Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EMC® Disk Library v3.1
383-4-63
Hitachi Unified Storage 150 Microprogram Version:0917/A
JISEC-CC-CRP-C0419
name EMC® Disk Library v3.1 Hitachi Unified Storage 150 Microprogram Version:0917/A
category Other Devices and Systems Access Control Devices and Systems
scheme CA JP
not_valid_after 29.09.2015 09.01.2019
not_valid_before 22.01.2008 11.12.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-disk-cert-e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0419_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-disk_sec-e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0419_est.pdf
manufacturer EMC Corporation Hitachi, Ltd.
manufacturer_web https://www.emc.com/ https://www.hitachi.com/
dgst 4632de594bdb055c 7105ba31f1b942ae
heuristics/cert_id 383-4-63 JISEC-CC-CRP-C0419
heuristics/cert_lab CANADA []
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ASE_TSS.1, ADV_TDS.1, ASE_INT.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, AGD_OPE.1, ADV_ARC.1, AVA_VAN.2, ASE_CCL.1, ASE_REQ.2
heuristics/extracted_versions 3.1 150, 0917
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0419
  • certification_date: 01.12.2013
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 3.1 Release3
    • cert_link: https://www.ipa.go.jp/en/security/c0419_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a control program (software) operating in the disk array “Hitachi Unified Storage 150” that is a storage product. The TOE controls accesses to its storage areas from host computers connected to the disk array. The TOE does not have assumed threats. Security functions of TOE satisfy the assumed organizational security policy and are provided to customers. TOE security functionality Three kinds of main security functions of this TOE exist as follows. - Exclusive control of storage areaFunction to access control to storage area according to requests from host computer. - Account AuthenticationUser's login facility and control of access to each function of the TOE. - AuditAudit log function that records event of administrative operations.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: Hitachi Unified Storage 150 Microprogram
    • product_type: Storage System control software
    • report_link: https://www.ipa.go.jp/en/security/c0419_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0419_est.pdf
    • toe_version: 0917/A
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.01.2019
  • supplier: Hitachi, Ltd.
  • toe_japan_name: Hitachi Unified Storage 150 Microprogram0917/A
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0419_it2406.html
  • toe_overseas_name: Hitachi Unified Storage 150 Microprogram0917/A
pdf_data/report_filename emc-disk-cert-e.pdf c0419_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-63-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-63: 1
    • 383-4-63-CR: 1
  • JP:
    • CRP-C0419-01: 1
    • Certification No. C0419: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL 2+: 6
  • EAL:
    • EAL2: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.S: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • ECSEC:
    • ECSEC Laboratory: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • ISO:
    • ISO/IEC15408: 10
pdf_data/report_metadata
  • /Author: krshann
  • /CreationDate: D:20080205135822Z
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20080205101505-05'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - CR-EMC_EDL v0.9.doc
  • pdf_file_size_bytes: 172246
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /CreationDate: D:20140529133908+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20140529133928+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 509205
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
pdf_data/st_filename emc-disk_sec-e.pdf c0419_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2+: 8
  • EAL:
    • EAL2: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_FLR.1: 5
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 2
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_UAU.1: 2
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 11
    • FIA_UID.2: 13
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 2
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 5
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 2
    • FPT_SEP.1.2: 2
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 8
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FRU:
    • FRU_RSA.1: 8
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
  • O:
    • O.ADMIN: 6
    • O.BYPASS: 6
    • O.PROTECT: 7
  • OE:
    • OE.MANAGE: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.PROPER_NAME_ASSIGNME: 2
    • OE.PROPER_NAME_ASSIGNMENT: 2
    • OE.SECURE_COMMUNICATION: 2
    • OE.SECURE_COMMUNICATIONS: 2
    • OE.SECURE_SERVERS: 4
  • T:
    • T.DATA_CORRUPTION: 2
    • T.IMPROPER_SERVER: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:2005: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC15408: 12
pdf_data/st_metadata
  • /Author: Communications Security Establishment
  • /CreationDate: D:20080801130722-05'00'
  • /Creator: PDFCreator Version 0.9.0
  • /Keywords: EMC® Disk Library v3.1
  • /ModDate: D:20080124130313-05'00'
  • /Producer: AFPL Ghostscript 8.53
  • /Subject:
  • /Title: EMC Disk Library ST v1_02
  • pdf_file_size_bytes: 503356
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 37
  • /Author: ODA-USER
  • /CreationDate: D:2014052817414209'00'
  • /Creator: PrimoPDF http://www.primopdf.com/
  • /ModDate: D:2014052817414209'00'
  • /Producer: PrimoPDF
  • /Title: Microsoft Word - HUS150_ST.doc
  • pdf_file_size_bytes: 432752
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 48
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different