Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IAI/MLM Autonomous Air Combat Maneuvering Instrumentation (AACMI) Trusted Data Guard (TDG) v1.0
NSCIB-CC-12-36874-CR
IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
CCEVS-VR-VID-10055-2008
name IAI/MLM Autonomous Air Combat Maneuvering Instrumentation (AACMI) Trusted Data Guard (TDG) v1.0 IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
category Boundary Protection Devices and Systems Network and Network-Related Devices and Systems
scheme NL US
not_valid_after 13.08.2019 20.07.2012
not_valid_before 13.08.2014 31.07.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-12-36874-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20B-00111-100000_E_1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-st.pdf
manufacturer Israel Aircraft Industries Ltd / MLM Division IBM Corporation
manufacturer_web https://www.iai.co.il/ https://www.ibm.com
security_level EAL4+, ASE_TSS.2 EAL2
dgst 51d59fba487dabea 217a610530fdc3fa
heuristics/cert_id NSCIB-CC-12-36874-CR CCEVS-VR-VID-10055-2008
heuristics/cert_lab US
heuristics/extracted_sars ADV_TDS.3, AVA_VAN.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ASE_TSS.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1 ADV_HLD.1, AVA_VLA.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ADV_RCR.1, AGD_ADM.1, AVA_SOF.1, AGD_USR.1, ADV_FSP.1
heuristics/extracted_versions 1.0 7.1, 2.0
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10055/
  • categories: ['Network Management']
  • category: Network Management
  • certification_date: 31.07.2008
  • evaluation_facility: Arca CCTL
  • expiration_date:
  • id: CCEVS-VR-VID10055
  • product: IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10055
  • vendor: IBM Corporation
pdf_data/report_filename [CR] NSCIB-CC-12-36874-CR.pdf st_vid10055-vr.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-12-36874-CR
    • cert_item: IAI/MLM Autonomous Air Combat Maneuvering Instrumentation (AACMI) Trusted Data Guard (TDG) v1.0
    • cert_lab: Brightsight
    • developer: IAI/MLM
  • US:
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID10055-2008
    • cert_item: IBM Tivoli Netcool OMNIbus v7.1 with IBM Tivoli Netcool WebTop v2.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-12-36874: 1
    • NSCIB-CC-12-36874-CR: 13
  • US:
    • CCEVS-VR-VID10055-2008: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 2
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 4: 1
    • EAL2: 4
    • EAL3: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 3
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_PHP.1: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.INSPECT: 1
  • A:
    • A.INSTALL: 1
    • A.LOWEXP: 1
    • A.OSLOGIN: 1
    • A.PHYSEC: 1
    • A.PROBE: 1
    • A.SEL_PRO: 1
    • A.SOLARIS: 1
    • A.TRUSTED: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 17
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • hardware changes 3 “#” means any digit. This value reflects the embedded CAT table (which itself is out of scope of the evaluation) Page: 8/14 of report number: NSCIB-CC-12-36874-CR, dated 13-08-2014 ® TÜV, TUEV: 1
    • out of scope: 1
    • which itself is out of scope of the evaluation: 1
pdf_data/report_metadata
  • /Author: dmhale1
  • /CreationDate: D:20081020142813-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20081020142813-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - VID10055-VR-final.doc
  • pdf_file_size_bytes: 379398
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename [ST] B-00111-100000_E_1.pdf st_vid10055-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 1
    • EAL4+: 2
  • EAL:
    • EAL 2: 1
    • EAL2: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 4
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 2
    • FDP_PHP.1: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FMT:
    • FMT_MSA: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 2
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_TST.1: 4
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FAU:
    • FAU_GEN_EXP.1: 9
    • FAU_GEN_EXP.1.2: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 19
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 2
    • FCS_COP.1: 17
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 11
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 11
    • FDP_IFF.1: 13
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 8
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 12
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 7
    • FMT_SMR.1: 8
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_RVM.1: 2
    • FPT_RVM_EXP.1: 8
    • FPT_SEP.1: 2
    • FPT_SEP_EXP.1: 6
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 6
    • FPT_TRC.1: 7
    • FPT_TRC.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.F: 9
    • A.I: 8
    • A.O: 12
  • D:
    • D.RESIDUAL: 2
  • O:
    • O.CLOSED_POD: 2
    • O.INSPECT: 4
    • O.LOCATION: 2
    • O.NO_OFFERING: 4
    • O.PERSONNEL: 4
    • O.PHYSICAL: 2
    • O.RESIDUAL: 2
    • O.SF: 21
    • O.TOE_LOCATION: 2
    • O.TOE_TRANSPORT: 3
    • O.TRANSPORT: 2
    • O.TRUSTED_ENV: 5
  • OE:
    • OE.F: 13
    • OE.I: 12
    • OE.O: 14
  • T:
    • T.D: 2
    • T.F: 8
    • T.I: 4
    • T.O: 4
  • A:
    • A.INSTALL: 4
    • A.LOWEXP: 2
    • A.OSLOGIN: 2
    • A.PHYSEC: 2
    • A.PROBE: 2
    • A.SEL_PRO: 4
    • A.SOLARIS: 2
    • A.TRUSTED: 3
  • O:
    • O.AUDITING: 4
    • O.AUDITPROTECT: 4
    • O.AUTHORIZATION: 4
    • O.DISCRETIONARY_ACCESS: 4
    • O.MANAGE: 4
    • O.REPLICATION: 4
    • O.SECURECOMMS: 4
    • O.SEL_PRO: 6
  • OE:
    • OE.CREDEN: 3
    • OE.INSTALL: 5
    • OE.LOWEXP: 3
    • OE.OSLOGIN: 6
    • OE.PAM: 5
    • OE.PHYSICAL: 3
    • OE.PROBE: 3
    • OE.SEL_PRO: 7
  • T:
    • T.AUD: 3
    • T.COMPDATA: 3
    • T.DATABASEFAIL: 4
    • T.DATABSEFAIL: 1
    • T.INSECURE: 4
    • T.LOWEXP: 5
    • T.NETSEC: 9
    • T.SEL_PRO: 2
    • T.UNAUTH: 5
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 12
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3-DES: 2
    • DES:
      • DES: 7
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 5
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-2: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS #3: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • these dependencies are addressed by the correct implementation of the standard protocols, which is out of scope of the evaluation of this TOE. Ultimately the validity of the key management for these protocols is: 1
    • to a platform needing to communicate. The destruction of the TOE public/private key pair is also out of scope of the evaluation as once the keys are created they are data files controlled by operating systems: 1
pdf_data/st_metadata
  • /Author: 22ran
  • /CreationDate: D:2014071714054303'00'
  • /Creator: PrimoPDF http://www.primopdf.com/
  • /ModDate: D:2014071714054303'00'
  • /Producer: PrimoPDF
  • /Title: Microsoft Word - [ST] B-00111-100000_E_1.doc
  • pdf_file_size_bytes: 341758
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author:
  • /CreationDate: D:20081017125000+0500
  • /CreationDate--Text: D:20081017125000+0500
  • /Creator: Windows NT 4.0
  • /ModDate: D:20081020144551-04'00'
  • /Producer: 5D PDF Creator
  • /Title: Microsoft Word - IBM_Netcool-OMNIbus-v7.1_with_Webtop-v2.0_EAL2_ASE_ST_v2.9_Sanitized IBM.doc
  • pdf_file_size_bytes: 838811
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different