name |
F5 Networks BIG-IP® Application Delivery Controller (ADC-AP) version 11.5.1 HF10 (build 10.123.180) |
Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
DE |
DE |
status |
archived |
active |
not_valid_after |
15.02.2023 |
03.03.2028 |
not_valid_before |
15.02.2018 |
03.03.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0975c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0975a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0975b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045V2b_pdf.pdf |
manufacturer |
F5 Networks, Inc. |
Qualcomm Technologies Inc. |
manufacturer_web |
https://www.f5.com/ |
https://www.qualcomm.com |
security_level |
EAL4+, ALC_FLR.3 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
582b7ee77ad6041b |
ac18c15a88b4b1bd |
heuristics/cert_id |
BSI-DSZ-CC-0975-2018 |
BSI-DSZ-CC-1045-V2-2023 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ALC_TAT.1, ALC_CMS.4, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_DVS.2, ALC_CMC.4 |
heuristics/extracted_versions |
10.123.180, 11.5.1 |
1.1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0856-2017 |
BSI-DSZ-CC-1045-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0856-2017 |
BSI-DSZ-CC-1045-2019 |
heuristics/scheme_data |
|
- category: System on a chip (SOC)
- cert_id: BSI-DSZ-CC-1045-V2-2023
- certification_date: 03.03.2023
- enhanced:
- applicant: Qualcomm Technologies Inc. 5775 Morehouse drive San Diego, CA 92121 USA
- assurance_level: EAL4+; ALC_DVS.2, AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 03.03.2023
- description: The TOE is the “Qualcomm Secure Processor Unit SPU230 embedded in the SDM855 host SoC combined with a DDR in a PoP (Package on Package) configuration and its corresponding Software and associated documentation. The hardware is a hard macro (sub-unit of a System-on-Chip which is already synthesized, placed and routed, delivered as GDS file) and the special packaging. The TOE is integrated into the SDM855 SoC by the SoC integrator (Qualcomm). The firmware and software comprise the operating system of the Secure Processor Unit and the software API providing cryptographic services to SPU applications. The SPU applications can be developed by the SPU application developer using the software API. The TOE can be used for multiple applications that require a high level of security. Examples are as follows: User authentication and password storage, Content protection, Payment, Subscriber Identity Module (SIM), Storage and management of digital identities, Secure key storage, Root of trust, Storage of sensitive user data.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1045-V2-2023 (Ausstellungsdatum / Certification Date 03.03.2023, gültig bis / valid until 02.03.2028) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate', 'description': 'has been extended by additional cryptographic functions.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
- evaluation_facility: T-Systems International GmbH atsec information security GmbH
- expiration_date: 02.03.2028
- product: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
- protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1045V2b_pdf.pdf?__blob=publicationFile&v=2
- product: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/System_on_a_Chip_SOC/1045.html
- vendor: Qualcomm Technologies Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
0975c_pdf.pdf |
1045V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1045-V2-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180220161811+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Controller (ADC-AP) version 11.5.1 HF10"
- /ModDate: D:20180220163412+01'00'
- /Producer: LibreOffice 5.2
- /Subject: Certificate, Zertifikat
- /Title: Certificate BSI-DSZ-CC-0975-2017
- pdf_file_size_bytes: 919805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Subject: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
- /Title: Certification Report BSI-DSZ-CC-1045-V2-2023
- pdf_file_size_bytes: 289421
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0975a_pdf.pdf |
1045V2a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0975-2018
- cert_item: F5 Networks BIG-IP® Application Delivery Controller (ADC-AP) version 11.5.1 HF10 (build 10.123.180
- cert_lab: BSI
- developer: F5 Networks, Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_DVS.2
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1045-V2-2023
- cert_item: Qualcomm Secure Processing Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100
- cert_lab: BSI
- developer: Qualcomm Technologies Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0856-2017: 4
- BSI-DSZ-CC-0975-2018: 21
|
- DE:
- BSI-DSZ-CC-1045-2019: 3
- BSI-DSZ-CC-1045-V2-2023: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 8
- EAL 3: 4
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL4: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE: 4
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FIA:
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 3
- atsec:
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 2
- HMAC: 1
- HMAC-SHA-384: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 7
- SHA256: 2
- SHA384: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 6
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 14
- TLSv1.1: 6
- TLSv1.2: 7
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- NIST P-256: 2
- P-256: 2
- secp256r1: 8
|
- NIST:
- NIST P-192: 2
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-192: 2
- P-224: 2
- P-256: 2
- P-384: 2
- P-521: 2
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- Side-channel: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC1321: 1
- RFC2104: 1
- RFC3447: 10
- RFC3526: 1
- RFC4251: 1
- RFC4252: 2
- RFC4253: 4
- RFC4346: 4
- RFC4492: 6
- RFC5246: 6
- RFC6151: 1
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 1
- AIS 37: 1
- AIS 38: 1
- FIPS:
- FIPS 180-4: 2
- FIPS 186-4: 3
- FIPS 197: 5
- FIPS 198-1: 1
- FIPS186-4: 2
- FIPS198-1: 1
- FIPS46-3: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report, Version 7, 2018-02-15, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, 2017-09-26, CI list for documentation in Perforce: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- ConfidentialDocument:
- 04th April 2019 (confidential document) [16] Configuration list for the TOE: Configuration List for the hardware platform, Qualcomm: 1
- Application Programming Interface API, Qualcomm Technologies Inc., Rev. 4.6, August 26th, 2020 (confidential document) [12] Guidance documentation for the TOE: Secure Processor Unit (SPU) Anti-Replay Island (ARI: 1
- Configuration list for the TOE: rom_v2_binaries.txt, 23.10.2018 (confidential document) [20] Configuration list for the TOE: Configuration list of the documentation for the hardware: 1
- Inc., version 3,1; 11th April 2019 (SPU_3_1_config_list.txt (confidential document) [17] Configuration list for the TOE: Configuration list including the functional and verification: 1
- Qualcomm Technologies Inc., Rev. AC, May 6th, 2021 (confidential document) [14] Configuration list for the TOE: Configuration List user guidance: 1
- Revision J, Date: 14.01.2022, Qualcomm SPU230 Core Security Target, Qualcomm Technologies, Inc., (confidential document) [7] Evaluation Technical Report, Version 2.1, Date: 26.01.2023, Evaluation Technical Report -: 1
- TOE_SW_Test_config_list_CC2_PHASE2.txt(confidential document) [23] Configuration list for the TOE: MCP Software configuration list: config_list_spu_100.txt: 1
- Unit SPU230 in SDM855 SoC with MCP version spss.a1.1.2_00100, Deutsche Telekom Security GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for SM8150, Qualcomm Technologies Inc., Revision B, November, 2018 (confidential document) [13] Guidance documentation for the TOE: Qualcomm Secure Processing Unit, Enablement, 80-PF777-965: 1
- list of the documentation for the software development process: ALC_CMC_Doc_config_list-5.2.pdf (confidential document) [25] Configuration list for the TOE: Site Security Documentation Configuration List: 1
- of the hardware plat-form: TOE_HW_test_config_list.txt (confidential document) [18] Configuration list for the TOE: pbl_v2_config_list.txt, 22.03.2019 (confidential document: 1
- process TOE_SW_HW_process_config_list-10.1.pdf (confidential document) [21] Configuration list for the TOE: Configuration list software specifications: 1
- txt (confidential document) 25 / 29 Certification Report BSI-DSZ-CC-1045-V2-2023 C. Excerpts from the Criteria For the: 1
- txt (confidential document) [22] Configuration list for the TOE: Configuration list functional and verification tests of: 1
- v13.pdf, 09th December 2021 (confidential document) [15] Configuration list for the TOE: Configuration List hardware spec, TOE_HW_spec_config_list-4.0: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180220164746+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Controller (ADC-AP) version 11.5.1 HF10"
- /ModDate: D:20180221074413+01'00'
- /Producer: LibreOffice 5.2
- /Subject: Certification Report, Zertifizierungsreport
- /Title: Certification Report BSI-DSZ-CC-0975-2017
- pdf_file_size_bytes: 1617148
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://askF5.com/, https://www.bsi.bund.de/zertifizierung, https://downloads.f5.com/, https://www.bsi.bund.de/zertifizierungsreporte, https://support.f5.com/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "BSI, SOG-IS, IT-security, SoC, integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230"
- /Subject: BSI, SOG-IS, IT-security, SoC, integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
- /Title: Certification Report BSI-DSZ-CC-1045-V2-2023
- pdf_file_size_bytes: 641231
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
0975b_pdf.pdf |
1045V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ALC:
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 14
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 15
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 3
- FCS_CKM_EXT.4: 20
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 36
- FCS_COP.1.1: 3
- FCS_RBG_EXT.1: 16
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_SSH_EXT.1: 15
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS_EXT.1: 22
- FCS_TLS_EXT.1.1: 2
- FCS_TLS_EXT.1.2: 2
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 7
- FDP_IFC.1: 7
- FDP_IFF: 6
- FDP_IFF.1: 7
- FDP_ITC.1: 15
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 5
- FDP_RIP.2: 11
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_PMG_EXT.1: 14
- FIA_PMG_EXT.1.1: 1
- FIA_SOS: 1
- FIA_UAU: 19
- FIA_UAU.1: 1
- FIA_UAU.5: 6
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 15
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 22
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 3
- FIA_UIU_EXT.1: 1
- FMT:
- FMT_MSA: 17
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW: 1
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_SKP: 1
- FPT_SKP_EXT.1: 13
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 13
- FPT_TST_EXT.1.1: 2
- FPT_TUD: 1
- FPT_TUD_EXT.1: 14
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FRU:
- FRU_RSA.1: 9
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTA_SSL.4: 10
- FTA_SSL.4.1: 1
- FTA_TAB.1: 13
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 23
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 15
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS.1: 4
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 16
- FCS_CKM.2: 3
- FCS_CKM.4: 16
- FCS_COP: 49
- FCS_COP.1: 12
- FCS_ITC.1: 13
- FCS_ITC.2: 13
- FCS_RNG.1: 3
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 2
- FDP_ACC.2: 3
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ICT.1: 1
- FDP_IFC.1: 5
- FDP_IFC.1.1: 2
- FDP_IFF.1: 1
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 3
- FDP_ITT.1.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 2
- FDP_SDA: 3
- FDP_SDA.1: 12
- FDP_SDA.1.1: 2
- FDP_SDC.1: 11
- FDP_SDC.1.1: 2
- FDP_SDI: 2
- FDP_SDI.2: 18
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 3
- FDP_SDR: 3
- FDP_SDR.1: 12
- FDP_SDR.1.1: 2
- FMT:
- FMT_CMT: 2
- FMT_CMT.1: 35
- FMT_CMT.1.1: 7
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA: 5
- FMT_MSA.1: 2
- FMT_MSA.3: 7
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 4
- FRU_FLT.2.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 3
- A.KEYS: 3
- A.LDAP: 3
- A.LOGSERVER: 2
- A.MGMTNET: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PEERTRUST: 4
- A.PHYSICAL: 3
- A.TIME: 3
- A.TRAINED_ADMIN: 3
- A.TRUSTED_ADMIN: 3
- O:
- O.APM-VPN: 16
- O.DISPLAY_BANNER: 5
- O.FAILOVER: 5
- O.LTM-TRAFFICMGMT: 13
- O.PROTECTED_COMMUNICATIONS: 18
- O.RESIDUAL_INFORMATION_CLEARING: 5
- O.RESOURCE_AVAILABILITY: 5
- O.SESSION_LOCK: 6
- O.SYSTEM_MONITORING: 8
- O.TOE_ADMINISTRATION: 19
- O.TSF_SELF_TEST: 4
- O.VERIFIABLE_UPDATES: 5
- OE:
- OE.CONNECTIONS: 3
- OE.KEYS: 3
- OE.LDAP: 3
- OE.LOGSERVER: 3
- OE.MGMTNET: 3
- OE.NO_GENERAL_PURPOSE: 3
- OE.PEERTRUST: 3
- OE.PHYSICAL: 3
- OE.TIME: 5
- OE.TRAINED_ADMIN: 4
- OE.TRUSTED_ADMIN: 4
- T:
- T.ADMIN_ERROR: 5
- T.RESOURCE_EXHAUSTION: 3
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 5
- T.UNAUTHORIZED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 3
|
- O:
- O.AES: 3
- O.CMAC: 4
- O.ECDH: 4
- O.ECDSA: 4
- O.HMAC: 4
- O.KDF: 4
- O.RND: 1
- O.RSA_ENC: 4
- O.RSA_SIGN: 4
- O.SHA: 3
- O.TDES: 3
- T:
- T.AUTH-APPLI-DATA: 3
- T.AUTH-TSF-DATA: 3
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 4
- T.CONFID-TSF-CODE: 3
- T.CONFID-TSF-DATA: 4
- T.INTEG-: 1
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 5
- T.INTEG-TSF-CODE: 3
- T.INTEG-TSF-DATA: 3
- T.RBP-APPLI-DATA: 3
- T.RBP-TSF-DATA: 3
- T.RND: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 25
- Triple-DES: 3
- constructions:
- MAC:
- CMAC: 16
- HMAC: 25
- HMAC-SHA-384: 1
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 6
- DHE: 2
- Diffie-Hellman: 2
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 9
- SHA256: 1
- SHA384: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 15
- SHA-384: 8
- SHA-512: 8
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 96
- TLS 1.0: 2
- TLS 1.1: 4
- TLS 1.2: 4
- TLS v1.1: 1
- TLSv1.1: 4
- TLSv1.2: 5
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-256: 10
- P-256: 13
- curve P-256: 1
- secp256r1: 8
|
- NIST:
- NIST P-192: 5
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-192: 13
- P-224: 16
- P-256: 12
- P-384: 14
- P-521: 16
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 4
- Malfunction: 3
- fault injection: 2
- malfunction: 3
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- Side-channel: 1
- physical probing: 4
- side channel: 4
- side channels: 1
- side-channel: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 6
- FIPS 186-2: 1
- FIPS PUB 186-3: 3
- FIPS197: 2
- FIPS198-1: 2
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2616: 1
- RFC 2818: 1
- RFC 4253: 2
- RFC 4346: 1
- RFC 5246: 1
- RFC1321: 2
- RFC2104: 2
- RFC2616: 2
- RFC2818: 2
- RFC3447: 11
- RFC3526: 2
- RFC4251: 4
- RFC4252: 5
- RFC4253: 9
- RFC4254: 2
- RFC4346: 9
- RFC4492: 7
- RFC5228: 2
- RFC5246: 8
- RFC5280: 3
- RFC6151: 1
- X509:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 4
- FIPS 197: 5
- FIPS 198-1: 2
- FIPS PUB 180-4: 4
- FIPS PUB 186-4: 5
- FIPS PUB 197: 3
- FIPS PUB 198-1: 3
- FIPS186-4: 2
- FIPS198-1: 1
- FIPS46-3: 1
- NIST:
- NIST SP 800-108: 3
- NIST SP 800-38A: 3
- NIST SP 800-38B: 2
- NIST SP 800-38C: 1
- NIST SP 800-56A: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TOE, including the fipscardsync utility provided with BIG-IP for convenience, are considered to be out of scope for this evaluation. 7.1.4.3 Certificate validation For TLS sessions, the TOE implements: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: David Ochel, Gordon McIntosh, Staffan Persson (generated by CCTool version 2.8.4)
- /CreationDate: D:20180213114202Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, F5, VPN, Networking
- /ModDate: D:20180213114202Z
- /Producer: XEP 4.18 build 20100322
- /Subject: BIG-IP ADC-AP
- /Title: BIG-IP 11.5.1 HF 10 (build 10.123.180) ADC-AP Security Target (version 1.6 as of 2018-02-12)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 2959661
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://www.ietf.org/rfc/rfc2104.txt, http://www.ietf.org/rfc/rfc5228.txt, https://devcentral.f5.com/wiki/iRules.Events.ashx, http://www.ietf.org/rfc/rfc1321.txt, http://www.ietf.org/rfc/rfc3447.txt, http://tmml.sourceforge.net/doc/tcl/index.html, http://www.ietf.org/rfc/rfc4492.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://www.ietf.org/rfc/rfc5246.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://www.ietf.org/rfc/rfc3526.txt, https://devcentral.f5.com/wiki/iRules.Commands.ashx, http://www.ietf.org/rfc/rfc5280.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
- /Author: QTI
- /Keywords: integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
- /Subject: 80-NU430-6 Rev.H
- /Title: Qualcomm® Secure Processing Unit SPU230 Core Security Target Lite
- pdf_file_size_bytes: 824155
- pdf_hyperlinks: mailto:[email protected], https://createpoint.qti.qualcomm.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |