Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
iSAS, Release 1.0
BSI-DSZ-CC-0619-V2-2022
IBM z/OS Version 2 Release 5
OCSI/CERT/ATS/05/2023/RC
name iSAS, Release 1.0 IBM z/OS Version 2 Release 5
category Network and Network-Related Devices and Systems Operating Systems
scheme DE IT
not_valid_after 02.03.2027 21.10.2029
not_valid_before 02.03.2022 21.10.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FP_cr_zos_v2r5_v1.0_en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_zos_v2r5_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_zos_v2r5_v2.17.pdf
manufacturer Frequentis AG IBM Corporation
manufacturer_web https://www.frequentis.com https://www.ibm.com
security_level ADV_INT.3, AVA_VAN.5, EAL4+, ASE_TSS.2 {}
dgst 56159ceb71850ff4 ad7391ea9080fcbb
heuristics/cert_id BSI-DSZ-CC-0619-V2-2022 OCSI/CERT/ATS/05/2023/RC
heuristics/cert_lab BSI []
heuristics/extracted_sars AGD_OPE.1, ATE_COV.2, AVA_VAN.5, ADV_INT.3, ATE_IND.2, ASE_ECD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.4, ADV_IMP.1, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_FUN.1, ADV_TDS.3, ADV_ARC.1, ALC_DEL.1, ASE_OBJ.2, ALC_DVS.1, ALC_CMC.4, ASE_INT.1, ALC_CMS.4, AGD_PRE.1, ALC_TAT.1, ASE_CCL.1 AGD_OPE.1, ASE_INT.1, ATE_IND.1, ASE_TSS.1, ALC_CMC.1, AGD_PRE.1, ASE_REQ.2, ASE_CCL.1, ASE_OBJ.2, ALC_TSU_EXT.1, ASE_SPD.1, AVA_VAN.1, ASE_ECD.1, ADV_FSP.1, ALC_CMS.1
heuristics/extracted_versions 1.0 2, 5
heuristics/scheme_data
  • certification_date: 21.10.2024
  • level: conforme a Protection Profile for General Purpose Operating Systems v.4.3
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/ibm/zos/cr_zos_v2r5_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/ibm/zos/rc_zos_v2r5_v1.0_it.pdf
  • supplier: IBM Corporation
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/ibm/zos/st_zos_v2r5_v2.17.pdf
  • title: IBM z/OS Version 2 Release 5
heuristics/protection_profiles {} 3d6ad6fde534f6c6
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf
pdf_data/cert_filename 0619V2a_pdf.pdf FP_cr_zos_v2r5_v1.0_en.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0619-V2-2022: 13
  • IT:
    • OCSI/CERT/ATS/05/2023/RC: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL4+: 1
  • EAL:
    • EAL2: 2
    • EAL4: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_INT.3: 5
  • ALC:
    • ALC_FLR: 3
  • ASE:
    • ASE_TSS.2: 5
  • ALC:
    • ALC_FLR: 2
pdf_data/cert_keywords/cc_claims
  • A:
    • A.VCS: 1
pdf_data/cert_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
pdf_data/cert_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/cert_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/cert_keywords/standard_id
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/cert_keywords/certification_process
  • ConfidentialDocument:
    • BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
    • Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
pdf_data/cert_metadata
  • /CreationDate: D:20241022151125
  • /Creator: PDFium
  • /Producer: PDFium
  • pdf_file_size_bytes: 151239
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 0619V2a_pdf.pdf cr_zos_v2r5_v1.0_en.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0619-V2-2022
    • cert_item: iSAS Release 1.0
    • cert_lab: BSI
    • developer: Frequentis AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0619-V2-2022: 13
  • IT:
    • OCSI/CERT/ATS/05/2023/RC: 30
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL4+: 1
  • EAL:
    • EAL2: 4
    • EAL4: 6
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_INT.3: 5
  • ALC:
    • ALC_FLR: 3
  • ASE:
    • ASE_TSS.2: 5
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_TLSC_EXT.1: 1
    • FCS_TLSS_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.VCS: 1
  • O:
    • O.J: 1
pdf_data/report_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
  • atsec:
    • atsec: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 2
      • SHA256: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 8
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 10
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • PKCS:
    • PKCS#11: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
    • Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
pdf_data/report_metadata
pdf_data/st_filename 0619V2b_pdf.pdf st_zos_v2r5_v2.17.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 1
    • EAL4: 8
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_INT.3: 5
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
  • ALC:
    • ALC_TSU_EXT.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 11
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 1
    • FAU_SAA.1: 11
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FDP:
    • FDP_ETC.1: 12
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 5
    • FDP_IFF: 69
    • FDP_IFF.1: 30
    • FDP_IFF.5: 4
    • FDP_IFF.5.1: 1
    • FDP_ITC: 20
    • FDP_ITC.1: 10
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 5
    • FMT_MSA.3: 8
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 4
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 5
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 23
    • FCS_COP.1: 8
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 4
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT.1: 5
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT: 1
    • FCS_SSH_EXT.1: 5
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_STO_EXT.1: 4
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 4
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 4
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.5: 4
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 4
    • FCS_TLSS_EXT.1.1: 2
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.2: 4
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
    • FCS_TLS_EXT.1: 3
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 5
    • FMT_SMF_EXT.1.1: 1
  • FPT:
    • FPT_ACF_EXT.1: 4
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT.1: 4
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT.1: 4
    • FPT_SBOP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 4
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.VCS: 5
  • OE:
    • OE.TEMPEST_: 1
    • OE.VCS: 5
  • A:
    • A.PLATFORM: 4
    • A.PROPER_ADMIN: 4
    • A.PROPER_USER: 4
  • O:
    • O.ACCOUNTABILITY: 4
    • O.INTEGRITY: 4
    • O.MANAGEMENT: 4
    • O.PROTECTED_COMMS: 4
    • O.PROTECTED_STORAGE: 3
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 3
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 10
    • T.NETWORK_EAVESDROP: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-256: 1
  • DES:
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 2
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 6
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 52
    • SSHv2: 2
  • TLS:
    • SSL:
      • SSL: 16
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 60
      • TLS 1.0: 1
      • TLS 1.1: 3
      • TLS 1.2: 2
      • TLSv1.0: 1
      • TLSv1.1: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 1
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 2
  • XTS:
    • XTS: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 4
    • P-521: 4
    • secp384r1: 3
    • secp521r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • malfunction: 7
    • physical tampering: 2
  • SCA:
    • side channels: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 4
    • FIPS186-4: 2
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 2
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 2
  • PKCS:
    • PKCS#1: 1
    • PKCS#11: 4
  • RFC:
    • RFC 4251: 1
    • RFC 4252: 1
    • RFC 5656: 1
    • RFC4252: 3
    • RFC4253: 4
    • RFC4344: 2
    • RFC5246: 5
    • RFC5280: 6
    • RFC5289: 6
    • RFC5647: 3
    • RFC5656: 10
    • RFC6125: 4
    • RFC6668: 3
    • RFC6960: 3
  • X509:
    • X.509: 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • touch entry device). Protection of TSF The TOE provides a Fail Secure security function. 1.4.2.3 Out of Scope The following firmware and hardware features are outside the scope of the defined TSF and are: 1
    • 12 1.4.2.3 Out of Scope: 2
    • Microphone_Inputs/Earpiece_Outputs are connected to the BLACK or RED VCS. The touch entry device is out of scope of the TOE. Therefore, this setup requires that the MOD iSAS-P is mounted visible, and the operator: 1
    • Out of Scope: 2
    • out of scope: 1
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Frequentis
  • /CreationDate: D:20220202143605+01'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: Secure audio switch, Trusted audio switch, Red/Black separation, Audio interface
  • /ModDate: D:20220202143605+01'00'
  • /Producer: Microsoft® Word 2019
  • /Subject: Security Target Lite
  • /Title: iSAS
  • pdf_file_size_bytes: 898592
  • pdf_hyperlinks: http://www.frequentis.com/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 81
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different