Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
ISCB-5-RPT-C112-CR-v1
ST31G480 F01 including optional cryptographic library NESLIB (ANSSI-CC-2023/52)
ANSSI-CC-2023/52
name CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12 ST31G480 F01 including optional cryptographic library NESLIB (ANSSI-CC-2023/52)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY FR
status archived active
not_valid_after 23.10.2025 28.12.2028
not_valid_before 23.10.2020 28.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C112-CERTIFICATE-v1%20signed.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_52fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C112-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_52fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CYSECA%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_52en.pdf
manufacturer Pernec Integrated Network Systems Sdn. Bhd. STMicroelectronics
manufacturer_web https://www.pernec.com.my/ https://www.st.com/
security_level EAL2 ALC_TAT.3, ALC_CMC.5, ASE_TSS.2, AVA_VAN.5, ADV_IMP.2, ALC_DVS.2, ADV_TDS.5, EAL5+, ALC_FLR.1
dgst 5bbd05b848eb7573 cae3a5fbbee34a59
heuristics/cert_id ISCB-5-RPT-C112-CR-v1 ANSSI-CC-2023/52
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.2, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1
heuristics/extracted_versions 1.2.0, 1.1.12 2023, 52
heuristics/scheme_data
  • cert_no: 2020-007-C112
  • certification_date: 23.10.2020
  • developer: Pernec Integrated Network Systems Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Other Devices and Systems
    • cert_id: C112
    • certification_date: 23.10.2020
    • developer: 21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/
    • expiration_date: 23.10.2025
    • mutual_recognition: CCRA
    • product: CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/ISCB-5-RPT-C112-CR-v1.pdf
    • scope: The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/CYSECA_Security_Target_v1.0.pdf
    • type: Other Devices and Systems
  • expiration_date: 23.10.2025
  • level: EAL2
  • product: CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/133
heuristics/protection_profiles {} cf0f01bcd7be3e9c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename ISCB-5-CERT-C112-CERTIFICATE-v1 signed.pdf certificat-CC-2023_52fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/52: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 1
    • ADV_TDS.5: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 2
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_metadata
  • /CreationDate: D:20201105094524+08'00'
  • /Creator: ISCB Printer
  • /ModDate: D:20201105125157+08'00'
  • /Producer: KONICA MINOLTA bizhub C360i
  • /Title: SISCB Print20110509451
  • pdf_file_size_bytes: 226462
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20240105141710+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240105150220+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 159131
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ISCB-5-RPT-C112-CR-v1.pdf ANSSI-CC-2023_52fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C112-CR-v1: 1
    • ISCB-5-RPT-C112-CR-v1: 36
  • FR:
    • ANSSI-CC-2023/52: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 1
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 ElevĂ©: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 1
    • ADV_TDS.5: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.PHYSICAL: 1
    • A.PLATFORM: 1
    • A.TIMESTAMP: 1
    • A.USER: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /CreationDate: D:20201111142929Z00'00'
  • /Creator: Word
  • /ModDate: D:20201111142929Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 789695
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename CYSECA Security Target v1.0.pdf ANSSI-cible-CC-2023_52en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 8
    • BSI-CC-PP-0084-: 3
    • BSI-CC-PP-0084-2014: 52
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
  • EAL:
    • EAL4: 1
    • EAL5: 15
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 4
    • ASE_INT.1: 4
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 7
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 2
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.2: 4
    • ADV_INT.2: 1
    • ADV_TDS.5: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 4
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_FLR.1: 6
    • ALC_LCD.1: 1
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 2
    • ASE_OBJ: 7
    • ASE_OBJ.2: 1
    • ASE_REQ: 24
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 7
    • ASE_SPD.1: 1
    • ASE_TSS: 9
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 2
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 5
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 6
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTP:
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_SAS: 2
    • FAU_SAS.1: 6
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.4: 4
    • FCS_COP.1: 35
    • FCS_RNG: 2
    • FCS_RNG.1: 6
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.2: 12
    • FDP_ACF.1: 24
    • FDP_CKM.2: 1
    • FDP_IFC.1: 16
    • FDP_ITC.1: 13
    • FDP_ITC.2: 2
    • FDP_ITT.1: 10
    • FDP_SDC: 2
    • FDP_SDC.1: 8
    • FDP_SDI.2: 8
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
  • FIA:
    • FIA_UID.1: 10
  • FMT:
    • FMT_ITC.1: 1
    • FMT_LIM: 2
    • FMT_LIM.1: 17
    • FMT_LIM.2: 18
    • FMT_MSA.1: 20
    • FMT_MSA.3: 21
    • FMT_SMF.1: 16
    • FMT_SMR.1: 12
  • FPT:
    • FPT_FLS.1: 11
    • FPT_ITT.1: 9
    • FPT_PHP.3: 11
  • FRU:
    • FRU_FLT.2: 11
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.PHYSICAL: 4
    • A.PLATFORM: 4
    • A.TIMESTAMP: 3
    • A.USER: 4
  • O:
    • O.ACCESS: 2
    • O.CONFIG: 4
    • O.MANAGE: 1
    • O.SEC_COM: 1
    • O.USER: 5
  • OE:
    • OE.ADMIN: 1
    • OE.PHYSICAL: 1
    • OE.PLATFORM: 2
    • OE.TIMESTAMP: 1
    • OE.TOE_ACCESS: 3
    • OE.USER: 3
  • T:
    • T.AUDIT_COMPROMISE: 2
    • T.CONFIG: 4
    • T.MASQUERADE: 3
    • T.UNAUTHORISED_AC: 1
  • O:
    • O.C: 2
    • O.RND: 4
  • R:
    • R.O: 2
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 1
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 25
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
      • Triple-DES: 1
    • DES:
      • DES: 12
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
    • EdDSA:
      • EdDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 11
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • Keccak:
    • Keccak: 14
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-2: 3
      • SHA-224: 5
      • SHA-256: 8
      • SHA-384: 8
      • SHA-512: 7
    • SHA3:
      • SHA-3: 5
      • SHA3-224: 4
      • SHA3-256: 4
      • SHA3-384: 4
      • SHA3-512: 4
  • SHAKE:
    • SHAKE128: 4
    • SHAKE256: 4
pdf_data/st_keywords/crypto_scheme
  • KEM:
    • KEM: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
      • TLS v1.2: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • CCM:
    • CCM: 3
  • ECB:
    • ECB: 7
  • GCM:
    • GCM: 3
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 3
    • Nescrypt: 8
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib : 9
    • NesLib 255: 1
    • NesLib 256: 1
    • NesLib 259: 1
    • NesLib 262: 1
    • NesLib 266: 1
    • NesLib 267: 1
    • NesLib 268: 1
    • NesLib 270: 1
    • NesLib 271: 1
    • NesLib 6.2: 2
    • NesLib 6.2.1: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 13
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 12
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 9
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 20
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-2: 5
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
    • FIPS PUB 198-1: 3
    • FIPS PUB 202: 6
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 14888: 2
    • ISO/IEC 18092: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 3
    • NIST SP 800-67: 3
    • NIST SP 800-90: 4
    • SP 800-38A: 3
    • SP 800-38C: 1
    • SP 800-38D: 1
    • SP 800-67: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS #1: 6
    • PKCS1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation: 1
    • out of Scope: 1
    • within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and: 1
  • OutOfScope:
    • ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib when it is embedded: 1
    • The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib when it is embedded. 1.6.3 TOE documentation 39 The user guidance: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different