name |
IMELO-Secure, Version 1.1 |
Red Hat Enterprise Linux Version 7.1 |
category |
Other Devices and Systems |
Operating Systems |
scheme |
DE |
DE |
status |
active |
archived |
not_valid_after |
14.04.2027 |
15.11.2022 |
not_valid_before |
14.12.2022 |
15.11.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0949a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0949b_pdf.pdf |
manufacturer |
SSI Schäfer Plastics GmbH |
Red Hat, Inc. |
manufacturer_web |
https://ssi-plastic.com |
https://www.redhat.com |
security_level |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
{} |
dgst |
3da0a90c7bb5a9cd |
89956d7083e870c6 |
heuristics/cert_id |
BSI-DSZ-CC-1013-V2-2022 |
BSI-DSZ-CC-0949-2017 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2001-0690, CVE-2003-0247, CVE-2002-0044, CVE-2000-0701, CVE-2002-0045, CVE-2001-0889, CVE-2002-1160, CVE-2001-0787, CVE-2002-0836, CVE-2002-1155, CVE-1999-0297, CVE-2000-0017, CVE-2002-0638, CVE-2001-0886, CVE-2003-0464, CVE-2007-3103, CVE-1999-0037, CVE-2001-0872, CVE-2016-7091, CVE-2015-7833, CVE-2003-0364, CVE-2001-1383, CVE-2002-1232, CVE-1999-0894, CVE-1999-0798, CVE-2003-0434, CVE-2001-0635, CVE-2003-0188, CVE-2001-0977, CVE-2001-1002, CVE-2003-0248, CVE-2001-0859, CVE-2003-0461, CVE-2003-0041, CVE-2003-0354, CVE-2003-0194, CVE-2017-1000253, CVE-1999-1288, CVE-2002-0080, CVE-2000-1207, CVE-2002-0083, CVE-2003-0370 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ATE_IND.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2 |
ASE_INT.1, ALC_DVS.2, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, APE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, APE_CCL.1, ATE_DPT.1, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ADV_SPM.1 |
heuristics/extracted_versions |
1.1 |
7.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1013-2017 |
BSI-DSZ-CC-0754-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1013-2017 |
BSI-DSZ-CC-0754-2012 |
heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-1013-V2-2022
- certification_date: 14.12.2022
- enhanced:
- applicant: SSI Schäfer Plastics GmbH Kalkofen 6 58638 Iserlohn
- assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 14.12.2022
- description: The TOE is referred to as IMELO-Secure 1.0. It is a waste bin identification system developed by Institut für Entsorgung und Umwelttechnik GmbH. The TOE is evaluated and certified conform to the PP „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste bin identification systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1013-V2-2022', 'description': 'Environment.'}), frozendict({'id': 'BSI-DSZ-CC.1013-2017', 'description': 'Security Target'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 13.12.2027
- product: IMELO-Secure, Version 1.1
- protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2b_pdf.pdf?__blob=publicationFile&v=3
- product: IMELO-Secure, Version 1.1
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/1013_1013V2.html
- vendor: SSI Schäfer Plastics GmbH
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
f1e8c937d15e713a |
39d257b42a3657cd |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_gpos_v3.9.pdf |
pdf_data/cert_filename |
1013V2c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1013-V2-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ASE:
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
- /Title: Zertifikat BSI-DSZ-CC-1013-V2-2022
- pdf_file_size_bytes: 457534
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1013V2a_pdf.pdf |
0949a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-1013-V2-2022
- cert_item: IMELO-Secure, Version 1.1
- cert_lab: BSI
- developer: SSI Schäfer Plastics GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0949-2017
- cert_item: Red Hat Enterprise Linux Version 7.1
- cert_lab: BSI
- developer: Red Hat
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: General-Purpose Operating System Protection Profile Version 3.9, 6 December 2012, OSPP Technical Community
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1013-: 1
- BSI-DSZ-CC-1013-2017: 2
- BSI-DSZ-CC-1013-V2-2022: 11
|
- DE:
- BSI-DSZ-CC-0754-2012: 2
- BSI-DSZ-CC-0949-2017: 19
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0010-2004: 1
- BSI-PP-0010-2004: 2
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 2: 1
- EAL 4: 1
- EAL1+: 1
|
- EAL:
- EAL 1: 7
- EAL 2: 5
- EAL 3: 4
- EAL 4: 6
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL4: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ASE:
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.1: 2
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 2
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 4
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 2
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 2
- ASE_ECD: 1
- ASE_ECD.1: 2
- ASE_INT: 1
- ASE_INT.1: 2
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 2
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 2
- ASE_SPD: 1
- ASE_SPD.1: 2
- ASE_TSS: 1
- ASE_TSS.1: 2
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 2
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 2
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 3
- AVA_VAN.1: 1
- AVA_VAN.2: 2
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2015-5157: 1
- CVE-2017-2636: 1
- CVE-2017-6074: 1
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 20: 2
- AIS 32: 1
- AIS 38: 1
- FIPS:
- FIPS180-4: 5
- FIPS186-4: 3
- FIPS197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC2104: 1
- RFC2404: 1
- RFC2409: 1
- RFC3447: 1
- RFC3526: 1
- RFC4251: 1
- RFC4252: 3
- RFC4253: 7
- RFC5647: 1
- RFC6668: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Version 4, Date 2017-06-02, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] General-Purpose Operating System Protection Profile Version 3.9, 6 December 2012, OSPP: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for the TOE: CI list for source, Date 2016-12-02, File name rhel-71-brew-logs-20161201.tar.bz2 (confidential document) [10] EAL4 Evaluated Configuration Guide for Red Hat Enterprise Linux 7.1, Version 0.25, Date: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
- /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
- /Title: Zertifizierungsreport BSI-DSZ-CC-1013-V2-2022
- pdf_file_size_bytes: 758234
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
|
pdf_data/st_filename |
1013V2b_pdf.pdf |
0949b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0010-: 1
- BSI-PP-0010-2004: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL1: 1
- EAL1 augmented: 1
- EAL1+: 8
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMS: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 2
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_DAU: 6
- FDP_DAU.1: 6
- FDP_DAU.1.1: 5
- FDP_DAU.1.2: 5
- FDP_ITT: 5
- FDP_ITT.1: 1
- FDP_ITT.5: 16
- FDP_ITT.5.1: 6
- FDP_SDI: 3
- FDP_SDI.1: 9
- FDP_SDI.1.1: 5
- FPT:
- FRU:
- FRU_FLT.1: 6
- FRU_FLT.1.1: 5
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 2
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 25
- FDP_ACC.1.1: 2
- FDP_ACF.1: 23
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF.1: 12
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 4
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.2: 12
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.1: 26
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 19
- FMT_MSA.1.1: 2
- FMT_MSA.3: 22
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MSA.4: 7
- FMT_MSA.4.1: 1
- FMT_MTD.1: 52
- FMT_MTD.1.1: 9
- FMT_REV.1: 14
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 12
- FMT_SMF_RMT: 1
- FMT_SMF_RMT.1: 8
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.1: 8
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 8
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.AUTHUSER: 2
- A.CONNECT: 5
- A.DETECT: 3
- A.MANAGE: 5
- A.PEER: 7
- A.PHYSICAL: 4
- A.TRAINEDUSER: 3
- O:
- O.AUDITING: 14
- O.DISCRETIONARY: 8
- O.MANAGE: 27
- O.NETWORK: 8
- O.SUBJECT: 8
- O.TRUSTED_CHANNEL: 9
- O.UNATTENDED_SESSION: 5
- OE:
- OE.ADMIN: 6
- OE.INFO_PROTECT: 7
- OE.INSTALL: 4
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 3
- OE.RECOVER: 3
- OE.REMOTE: 4
- OE.TRUSTED: 5
- T:
- T.ACCESS: 17
- T.IA: 6
- T.RESTRICT: 3
- T.UNATTENDED_SESSION: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-20012-09-001: 1
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 3
- CCMB-2012-09-003: 3
- CCMB-2012-09-004: 1
|
- FIPS:
- FIPS 140-2: 1
- FIPS 186-3: 1
- RFC:
- RFC 2409: 2
- RFC 2460: 1
- RFC 3484: 1
- RFC 3526: 1
- RFC 3542: 1
- RFC 4213: 1
- RFC 4252: 1
- RFC 4346: 1
- RFC 5114: 1
- RFC 5246: 1
- RFC 5647: 2
- RFC 5996: 1
- RFC2409: 1
- RFC3526: 1
- RFC4252: 8
- RFC4253: 7
- RFC4352: 2
- RFC4419: 1
- RFC5656: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
pdf_data/st_metadata |
- /Author: Hartmut Möllmann;[email protected];Matthias Spielmann;Ulrich Schurkus
- /Keywords: CC-Dokumentation
- /Subject: Sicherheitsvorgaben
- /Title: Sicherheitsvorgabe für das Behälter Identifikationssystem „IMELO-Secure“ Version 1.0
- pdf_file_size_bytes: 747264
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |