Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SAP NetWeaver Application Server Java 7.02 SP3 with Common Criteria Addendum (material no. 51039496)
BSI-DSZ-CC-0659-2011
Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
ISCB-5-RPT-C124-CR-v1
name SAP NetWeaver Application Server Java 7.02 SP3 with Common Criteria Addendum (material no. 51039496) Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
scheme DE MY
status archived active
not_valid_after 01.09.2019 17.05.2027
not_valid_before 08.02.2011 17.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C124-CERTIFICATE-v1.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0659a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C124-CR-v1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0659b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Archer%20Suite%20v6.9.1.2%20with%20the%20Archer%20IRM%20Mobile%20V1.4%20_ST_v1.0-final.pdf
manufacturer SAP AG RSA Security LLC
manufacturer_web https://www.sap.com https://rsa.com
security_level EAL4+, ALC_FLR.1 EAL2+, ALC_FLR.2
dgst 483a1a2f4248e1ca 0f38dd1ae9d80dfa
heuristics/cert_id BSI-DSZ-CC-0659-2011 ISCB-5-RPT-C124-CR-v1
heuristics/cert_lab BSI []
heuristics/cpe_matches cpe:2.3:a:sap:netweaver:7.02:sp06:*:*:*:*:*:* cpe:2.3:a:rsa:archer:6.9:*:*:*:*:*:*:*
heuristics/related_cves CVE-2014-8592, CVE-2013-6814, CVE-2014-8591, CVE-2011-4707, CVE-2013-6815, CVE-2013-1593, CVE-2020-6181, CVE-2013-1592, CVE-2014-3787, CVE-2011-5263, CVE-2013-5751, CVE-2018-2470, CVE-2013-6244, CVE-2017-5372, CVE-2014-1965 CVE-2022-37317, CVE-2022-37316, CVE-2022-26950, CVE-2020-26884, CVE-2021-33615, CVE-2022-26947, CVE-2021-41594, CVE-2020-29538, CVE-2022-26951, CVE-2022-30584, CVE-2021-29252, CVE-2022-26949, CVE-2022-30585, CVE-2022-26948, CVE-2021-33616, CVE-2020-29535, CVE-2021-38362, CVE-2021-29253
heuristics/extracted_sars ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, ATE_DPT.4, ADV_FSP.6, ADV_TDS.6, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.3, ASE_ECD.1, ALC_FLR.1, APE_OBJ.2, ALC_TAT.3, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ALC_LCD.2, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 7.02 6.9.1.2, 1.4
heuristics/scheme_data
  • cert_no: 2022-002-C124
  • certification_date: 17.05.2022
  • developer: RSA Security LLC
  • enhanced:
    • assurance_level: EAL2+ ALC_FLR.2
    • category: Other Devices and Systems
    • cert_id: C124
    • certification_date: 17.05.2022
    • developer: RSA 13200 Metcalf Avenue, Suite 300 Overland Park, Kansas 66213, The United States of America
    • expiration_date: 17.05.2027
    • mutual_recognition: CCRA
    • product: Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/ISCB-5-RPT-C124-CR-v1.pdf
    • scope: Users access the TOE via a web-based graphical user interface (GUI) or via the TOEs Mobile application. The RSA Archer Mobile application provides remote users the ability to complete their Advanced Workflow actions (edit records and add comments) on-the-go. The TOE supports business-level management of governance, risk management, and compliance (GRC). It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. There are five main components to an RSA Archer Suite installation which are Web Application, Services, Instance Database, Configuration Database and Archer IRM Mobile or RSA Archer Mobile App.
    • status: Valid
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C124/Archer_Suite_v6912_with_the_Archer_IRM_Mobile_V14__ST_v10-final.pdf
    • type: Other Devices and Systems
  • expiration_date: 17.05.2027
  • level: EAL2+ ALC_FLR.2
  • product: Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/128
maintenance_updates
pdf_data/cert_filename ISCB-5-CERT-C124-CERTIFICATE-v1.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20220522024333Z00'00'
  • /Creator: Word
  • /ModDate: D:20220522024333Z00'00'
  • /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
  • /Title: ISCB-5-CERT-C124-CERTIFICATE-v1
  • pdf_file_size_bytes: 808672
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
pdf_data/report_filename 0659a_pdf.pdf ISCB-5-RPT-C124-CR-v1.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0659-2011
    • cert_item: SAP NetWeaver Application Server Java 7.02 SP3 with Common Criteria Addendum (material no. 51039496
    • cert_lab: BSI
    • developer: SAP AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0659-2011: 20
  • MY:
    • ISCB-5-RPT-C124-CR-v1: 39
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 2: 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 6
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.2: 8
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1.1: 7
    • FAU_GEN.1.2: 7
    • FAU_GEN.2.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_SAR.3.1: 1
  • FDP:
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1.1: 2
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 7
    • FIA_UAU.5.1: 7
    • FIA_UAU.5.2: 7
    • FIA_UAU.6.1: 2
    • FIA_UID.2.1: 6
  • FMT:
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1.1: 3
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 2
  • FTA:
    • FTA_SSL.3.1: 2
    • FTA_SSL.4.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CRYPTO: 1
    • A.MANAGE: 1
    • A.PROTECT: 1
    • A.SECURE_COMMS: 1
    • A.TIME: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 6
  • Microsoft:
    • Microsoft: 8
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
    • TÜViT: 1
  • Leidos:
    • Leidos: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 11: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 23: 1
    • AIS 32: 1
    • AIS 41: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 7] Evaluation Technical Report, Version 4, 2011-02-02, Evaluation Technical Report Summary, TÜViT (confidential document) [8] Configuration list for the TOE (confidential document): [Clist_Perforce] Configuration List: 1
pdf_data/report_metadata
  • /CreationDate: D:20220522032040Z00'00'
  • /Creator: Word
  • /ModDate: D:20220522032040Z00'00'
  • /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
  • /Title: ISCB-5-RPT-C124-CR-v1
  • pdf_file_size_bytes: 1221299
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
pdf_data/st_filename 0659b_pdf.pdf Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 _ST_v1.0-final.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0659: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL1: 1
    • EAL4: 6
    • EAL4 augmented: 2
    • EAL7: 1
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_ADD: 7
  • ALC:
    • ALC_FLR.1: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 16
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 4
    • FDP_ACC.2: 7
    • FDP_ACF: 15
    • FDP_ACF.1: 11
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 9
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 31
    • FMT_MSA.1: 5
    • FMT_MSA.3: 7
    • FMT_MTD: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
  • FAU:
    • FAU_GEN: 6
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR: 9
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
  • FCS:
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS: 3
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU: 7
    • FIA_UAU.1: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 5
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 5
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 2
    • FMT_REV: 3
    • FMT_REV.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_TAB: 3
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE: 3
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 4
    • A.AUTHDATA: 4
    • A.CONNECT: 4
    • A.DEVELOP: 5
    • A.IT: 6
    • A.PROTECT: 5
    • A.UI: 4
  • O:
    • O.ACCESS: 8
    • O.AUDITING: 5
    • O.MANAGE: 8
  • OE:
    • OE.ADMIN: 4
    • OE.AUTHDATA: 4
    • OE.CONNECT: 3
    • OE.DEVELOP: 3
    • OE.IT: 6
    • OE.PROTECT: 4
    • OE.UI: 4
  • A:
    • A.CRYPTO: 3
    • A.MANAGE: 2
    • A.PROTECT: 2
    • A.SECURE_COMMS: 3
    • A.TIME: 2
  • O:
    • O.ACCESS_CONTROL: 4
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.I_AND_A: 3
    • O.LOGON_BANNER: 4
    • O.PASSWORD_CONTROLS: 3
    • O.SECURITY_MANAGEMENT: 4
    • O.SESSION_LIMITATION: 3
    • O.SESSION_TERMINATION: 4
    • O.THROTTLE: 3
  • OE:
    • OE.CRYPTO: 3
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
    • OE.SECURE_COMMS: 2
    • OE.TIME: 3
  • T:
    • T.BRUTE_FORCE: 3
    • T.DATA_COMPROMISE: 2
    • T.INAPPROPRIATE_USE: 2
    • T.INAPPRORIATE_USE: 1
    • T.NO_ACCOUNTABILITY: 2
    • T.UNATTENDED_SESSION: 3
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACTIVITY: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 11
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
pdf_data/st_metadata
  • /Author: Annette Fuchs
  • /CreationDate: D:20110128140822
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria, ST, Security Target
  • /ModDate: D:20110128140822
  • /Producer: Microsoft® Office Word 2007
  • /Subject: NWAS Java 7.02 Security Target (English)
  • /Title: NWAS Java 7.02 Security Target
  • pdf_file_size_bytes: 384898
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
  • /CreationDate: D:20220522032525Z00'00'
  • /Creator: Word
  • /ModDate: D:20220522032525Z00'00'
  • /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
  • /Title: RSA Archer 6.9.1_ST_v1.0-final
  • pdf_file_size_bytes: 1012560
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 45
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different