Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BMC Remedy Action Request System 6.3
CCEVS-VR-0019-2007
Red Hat Enterprise Linux 8.6
CCEVS-VR-VID-11309-2024
name BMC Remedy Action Request System 6.3 Red Hat Enterprise Linux 8.6
category Network and Network-Related Devices and Systems Operating Systems
status archived active
not_valid_after 06.09.2012 15.01.2026
not_valid_before 10.04.2007 15.01.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-vid11309-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10101-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-vid11309-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10101-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11309-st.pdf
manufacturer BMC Software, Inc. Red Hat, Inc.
manufacturer_web https://www.bmc.com/ https://www.redhat.com
security_level EAL3 {}
dgst 4d5db7ddd9aa0b15 a502da0795ccf9b7
heuristics/cert_id CCEVS-VR-0019-2007 CCEVS-VR-VID-11309-2024
heuristics/cpe_matches cpe:2.3:a:bmc:remedy_action_request_system_administrator:6.3:*:*:*:*:*:*:*, cpe:2.3:a:bmc:remedy_action_request_system_mid_tier:6.3:*:*:*:*:*:*:*, cpe:2.3:a:bmc:remedy_action_request_system_user:6.3:*:*:*:*:*:*:*, cpe:2.3:a:bmc:remedy_action_request_system_email_engine:6.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:arm64:*, cpe:2.3:o:redhat:enterprise_linux_server_eus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2019-13272, CVE-2019-2752, CVE-2019-8720, CVE-2019-2614, CVE-2019-2762, CVE-2019-15604, CVE-2022-27649, CVE-2019-2686, CVE-2019-12527, CVE-2019-2589, CVE-2019-2983, CVE-2019-2631, CVE-2019-2973, CVE-2019-11884, CVE-2019-2795, CVE-2023-5455, CVE-2019-6111, CVE-2021-20316, CVE-2019-2975, CVE-2019-2623, CVE-2019-2685, CVE-2019-2539, CVE-2024-9675, CVE-2019-2786, CVE-2019-2644, CVE-2019-2693, CVE-2019-2627, CVE-2019-2602, CVE-2023-4911, CVE-2019-2684, CVE-2019-2529, CVE-2021-23177, CVE-2019-5010, CVE-2019-2757, CVE-2019-2534, CVE-2024-1062, CVE-2021-3696, CVE-2018-18897, CVE-2019-2625, CVE-2019-6470, CVE-2019-15605, CVE-2019-7664, CVE-2023-3972, CVE-2020-1045, CVE-2019-2739, CVE-2019-2687, CVE-2019-2830, CVE-2019-2755, CVE-2019-2628, CVE-2019-2698, CVE-2023-5157, CVE-2023-3899, CVE-2019-2481, CVE-2019-2688, CVE-2023-46847, CVE-2018-12121, CVE-2019-2584, CVE-2019-2510, CVE-2019-2778, CVE-2021-31566, CVE-2019-2630, CVE-2019-11043, CVE-2019-11135, CVE-2019-2738, CVE-2019-2945, CVE-2019-2815, CVE-2019-2826, CVE-2018-20662, CVE-2022-1227, CVE-2019-2533, CVE-2024-3183, CVE-2019-9636, CVE-2019-2689, CVE-2019-2801, CVE-2019-2683, CVE-2021-3697, CVE-2019-2503, CVE-2021-3659, CVE-2019-9948, CVE-2023-6535, CVE-2019-2981, CVE-2021-3744, CVE-2019-2810, CVE-2019-0211, CVE-2019-2789, CVE-2019-2691, CVE-2019-2816, CVE-2019-2624, CVE-2019-0820, CVE-2019-2636, CVE-2019-11833, CVE-2019-2879, CVE-2019-2834, CVE-2019-2808, CVE-2019-2978, CVE-2019-11459, CVE-2018-16878, CVE-2019-14815, CVE-2019-2769, CVE-2019-2802, CVE-2019-2798, CVE-2019-2580, CVE-2023-5869, CVE-2019-2537, CVE-2019-2805, CVE-2019-2592, CVE-2024-0229, CVE-2019-13313, CVE-2019-2620, CVE-2019-2585, CVE-2023-5868, CVE-2019-2532, CVE-2019-2800, CVE-2019-2626, CVE-2019-2796, CVE-2019-2814, CVE-2019-2422, CVE-2019-9959, CVE-2024-1488, CVE-2019-2531, CVE-2019-2999, CVE-2019-2420, CVE-2019-2449, CVE-2019-2797, CVE-2019-2780, CVE-2019-2607, CVE-2019-2697, CVE-2019-2992, CVE-2019-2695, CVE-2019-12450, CVE-2018-16877, CVE-2019-2634, CVE-2018-18506, CVE-2019-7222, CVE-2019-2434, CVE-2023-46846, CVE-2019-6109, CVE-2019-2593, CVE-2019-2436, CVE-2019-2617, CVE-2019-2784, CVE-2019-2962, CVE-2023-0494, CVE-2019-2811, CVE-2019-2740, CVE-2023-6536, CVE-2018-20685, CVE-2019-2964, CVE-2019-2596, CVE-2019-2785, CVE-2021-3695, CVE-2019-2988, CVE-2021-40438, CVE-2019-2635, CVE-2020-9490, CVE-2019-2581, CVE-2019-2606, CVE-2016-7091, CVE-2019-2536, CVE-2019-2803, CVE-2021-3975, CVE-2019-2996, CVE-2019-2587, CVE-2019-2812, CVE-2019-2681, CVE-2023-5870, CVE-2019-9903, CVE-2018-20650, CVE-2021-3669, CVE-2023-6356, CVE-2019-2530, CVE-2022-1011, CVE-2019-2774, CVE-2019-2819, CVE-2019-2694, CVE-2019-2535, CVE-2019-2455
heuristics/extracted_sars ADV_FSP.1, ATE_COV.2, AGD_ADM.1, AGD_USR.1, AVA_VLA.1, ATE_FUN.1, ALC_DVS.1, AVA_SOF.1, ADV_RCR.1, AVA_MSU.1, ADV_HLD.2, ATE_DPT.1, ATE_IND.2 AVA_VAN.1, ASE_TSS.1, ATE_IND.1, ASE_CCL.1, ADV_FSP.1, AGD_OPE.1, ASE_INT.1, AGD_PRE.1, ASE_SPD.1, ALC_CMS.1, ALC_TSU_EXT.1, ASE_ECD.1, ALC_CMC.1, ASE_OBJ.2, ASE_REQ.2
heuristics/extracted_versions 6.3 8.6
heuristics/protection_profiles {} ed9c9d74c3710878, e34797b67a3163c5
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf
pdf_data/cert_filename st-vid11309-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11309-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20240119120502-05'00'
  • /ModDate: D:20240119120502-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 188956
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10101-vr.pdf st-vid11309-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-07-0019
    • cert_item: BMC® Remedy® Action Request System® 6.3
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-VID11309-2024
    • cert_item: for the Red Hat Enterprise Linux 8.6
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-07-0019: 1
  • US:
    • CCEVS-VR-VID11309-2024: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 3
    • EAL 4: 1
    • EAL3: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT: 1
    • A.DAC: 1
    • A.DB_LOCKED_DOWN: 1
    • A.EXTERNAL_: 1
    • A.INSTALL: 1
    • A.MANAGE: 1
    • A.NO_EVIL_ADM: 1
    • A.PEER_ASSOCIATION: 1
    • A.PHYSICAL_PROTECT: 1
    • A.PLATFORM_SUPPORT: 1
    • A.SECURE_: 1
    • A.TIME: 1
  • T:
    • T.EXCEED_PRIV: 1
    • T.MANAGE: 1
    • T.UNAUTH_ACCESS: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • SSH:
    • SSH: 29
    • SSHv2: 5
  • TLS:
    • TLS:
      • TLS: 3
      • TLSv1.2: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • ISO:
    • ISO/IEC 15408-2: 4
  • NIST:
    • SP 800-90A: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20070416130312-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070416130429-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070412152954
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 153105
  • pdf_hyperlinks: http://www.bmc.com/support_home
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: ppatin
  • /CreationDate: D:20240119115939-05'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240119115939-05'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 379641
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename st_vid10101-st.pdf st_vid11309-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 3
    • EAL3: 11
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 11
    • ADV_HLD: 1
    • ADV_HLD.1: 1
    • ADV_HLD.2: 3
    • ADV_RCR: 1
    • ADV_RCR.1: 4
  • AGD:
    • AGD_ADM.1: 7
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 4
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 2
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_FUN: 1
    • ATE_FUN.1: 5
    • ATE_IND: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 16
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 7
    • FCS_MSA.2: 3
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ITT.1: 5
    • FDP_ITT.1.1: 1
  • FIA:
    • FIA_ATD.1: 17
    • FIA_ATD.1.1: 3
    • FIA_ATD.2: 1
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 22
    • FIA_UID.2.1: 2
    • FIA_USB.1: 9
    • FIA_USB.1.1: 2
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 5
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_APP_EXP.1: 9
    • FPT_APP_EXP.1.1: 2
    • FPT_SEP.1: 6
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 25
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 9
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT.1: 9
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_STO_EXT.1: 3
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT: 3
    • FCS_TLSC_EXT.1: 15
    • FCS_TLSC_EXT.2: 4
    • FCS_TLSC_EXT.3: 4
  • FDP:
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 3
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 2
    • FPT_ASLR_EXT.1: 5
    • FPT_SBOP_EXT.1: 3
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT.1: 3
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT: 6
    • A.DAC: 4
    • A.DB_LOCKED_: 1
    • A.DB_LOCKED_DOWN: 2
    • A.EXTERNAL: 1
    • A.EXTERNAL_: 2
    • A.INSTALL: 4
    • A.MANAGE: 3
    • A.NO_EVIL_ADM: 3
    • A.NO_EVIL_ADMIN: 1
    • A.PEER_: 1
    • A.PEER_ASSOCIATION: 2
    • A.PHYSICAL_: 1
    • A.PHYSICAL_PROTECT: 2
    • A.PLATFORM_: 1
    • A.PLATFORM_SUPPORT: 2
    • A.SECURE_: 2
    • A.SECURE_COMMUNICATION: 1
    • A.TIME: 3
  • O:
    • O.AUTHORIZATION: 14
    • O.DISCRETIONARY_: 1
    • O.DISCRETIONARY_ACCESS: 4
    • O.MANAGE: 10
  • OE:
    • OE.DAC: 4
    • OE.DB_LOCKED_: 1
    • OE.DB_LOCKED_DOWN: 2
    • OE.EXTERNAL_: 1
    • OE.EXTERNAL_AUTHENTICATION: 8
    • OE.INSTALL: 3
    • OE.PEER_: 1
    • OE.PEER_ASSOCATION: 1
    • OE.PEER_ASSOCIATION: 1
    • OE.PERSON: 5
    • OE.PHYSICAL: 3
    • OE.PLATFORM_SPT: 3
    • OE.SECURE_: 1
    • OE.SECURE_COMMUNICATION: 3
    • OE.SEP: 4
    • OE.TIME: 4
  • T:
    • T.EXCEED_PRIV: 4
    • T.MANAGE: 3
    • T.UNAUTH_ACCESS: 5
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.INTEGRITY: 1
    • O.MANAGMENT: 1
    • O.PROTECTED_COMMS: 3
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 5
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 7
  • AES_competition:
    • AES:
      • AES: 10
      • AES-: 1
      • AES-128: 1
      • AES-256: 3
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 1
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • Diffie-Hellman: 9
  • RSA:
    • RSA 2048: 5
    • RSA 4096: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 8
      • SHA-384: 8
      • SHA-512: 12
      • SHA256: 2
      • SHA384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 10
  • SSH:
    • SSH: 69
    • SSHv2: 5
  • TLS:
    • TLS:
      • TLS: 39
      • TLS 1.2: 4
      • TLSv1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
    • PRNG: 1
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CTR:
    • CTR: 4
  • GCM:
    • GCM: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 32
    • P-384: 32
    • P-521: 20
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
  • OpenSSL:
    • OpenSSL: 16
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • ISO:
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 3
    • FIPS 197: 1
    • FIPS 198-1: 1
    • FIPS PUB 186-4: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 1
    • SP 800-56A: 2
    • SP 800-90A: 3
  • RFC:
    • RFC 3526: 3
    • RFC 4251: 1
    • RFC 4252: 2
    • RFC 4253: 3
    • RFC 4344: 2
    • RFC 5246: 10
    • RFC 5280: 4
    • RFC 5288: 8
    • RFC 5289: 12
    • RFC 5647: 2
    • RFC 5656: 13
    • RFC 6125: 2
    • RFC 6668: 2
    • RFC 8332: 6
    • RFC 8603: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: BMC Software
  • /CreationDate: D:20070328153002-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords: NIAP, Common Criteria, Validation, AR System 6.3
  • /ModDate: D:20070416131348-04'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Subject: NIAP Evaluation, Common Criteria Validation, AR System 6.3
  • /Title: BMC Remedy Action Request System 6.3 Security Target
  • pdf_file_size_bytes: 476881
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different