name |
TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E) V1.00J |
Cisco Adaptive Security Appliances (ASA) Firewall and Virtual Private Network (VPN) Platform, version 9.4(1) |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
AU |
status |
archived |
archived |
not_valid_after |
06.06.2016 |
11.10.2021 |
not_valid_before |
30.05.2011 |
21.07.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0292_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR_Cisco_ASA_9.4(1)_v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0292_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Cisco_ASA_9.4(1).pdf |
manufacturer |
KYOCERA MITA Corporation |
Cisco Systems, Inc. |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.cisco.com |
security_level |
EAL3 |
{} |
dgst |
4a593d8d91a65cd9 |
29ad4a7a7df713b8 |
heuristics/cert_id |
JISEC-CC-CRP-C0292 |
Certificate Number: 2015/93 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:h:kyocera:taskalfa_3550ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_5550ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_3050ci:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_305:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_4550ci:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
1.00 |
9.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0292
- certification_date: 01.05.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0292_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 3050ci - TASKalfa 3550ci - TASKalfa 4550ci - TASKalfa 5550ci This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E)
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0292_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0292_est.pdf
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.06.2016
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0292_it0322.html
- toe_japan_name: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E) V1.00J
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
bb67fb1b4f10e7a5, d7508f508083d040, ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0292_erpt.pdf |
CR_Cisco_ASA_9.4(1)_v1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0292-01: 1
- Certification No. C0292: 1
|
- AU:
- Certification Report 2015/93: 1
- FR:
- Certification Report 2015/93: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 33
- Cisco Systems: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110907133157+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110907133231+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 2223894
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
- /Author: ACA
- /Company: Department of Defence
- /CreationDate: D:20150721134354+10'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20150721134357+10'00'
- /Objective-Classification: [Inherited - Restricted]
- /Objective-CreationStamp: D:20150716
- /Objective-Id: R22840688
- /Objective-IsApproved: 0
- /Objective-IsPublished: 0
- /Objective-ModificationStamp: D:20150721
- /Objective-Owner: Chan, Hin (Mr)(I&S ASD)
- /Objective-Parent: Certification
- /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Defence Signals Directorate:DSD : Defence Signals Directorate (DSD):CISD:ASCS:CSPD:Evals:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFC-T0083 Cisco ASA 9.4(1):Certification:
- /Objective-State: Being Edited
- /Objective-Title: Cisco _ASA_9.4(1)CR_V0.1
- /Objective-Version: 0.5
- /Objective-VersionNumber: 5
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20150721034313
- /Title:
- pdf_file_size_bytes: 207919
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
c0292_est.pdf |
ST_Cisco_ASA_9.4(1).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 2
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 28
- FCS_COP.1.1: 4
- FCS_IKE_EXT.1: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT.1: 7
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 4
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.6: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.5: 1
- FIA_UIA_EXT.1: 6
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SFR.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
- FPT_PTD_EXT.1: 2
- FPT_RPL.1: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FRU:
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 2
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTA_VCM_EXT.1: 5
- FTA_VCM_EXT.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 4
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 4
- O:
- O.ADDRESS_: 1
- O.ADDRESS_FILTERING: 5
- O.ASSIGNED_PRIV: 1
- O.ASSIGNED_PRIVATE_ADDR: 2
- O.ASSIGNED_PRIVATE_ADDRESS: 1
- O.AUTHENTICATIO: 1
- O.AUTHENTICATION: 5
- O.CLIENT_ESTABLI: 1
- O.CLIENT_ESTABLISHMENT_: 2
- O.CLIENT_ESTABLISHMENT_CONSTRAINTS: 1
- O.CRYPTOGRAPHI: 1
- O.CRYPTOGRAPHIC_FUNCTI: 1
- O.CRYPTOGRAPHIC_FUNCTIO: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.DISPLAY_: 1
- O.DISPLAY_BANNER: 3
- O.FAIL_SECURE: 6
- O.PORT_FILTERING: 4
- O.PROTECTED_: 1
- O.PROTECTED_COMMUNICA: 1
- O.PROTECTED_COMMUNICAT: 1
- O.PROTECTED_COMMUNICATIONS: 3
- O.RELATED_: 1
- O.RELATED_CONNECTION_FI: 2
- O.RELATED_CONNECTION_FILTERING: 3
- O.REMOTE_SESSIO: 1
- O.REMOTE_SESSION_TERMIN: 2
- O.REMOTE_SESSION_TERMINATION: 3
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION_: 2
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.RESOURCE_AVAILABILITY: 1
- O.SESSION_LOCK: 6
- O.STATEFUL_: 1
- O.STATEFUL_INSPECTION: 3
- O.SYSTEM_: 1
- O.SYSTEM_MONITORING: 5
- O.TOE_: 1
- O.TOE_ADMINISTRATION: 5
- O.TSF_SELF_TEST: 4
- O.VERIFIABLE_: 1
- O.VERIFIABLE_UPDATES: 3
- OE:
- OE.CONNECTIONS: 2
- OE.NO_GENERAL_: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.TRUSTED_: 1
- OE.TRUSTED_ADMIN: 2
- T:
- T.ADMIN_ERROR: 4
- T.DATA_INTEGRITY: 2
- T.HIJACKED_SESSION: 2
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 6
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 5
- T.REPLAY_ATTACK: 4
- T.TRANSMIT: 1
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_CONNECTI: 2
- T.UNAUTHORIZED_CONNECTION: 1
- T.UNAUTHORIZED_CONNECTIONS: 1
- T.UNAUTHORIZED_UPDATE: 2
- T.UNDETECTED_ACTIONS: 2
- T.UNPROTECTED_TRAFFIC: 4
- T.USER_DATA_REUSE: 4
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 24
- Cisco Systems, Inc: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 7
- SHA256: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 33
- IKEv1: 1
- IKEv2: 12
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 22
- TLS 1.0: 1
- TLS 1.2: 1
- TLS v1.0: 1
- TLSv1.2: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 180-4: 2
- FIPS PUB 186-2: 3
- FIPS PUB 186-3: 10
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- NIST SP 800-56B: 2
- SP 800-90: 1
- RFC:
- RFC 2246: 1
- RFC 2460: 5
- RFC 2560: 1
- RFC 2818: 1
- RFC 2986: 1
- RFC 3513: 2
- RFC 3602: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 2
- RFC 4443: 3
- RFC 4945: 1
- RFC 5246: 1
- RFC 5280: 2
- RFC 5282: 1
- RFC 5735: 2
- RFC 5759: 1
- RFC 6379: 1
- RFC 768: 5
- RFC 791: 5
- RFC 792: 3
- RFC 793: 5
- RFC 959: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20110706140247+09'00'
- /Creator: CubePDF
- /Keywords: Security Target
- /ModDate: D:20110706140305+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title: TASKalfa 3050ci, TASKalfa 3550ci, TASKalfa 4550ci, TASKalfa 5550ci Data Security Kit (E) Japan Version Security Target
- pdf_file_size_bytes: 341401
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /ASDM _version: 7.1(3)
- /Author: Cisco Systems
- /Company: Cisco Systems, Inc.
- /CreationDate: D:20150721134959+10'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /FIPS_cert: TBD
- /ModDate: D:20150721135009+10'00'
- /Models: ASA 5500 (5505, 5510, 5520, 5540, 5550, 5580-20-40), ASA 5500-X Series (5512-X, 5515-X, 5525-X, 5545-X, 5555-X), ASA 5585-X (5585-10, 5585-20, 5585-40, 5585-60), ASA Services Module (ASA-SM)
- /NDPP_Version: 1.1
- /Objective-Caveats:
- /Objective-Classification: [Inherited - Restricted]
- /Objective-Comment:
- /Objective-CreationStamp: D:16170124
- /Objective-DatePublished:
- /Objective-Document Type [system]:
- /Objective-FileNumber:
- /Objective-Id: R22745603
- /Objective-IsApproved: 0
- /Objective-IsPublished: 0
- /Objective-ModificationStamp: D:16170124
- /Objective-Owner: Caulfield, Terence (MR)(ASD)
- /Objective-Parent: Security Target
- /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Defence Signals Directorate:DSD : Defence Signals Directorate (DSD):CISD:ASCS:CSPD:Evals:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFC-T
- /Objective-State: Being Edited
- /Objective-Title: Cisco_ASA_9.4.x_Security_Target-ASA
- /Objective-Version: 0.2
- /Objective-VersionComment:
- /Objective-VersionNumber: 2
- /PP: U.S. Government Protection Profile for Security Requirements for Network Devices (NDPP) and Traffic Filter Firewall Extended Package (TFFWEP)
- /PP_2: NDPP and TFFWEP
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Subject: Copyright (C) Cisco 2015
- /TFFW_Version: 1.0
- /TOE: Adaptive Security Appliances
- /TOE_Software_Version: 9.1(2)
- /TOE_short: ASA
- /Title: Cisco ASA Security Target
- /_Date: August, 2013
- /_Version: 1.0
- pdf_file_size_bytes: 597247
- pdf_hyperlinks:
|