CHANNEL:
3
- A.VERSION:
4
- A.PASSWORD:
3
- A.CLIENTS:
4
- A.SRV_MGMT:
3
- A.ADMINISTROTORS:
1
- OE:
- OE.SECURE_CHANNEL:
4
- OE.BANNER:
4
- OE.PASSWORD:
4
- vendor:
- Microsoft:
- Microsoft Corporation:
4
- Microsoft:
4
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL2:
7
- EAL2 augmented:
3
- cc_sar:
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
6
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
- cc_sfr:
- FDP:
- FDP_ACC.1:
15
- FDP_ACF.1:
12
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
2
- FDP_ACC:
1
- FDP_ACF:
1
- FIA:
- FIA_UAU.1:
11
- FIA_UID.1:
11
- FIA_SOS.1:
8
- FIA_ATD.1:
10
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.1.1:
1
- FIA_ATD.1.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UID:
1
- FIA_SOS:
1
- FIA_USB:
1
- FIA_AFL:
1
- FMT:
- FMT_MSA.3:
9
- FMT_MSA.1:
10
- FMT_SMR.1:
13
- FMT_SMF.1:
11
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
10
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA:
2
- FMT_MTD:
1
- FMT_SMF:
1
- FMT_SMR:
1
- FTA:
- FTA_TAB.1:
8
- FTA_TAB.1.1:
1
- FTA_TAB:
1
- cc_claims:
- O:
- O.MGMT:
9
- O.BANNER:
6
- O.PASSWORD:
7
- T:
- T.ILLEGAL_ACCESS:
4
- T.UNAUTHORISED_ACCESS:
3
- A:
- A.PHYSICAL:
4
- A.NETWORKS:
3
- A.ADMINISTRATORS:
3
- A.SECURE_CHANNEL:
3
- A.VERSION:
4
- A.PASSWORD:
3
- A.CLIENTS:
4
- A.SRV_MGMT:
3
- A.ADMINISTROTORS:
1
- OE:
- OE.SECURE_CHANNEL:
4
- OE.BANNER:
4
- OE.PASSWORD:
4
- vendor:
- Microsoft:
- Microsoft Corporation:
4
- Microsoft:
4
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/st_metadata//Author |
Hitachi, Ltd. Software Division
|
Hewlett-Packard Company
|
pdf_data/st_metadata//CreationDate |
D:20110926112144
|
D:20110926112601
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//ModDate |
D:20110926112144
|
D:20110926112601
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Subject |
HSCC-ST
|
CVAE-ST
|
pdf_data/st_metadata//Title |
Hitachi Command Suite Common Component ST
|
HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
455862
|
448528
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
58
|
57
|
dgst |
3d4662c844b7ac14
|
c63773cb15a5150c
|