name |
PostgreSQL Certified Version V8.1.5 for Linux |
Cisco Adaptive Security Appliances (ASA) 9.12 running on Firepower 2100 Series Appliances |
category |
Databases |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
09.12.2022 |
not_valid_before |
22.03.2007 |
09.12.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11090-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0089_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11090-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11090-st.pdf |
manufacturer |
NTT Data Corporation |
Cisco Systems, Inc. |
manufacturer_web |
|
https://www.cisco.com |
security_level |
EAL1 |
{} |
dgst |
5646aebd043d2630 |
85a9fbc9b8fbaf22 |
heuristics/cert_id |
JISEC-CC-CRP-C0089 |
CCEVS-VR-11090-2020 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
8.1.5 |
9.12 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0089
- certification_date: 01.03.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION PostgreSQL Certified Version is a relational database management system, which is applicable to enterprise business. It is an enhanced version of the open source PostgreSQL and delivered from NTT Data Corp. PostgreSQL Certified Version runs on Red Hat Enterprise Linux AS v.4 for x86.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)
- product: PostgreSQL Certified Version
- product_type: IT Product (Database management system)
- toe_version: V8.1.5 for Linux
- vendor: NTT DATA CORPORATION
- expiration_date: 01.10.2013
- supplier: NTT DATA CORPORA TION
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0089_it6109.html
- toe_japan_name: PostgreSQL Certified Version V8.1.5 for Linux
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Firewall, Network Device, Virtual Private Network
- certification_date: 09.12.2020
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 09.12.2022
- id: CCEVS-VR-VID11090
- product: Cisco Adaptive Security Appliances (ASA) 9.12 running on Firepower 2100 Series Appliances
- scheme: US
- url: https://www.niap-ccevs.org/product/11090
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf18fa171ef6e928, fa0610a54305df78 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_V1.0.pdf |
pdf_data/cert_filename |
|
st_vid11090-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID11090-2020: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20201210153910-05'00'
- /ModDate: D:20201210153910-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180344
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0089_ecvr.pdf |
st_vid11090-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-11090-2020
- cert_item: Cisco Adaptive Security Appliances (ASA) 9.12 running on Firepower 2100 Series Appliances
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 25
- Cisco Systems, Inc: 3
- Microsoft:
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA/ISEC
- /CreationDate: D:20070406181635+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20070406181648+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20070404120340
- /Title: TOE List
- pdf_file_size_bytes: 20755
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20201210145924-05'00'
- /ModDate: D:20201210153312-05'00'
- pdf_file_size_bytes: 914472
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
|
st_vid11090-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 11
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 27
- FCS_COP.1: 4
- FCS_NTP_EXT.1: 1
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 2
- FCS_SSHC_EXT.1: 2
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHS_EXT.1: 9
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 4
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.2: 8
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FCS_TLSS_EXT: 1
- FCS_TLSS_EXT.1: 7
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.2: 1
- FDP:
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 5
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_SMF: 5
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 7
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS: 5
- FPT_FLS.1: 2
- FPT_ITT: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 6
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.3: 5
- FPT_TST_EXT.3.1: 1
- FPT_TST_EXT.3.2: 1
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTA_VCM_EXT.1: 5
- FTA_VCM_EXT.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 14
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 6
- FTP_TRP.1: 3
- FTP_TUD.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN_CREDENTIALS_: 1
- A.CONNECTIONS: 2
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINSTRATOR: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.RESIDUAL_INFORMATION: 1
- O.STATEFUL_TRAFFIC_FILTERING: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- OE:
- OE.ADMIN_CREDENTIALS_: 1
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.DATA_INTEGRITY: 1
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_MISUSE: 2
- T.PASSWORD_CRACKING: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_FUNCTIONALITY_: 2
- T.UNAUTHORIZED_: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATIONS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 24
- Cisco Systems, Inc: 2
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 13
- AES-: 1
- AES-192: 1
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 5
- HMAC-SHA-384: 4
- HMAC-SHA-512: 5
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 9
- DHE: 2
- Diffie-Hellman: 8
- DSA:
- RSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 4
- SHA-512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- SSL: 2
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 49
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.2: 5
- TLS1.1: 1
- TLS1.2: 1
- TLSv1.1: 3
- TLSv1.2: 3
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 12
- P-348: 2
- P-384: 10
- P-521: 12
- secp256r1: 4
- secp384r1: 3
- secp521r1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 2
- FIPS PUB 186-3: 1
- FIPS PUB 186-4: 10
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-56A: 1
- NIST SP 800-90: 2
- PKCS:
- RFC:
- RFC 2460: 4
- RFC 2818: 1
- RFC 2986: 1
- RFC 3268: 4
- RFC 3513: 2
- RFC 3526: 4
- RFC 3602: 2
- RFC 4106: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 2
- RFC 4346: 3
- RFC 4443: 2
- RFC 4868: 1
- RFC 4945: 1
- RFC 5246: 7
- RFC 5280: 4
- RFC 5282: 1
- RFC 5289: 4
- RFC 5735: 2
- RFC 5759: 1
- RFC 5996: 2
- RFC 6125: 1
- RFC 6960: 1
- RFC 768: 4
- RFC 791: 4
- RFC 792: 2
- RFC 793: 4
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- ECDSA-based, DH-based, and RSA-based schemes. The RSA-based implementation is vendor affirmation (out of scope) and the KAS ECC and FFC + CVL algorithms testing is provided below. Scheme SFR Services RSA: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |