name |
Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM |
Microsoft Exchange Server 2010 Enterprise |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
CA |
AU |
status |
archived |
archived |
not_valid_after |
19.04.2018 |
01.09.2019 |
not_valid_before |
16.07.2013 |
15.09.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Microsoft_Exchange_Server_EAL1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Microsoft_Exchange_Server_EAL1_ST.pdf |
manufacturer |
Belkin International, Inc. |
Microsoft Corporation |
manufacturer_web |
https://www.belkin.com |
https://www.microsoft.com |
security_level |
EAL4+, ALC_FLR.3 |
EAL1+, ALC_FLR.3 |
dgst |
40eda3a9b18267e3 |
f05d921f3c8e4f8b |
heuristics/cert_id |
383-4-270 |
Certificate Number: 2010/68 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_FLR.3, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
- |
2010 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
fd5d86dc01df0437 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
belkin-cert-eng.pdf |
Microsoft_Exchange_Server_EAL1.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-270 CR
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
- AU:
- Certificate Number: 2010/68: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 2
- EAL4: 1
|
- EAL:
- EAL1: 8
- EAL1 augmented: 5
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 29
- Microsoft Corporation: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- it should be noted that the way these external lists are complied and transferred to the TOE are out of scope of the evaluation. 2.6 Usage 2.6.1 Evaluated Configuration 27 The evaluated configuration is: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: User
- /CCEF: CCEF name
- /CR date: dd month yyyy
- /CR version: x.x
- /Certificate date: dd month yyyy
- /Comments:
- /Company:
- /CreationDate: D:20131004084035-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: Developer name
- /Document number: 383-4-xx-CR
- /ETR title, version, date: ETR title, version, date
- /Evaluation completion date: dd month yyyy
- /Manager:
- /ModDate: D:20131004084142-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ST Title: ST title
- /ST date: dd month yyyy
- /ST version: ST version
- /Sponsor: Sponsor
- /Subject:
- /TOE Version: 5.0
- /TOE name and version: TOE name and version
- /TOE short name: TOE short name
- /Title: EAL 4+ Evaluation of Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
- pdf_file_size_bytes: 64923
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /AISEF: stratsec
- /Author: roslyn.dinkgreve
- /Category: Report
- /Cert_Level: EAL1 augmented with ALC_FLR.3
- /Company: Australasian Information Security Evaluation Program
- /CreationDate: D:20100920131525+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Developer: Microsoft Corporation
- /IssueDate: 15 September 2010
- /ModDate: D:20100920131544+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Product: Microsoft Exchange Server 2010 Enterprise (English) 64-bit
- /SourceModified: D:20100920031325
- /Subject: Certificate Number: 2010/68
- /Title: Certification Report
- /docVersion: 1.1
- pdf_file_size_bytes: 249728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
belkin-sec-eng.pdf |
Microsoft_Exchange_Server_EAL1_ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 4: 68
- EAL 4 augmented: 65
- EAL4: 1
|
- EAL:
- EAL1: 10
- EAL1 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 2
- ALC_FLR.3: 71
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_FLR.3: 7
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.1: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 5
- FDP_ETC: 1
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 33
- FDP_IFC.1: 6
- FDP_IFF: 27
- FDP_IFF.1: 12
- FDP_ITC: 1
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FMT:
- FMT_MSA: 4
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 3
- FMT_SMR.1: 3
- FPT:
- FPT_PHP: 2
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
|
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 7
- FDP_ACF: 19
- FDP_ACF.1: 5
- FDP_IFC: 30
- FDP_IFC.1: 12
- FDP_IFF: 60
- FDP_IFF.1: 10
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID.2: 3
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA: 50
- FMT_MSA.1: 27
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.PHYSICAL: 2
- O:
- O.CONF: 7
- O.INDICATE: 3
- O.ROM: 11
- O.SELECT: 3
- O.SWITCH: 7
- O.TAMPER: 6
- O.UNIDIR: 11
- O.USBDETECT: 6
- OE:
- OE.ACCESS: 3
- OE.MANAGE: 2
- OE.NOEVIL: 3
- OE.PHYSICAL: 2
- T:
- T.INFECTED: 3
- T.INVALIDUSB: 3
- T.PERIP: 3
- T.RESIDUAL: 3
- T.ROM_PROG: 3
- T.SPOOF: 3
- T.TAMPER: 3
- T.TRANSFER: 3
|
- OE:
- OE.BLOCKLIST: 1
- OE.COM_PROT: 1
- OE.INSTALL: 1
- OE.PHYSICAL: 1
- OE.PLATFORM: 2
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Microsoft:
- Samsung:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: krshann
- /CreationDate: D:20130909140137-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20130910104630-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - Belkin Secure DVI KVM Switch ST Rev 1_01 updated by keith.docx
- pdf_file_size_bytes: 739602
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
- /Author: Ken Hendrie (stratsec)
- /Category: ASE
- /Classification:
- /Client: Microsoft Corporation
- /Company: stratsec
- /CreationDate: D:20100920114636+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Document Identifier: E14_EAL1_ASE
- /Document Phase: Released
- /Document Type: ASE
- /EAL: EAL1 augmented with ALC_FLR.3
- /Manager: Amy Blumenfield (amyblu)
- /ModDate: D:20100920114901+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Release Date: 5-JUL-10
- /SourceModified: D:20100920014559
- /Subject: Security Target
- /TOE Build: 14.00.0639.021
- /TOE Full Title: Exchange Server 2010 Enterprise (English) 64-bit
- /TOE Title: Exchange Server 2010
- /Title: Exchange Server 2010
- /Version: 1.0
- pdf_file_size_bytes: 753176
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |