name |
EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™ |
Secure Smart Grid Hub (SGH-S), V1.02 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
CA |
DE |
status |
archived |
active |
not_valid_after |
15.05.2017 |
02.02.2033 |
not_valid_before |
30.05.2011 |
03.02.2025 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000V2b_pdf.pdf |
manufacturer |
EMC Corporation |
EFR GmbH |
manufacturer_web |
https://www.emc.com/ |
https://www.efr.de |
security_level |
EAL3+, ALC_FLR.2 |
EAL4+, ALC_FLR.2, AVA_VAN.5 |
dgst |
5c135ac1bf057d70 |
086e8d4dead89abf |
heuristics/cert_id |
383-4-172 |
BSI-DSZ-CC-1000-V2-2025 |
heuristics/cert_lab |
CANADA |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ATE_COV.2, ASE_SPD.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, ASE_OBJ.2, ADV_ARC.1, ALC_FLR.2, ASE_CCL.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1 |
heuristics/extracted_versions |
7.0, 5.31 |
1.02 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1000-2023 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1000-2023 |
heuristics/scheme_data |
|
- category: Intelligent measuring systems
- cert_id: BSI-DSZ-CC-1000-V2-2025
- certification_date: 03.02.2025
- enhanced:
- applicant: EFR GmbH Nymphenburger Straße 20b 80335 München
- assurance_level: EAL4+,ALC_FLR.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1000V2c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 03.02.2025
- description: The TOE is the security functionality of a Smart Meter Gateway that serves as the communi-cation unit between devices of private and commercial consumers and commodity industry service providers (e.g., electricity, gas, water, etc.). It also collects, processes and stores Meter Data and is responsible for the distribution of this data to external entities
- entries: [frozendict({'id': 'BSI-DSZ-CC-1000-V2-2025', 'description': "This re-certification was necessary because of the re-location of IT infrastructure in the development Environment and a changed delivery method due to enable delivery chains according to [MSB-LK, see: https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Smart-metering/Smart-Meter- Gateway/MSB/MSB_node.html ]. Also, the developer updated third-party components of the TOE and corrected defects in the implementation. There were no changes to the TOE's security functionality."}), frozendict({'id': 'BSI-DSZ-CC-1000-2023-MA-01', 'description': '(National Metrology Institute) requirements.'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 02.02.2033
- product: Secure Smart Grid Hub (SGH-S), V1.02
- protection_profile: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1000V2a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1000V2b_pdf.pdf?__blob=publicationFile&v=2
- product: Secure Smart Grid Hub (SGH-S), V1.02
- subcategory: (Smart Meter Gateway)
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/1000.html
- vendor: EFR GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1003-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1003-2018, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/54 |
heuristics/protection_profiles |
{} |
989546572bfeab5c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073V2b_pdf.pdf |
pdf_data/cert_filename |
|
1000V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1000-V2-2025: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Smart Meter Gateway, efr, BSI-DSZ-CC-1000-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Smart Meter Gateway, efr, BSI-DSZ-CC-1000-V2-2025
- /Title: Certificate BSI-DSZ-CC-1000-V2-2025
- pdf_file_size_bytes: 335426
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
emc-vnx-v531-cert-eng.pdf |
1000V2a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- CA:
- cert_id: 383-4-172-CR
- cert_lab: CANADA
|
- DE:
- cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by AVA_VAN.5 and ALC_FLR.2 valid until: 2 February 2033
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1000-V2-2025
- cert_item: Secure Smart Grid Hub (SGH-S) Version 1.02
- cert_lab: BSI
- developer: EFR GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
- CA:
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-172: 1
- 383-4-172-CR: 1
|
- DE:
- BSI-DSZ-CC-1000-2023: 3
- BSI-DSZ-CC-1000-V2-2025: 14
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073: 1
- BSI-CC-PP-0073-2014: 5
- BSI-CC-PP-0077-V2-2015: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS: 1
- ALC_FLR: 3
- ALC_FLR.2: 4
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
- SHA256: 5
|
pdf_data/report_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 1
- MAC:
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 1
- SCA:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
- BSI TR-03109-3: 1
- BSI TR-03111: 1
- BSI TR-03116: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- AIS 46: 2
- AIS 48: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18033-: 1
- ISO/IEC 18045: 4
- RFC:
- RFC 2104: 2
- RFC 3394: 2
- RFC 4493: 3
- RFC 5084: 3
- RFC 5246: 1
- RFC 5289: 4
- RFC 5652: 3
- RFC-2104: 1
- RFC-3394: 1
- RFC4493: 1
- RFC5246: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 7] Evaluation Technical Report, Version 2.3, 21.01.2025, SRC Security Research & Consulting GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- ALC_CMS “Konfigurations-Management-Scope Konfigurationsliste”, v1.19_e; 13.01.2025, EFR GmbH (confidential document) [11] Servicetechniker Handbuch für das Smart-Meter-Gateway (SMGW) Secure Smart Grid Hub EFR SGH-S: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- OutOfScope:
- 2. Multiple Communication Modules for LTE exist, however these are non-TOE components and as such out of scope for this certification. 16 / 26 BSI-DSZ-CC-1000-V2-2025 Certification Report 9. Results of the: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: TBD
- /CR_Version: 1.0
- /Client City: Hopkinton
- /Client Country: USA
- /Client Full Name: EMC Corporation
- /Client Postal Code: 01748
- /Client Short Name: EMC
- /Client State: MA
- /Client Street: 171 South Street
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Hewlett-Packard
- /CreationDate: D:20110708105045-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: EMC Corporation
- /Developer Short Name: EMC
- /EAL Level: 3+
- /EAL Level Base: 3
- /EAL Level Text: 3 augmented
- /EAL Long: EAL 3 Augmented
- /EAL Short: EAL 3+
- /ER Document Date: 15 September 2010
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1683-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 1.0
- /ETPlan_date: 7 April 2011
- /ETProcRes_Date: 7 April 2011
- /ETProcRes_Doc#: 1683-000-D004
- /ETProcRes_Title: Evaluation Test Procedures and Test results
- /ETProcRes_Version: 1.0
- /ETProc_Date: 7 April 2011
- /ETProc_Doc#: 1683-000-D004
- /ETProc_Title: Evaluation Test Procedures and Test results
- /ETProc_Version: 1.0
- /ETReport_Date: 30 May 2011
- /ETReport_Doc#: 1683-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 1.2
- /EWP_Date: 12 November 2010
- /EWP_Doc#: 1683-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-172
- /Eval_End_Date: 1 July 2011
- /Eval_Start_Date: 2 August 2010
- /Keywords:
- /LeadEvaluator: Greg Lague
- /LeadEvaluatorInitials: GL
- /ModDate: D:20110708105130-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1683
- /ST_Date: 27 May 2011
- /ST_Title: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
- /ST_Version: 0.8
- /SVC_Date: 9 December 2009
- /SVC_Doc#: 1683-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 0.1
- /SVR_Date: 7 April 2011
- /SVR_Doc#: 1683-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Hopkinton, MA
- /Security Classification: EWA-Canada & EMC Proprietary
- /SourceModified: D:20110708141631
- /Sponsor: EMC
- /Sponsor City: Hopkinton
- /Sponsor Country: USA
- /Sponsor Postal Code: 01748
- /Sponsor State: MA
- /Sponsor Street: 171 South Street
- /Subject:
- /TOE: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
- /TOE Short: EMC® VNX OE
- /TOE Short with version: EMC® VNX OE
- /TOE Short-NoTM: EMC® VNX OE
- /TOE Version: Block v5.31 and File v7.0
- /TOE with version: EMC® VNX OE for Block v5.31 and File v7.0 with Unisphere™ running on VNX Series Hardware
- /TOE-NoTM: EMC VNX OE for Block v5.31 and File v7.0 with Unisphere running on VNX Series Hardware
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 89946
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 12
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Smart Meter Gateway, efr, BSI-DSZ-CC-1000-V2-2025"
- /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Smart Meter Gateway, efr, BSI-DSZ-CC-1000-V2-2025
- /Title: Certification Report BSI-DSZ-CC-1000-V2-2025
- pdf_file_size_bytes: 461034
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
emc-vnx-v531-sec-eng.pdf |
1000V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1003-: 1
- BSI-DSZ-CC-1003-2018: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073-: 1
- BSI-CC-PP-0073-2014: 5
- BSI-CC-PP-0077-: 1
- BSI-CC-PP-0077-2015: 2
- BSI-CC-PP-0077-V2-2015: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 4
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 5
- ALC_FLR.2: 5
- ALC_LCD.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_SPD: 3
- ASE_SPD.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC: 20
- FDP_ACC.1: 2
- FDP_ACF: 17
- FDP_ACF.1: 8
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 32
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 18
- FMT_MTD.1: 3
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FAU_ARP: 9
- FAU_GEN: 30
- FAU_GEN.1: 22
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAA: 9
- FAU_SAA.1: 5
- FAU_SAR: 21
- FAU_SAR.1: 9
- FAU_STG: 23
- FAU_STG.1: 8
- FAU_STG.2: 10
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 2
- FAU_STG.3: 3
- FAU_STG.4: 3
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO: 3
- FCO_NRO.1: 1
- FCO_NRO.2: 8
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 48
- FCS_CKM.1: 6
- FCS_CKM.2: 5
- FCS_CKM.4: 28
- FCS_CKM.4.1: 2
- FCS_COP: 49
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.2: 8
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 24
- FDP_IFC.1: 12
- FDP_IFC.2: 4
- FDP_IFF: 20
- FDP_IFF.1: 22
- FDP_IFF.1.3: 1
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 7
- FDP_RIP.2.1: 1
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 2
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 45
- FMT_MSA.1: 10
- FMT_MSA.3: 11
- FMT_SMF: 2
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_CON: 6
- FPR_CON.1: 9
- FPR_CON.1.1: 2
- FPR_CON.1.2: 4
- FPR_PSE: 2
- FPR_PSE.1: 7
- FPR_PSE.1.1: 1
- FPR_PSE.1.2: 1
- FPR_PSE.1.3: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RPL: 3
- FPT_RPL.1: 6
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 18
- FPT_STM.1.1: 1
- FPT_TST: 3
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.PROTECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 23
- O.AUDIT: 4
- O.AUDIT_REVIEW: 4
- O.BYPASS: 7
- O.PROTECT: 16
- OE:
- OE.PROPER_NAME_ASSIGNME: 2
- OE.PROPER_NAME_ASSIGNMEN: 1
- OE.SECURE_COMMUNICATIO: 6
- OE.SECURE_COMMUNICATION: 1
- OE.SECURE_SERVERS: 7
- OE.TIME: 3
- T:
- T.DATA_CORRUPTION: 2
- T.IMPROPER_CONFIG: 2
- T.IMPROPER_SERVER: 2
- T.MEDIATE_ACCESS: 2
- T.UNAUTH: 2
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- JH:
- SHA:
- SHA2:
- SHA-2: 3
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 3
- physical tampering: 3
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03109-1: 2
- BSI TR-03111: 1
- BSI TR-03116-3: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- NIST:
- NIST SP 800-38D: 1
- SP 800-38A: 1
- RFC:
- RFC 2104: 1
- RFC 3394: 1
- RFC 4493: 1
- RFC 5084: 1
- RFC 5246: 1
- RFC 5289: 1
- RFC 5652: 1
- RFC-2104: 2
- RFC-3394: 2
- RFC-4493: 3
- RFC-5084: 2
- RFC-5246: 3
- RFC-5289: 3
- RFC-5652: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Greg Milliken
- /CreationDate: D:20110527131502Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110621111006-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
- /Title: Security Target
- pdf_file_size_bytes: 887892
- pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.emc.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
- pdf_file_size_bytes: 1249957
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |