Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
383-4-172
KSignAccess V5.0
KECS-CISS-1342-2025
name EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™ KSignAccess V5.0
category Other Devices and Systems Access Control Devices and Systems
scheme CA KR
status archived active
not_valid_after 15.05.2017 07.03.2030
not_valid_before 30.05.2011 07.03.2025
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[KECS-CR-25-05]%20Certification%20Report(KSignAccess%20V5.0).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KSignAccess%20V5.0%20Security%20Target%20V1.4.pdf
manufacturer EMC Corporation KSign Co., LTD.
manufacturer_web https://www.emc.com/
security_level EAL3+, ALC_FLR.2 {}
dgst 5c135ac1bf057d70 7fd9f6bf3c95296f
heuristics/cert_id 383-4-172 KECS-CISS-1342-2025
heuristics/cert_lab CANADA []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_FUN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ATE_COV.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/extracted_versions 7.0, 5.31 5.0
heuristics/scheme_data
heuristics/protection_profiles {} c8a7b648d31ea8cb
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/KECS-PP-1230-2023_PP_EN.pdf
pdf_data/report_filename emc-vnx-v531-cert-eng.pdf [KECS-CR-25-05] Certification Report(KSignAccess V5.0).pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-172-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-172: 1
    • 383-4-172-CR: 1
  • KR:
    • KECS-CISS-1342-2025: 1
pdf_data/report_keywords/cc_protection_profile_id
  • KECS:
    • KECS-PP-1230-2023: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 3+: 3
  • EAL:
    • EAL1+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 2
    • ASE_REQ.1: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_FUN.1: 3
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN.1: 5
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 3
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2022-11-001: 2
    • CCMB-2022-11-005: 2
    • CCMB-2022-11-006: 1
    • CCMB-2024-07-002: 3
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1R3
  • /CC date: July 2009
  • /CEM Version: 3.1R3
  • /CEM date: July 2009
  • /CR_Date: TBD
  • /CR_Version: 1.0
  • /Client City: Hopkinton
  • /Client Country: USA
  • /Client Full Name: EMC Corporation
  • /Client Postal Code: 01748
  • /Client Short Name: EMC
  • /Client State: MA
  • /Client Street: 171 South Street
  • /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
  • /Company: Hewlett-Packard
  • /CreationDate: D:20110708105045-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer Long Name: EMC Corporation
  • /Developer Short Name: EMC
  • /EAL Level: 3+
  • /EAL Level Base: 3
  • /EAL Level Text: 3 augmented
  • /EAL Long: EAL 3 Augmented
  • /EAL Short: EAL 3+
  • /ER Document Date: 15 September 2010
  • /ER Version: Version 1.0
  • /ETPlan_Doc#: 1683-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 1.0
  • /ETPlan_date: 7 April 2011
  • /ETProcRes_Date: 7 April 2011
  • /ETProcRes_Doc#: 1683-000-D004
  • /ETProcRes_Title: Evaluation Test Procedures and Test results
  • /ETProcRes_Version: 1.0
  • /ETProc_Date: 7 April 2011
  • /ETProc_Doc#: 1683-000-D004
  • /ETProc_Title: Evaluation Test Procedures and Test results
  • /ETProc_Version: 1.0
  • /ETReport_Date: 30 May 2011
  • /ETReport_Doc#: 1683-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 1.2
  • /EWP_Date: 12 November 2010
  • /EWP_Doc#: 1683-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.0
  • /Eval number: 383-4-172
  • /Eval_End_Date: 1 July 2011
  • /Eval_Start_Date: 2 August 2010
  • /Keywords:
  • /LeadEvaluator: Greg Lague
  • /LeadEvaluatorInitials: GL
  • /ModDate: D:20110708105130-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1683
  • /ST_Date: 27 May 2011
  • /ST_Title: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /ST_Version: 0.8
  • /SVC_Date: 9 December 2009
  • /SVC_Doc#: 1683-000-D007
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 0.1
  • /SVR_Date: 7 April 2011
  • /SVR_Doc#: 1683-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 1.0
  • /SV_City: Hopkinton, MA
  • /Security Classification: EWA-Canada & EMC Proprietary
  • /SourceModified: D:20110708141631
  • /Sponsor: EMC
  • /Sponsor City: Hopkinton
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 01748
  • /Sponsor State: MA
  • /Sponsor Street: 171 South Street
  • /Subject:
  • /TOE: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /TOE Short: EMC® VNX OE
  • /TOE Short with version: EMC® VNX OE
  • /TOE Short-NoTM: EMC® VNX OE
  • /TOE Version: Block v5.31 and File v7.0
  • /TOE with version: EMC® VNX OE for Block v5.31 and File v7.0 with Unisphere™ running on VNX Series Hardware
  • /TOE-NoTM: EMC VNX OE for Block v5.31 and File v7.0 with Unisphere running on VNX Series Hardware
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • pdf_file_size_bytes: 89946
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 12
  • /Author: Administrator
  • /CreationDate: D:20250307143948+09'00'
  • /Creator: Microsoft® Word LTSC
  • /ModDate: D:20250307143948+09'00'
  • /Producer: Microsoft® Word LTSC
  • pdf_file_size_bytes: 672489
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename emc-vnx-v531-sec-eng.pdf KSignAccess V5.0 Security Target V1.4.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 4
  • EAL:
    • EAL 1+: 1
    • EAL1: 8
    • EAL1+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 14
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 7
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 16
    • ASE_OBJ.1: 9
    • ASE_REQ.1: 19
    • ASE_SPD.1: 10
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 3
    • ATE_FUN.1: 16
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 2
    • FDP_ACF: 17
    • FDP_ACF.1: 8
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 32
    • FMT_MSA.1: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 18
    • FMT_MTD.1: 3
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FAU:
    • FAU_ARP.1: 7
    • FAU_ARP.1.1: 1
    • FAU_GEN: 3
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAA.1: 7
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.2: 3
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
    • FAU_STG.5: 8
    • FAU_STG.5.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.5: 17
    • FCS_CKM.5.1: 1
    • FCS_CKM.6: 16
    • FCS_CKM.6.1: 2
    • FCS_CKM.6.2: 1
    • FCS_COP.1: 15
    • FCS_COP.1.1: 1
    • FCS_RBG.1: 16
    • FCS_RBG.1.1: 1
    • FCS_RBG.1.3: 1
    • FCS_RBG.2: 4
    • FCS_RBG.3: 14
    • FCS_RBG.3.1: 1
    • FCS_RBG.4: 12
    • FCS_RBG.4.1: 1
    • FCS_RBG.5: 12
    • FCS_RBG.5.1: 1
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
  • FIA:
    • FIA_AFL.1: 17
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_IMA.1: 12
    • FIA_IMA.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_SOS.2: 10
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SOS.3: 12
    • FIA_SOS.3.1: 2
    • FIA_UAU.1: 9
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UAU.4: 9
    • FIA_UAU.4.1: 1
    • FIA_UAU.7: 11
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_PWD.1: 15
    • FMT_PWD.1.1: 2
    • FMT_PWD.1.2: 2
    • FMT_PWD.1.3: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_PST.1: 10
    • FPT_PST.1.1: 2
    • FPT_STM.1: 3
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_MCS.2: 6
    • FTA_MCS.2.1: 1
    • FTA_MCS.2.2: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_TSE.1: 7
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.PROTECT: 2
    • A.TIMESTAMP: 2
  • O:
    • O.ADMIN: 23
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.BYPASS: 7
    • O.PROTECT: 16
  • OE:
    • OE.PROPER_NAME_ASSIGNME: 2
    • OE.PROPER_NAME_ASSIGNMEN: 1
    • OE.SECURE_COMMUNICATIO: 6
    • OE.SECURE_COMMUNICATION: 1
    • OE.SECURE_SERVERS: 7
    • OE.TIME: 3
  • T:
    • T.DATA_CORRUPTION: 2
    • T.IMPROPER_CONFIG: 2
    • T.IMPROPER_SERVER: 2
    • T.MEDIATE_ACCESS: 2
    • T.UNAUTH: 2
  • A:
    • A.LOG_BACKUP: 3
    • A.MANUAL_RECOVERY: 1
    • A.OPERATION_SYSTEM_REINFORCEMENT: 3
    • A.PHYSICAL_CONTROL: 3
    • A.SECURED_ADMIN_ACCESS: 3
    • A.SECURE_DBMS: 3
    • A.SECURE_DEVELOPMENT: 3
    • A.TRUSTED_ADMIN: 4
    • A.TRUSTED_TIMESTAMP: 3
  • OE:
    • OE.LOG_BACKUP: 4
    • OE.MANUAL_RECOVERY: 2
    • OE.OPERATION_SYSTEM_REINFORCEMENT: 3
    • OE.PHYSICAL_CONTROL: 4
    • OE.SECURED_ADMIN_ACCESS: 3
    • OE.SECURE_DBMS: 3
    • OE.SECURE_DEVELOPMENT: 4
    • OE.TRUSTED_ADMIN: 3
    • OE.TRUSTED_TIMESTAMP: 3
  • T:
    • T.I: 1
    • T.IMPERSONATION: 1
    • T.R: 2
    • T.REPLAY: 1
    • T.RETRY_AUTH_ATTEMPT: 1
    • T.S: 2
    • T.SESSION_HIJACK: 1
    • T.STORED_DATA_LEAKAGE: 1
    • T.T: 2
    • T.TRANSMISSION_DATA_DAMAGE: 1
    • T.TSF: 12
    • T.TSF_COMPROMISE: 1
    • T.WEAK_CRYPTO_PROTOCOLS: 1
    • T.WEAK_PASSWORD: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 9
  • miscellaneous:
    • SEED:
      • SEED: 4
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 2
    • RSAPSS: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 3
  • SHA:
    • SHA2:
      • SHA256: 15
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 4
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 6
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RBG: 14
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • AMD:
    • PSP: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2022-11-001: 2
    • CCMB-2022-11-002: 1
    • CCMB-2022-11-003: 1
    • CCMB-2022-11-004: 1
    • CCMB-2022-11-005: 2
    • CCMB-2024-07-002: 2
  • ISO:
    • ISO/IEC 10118-3: 3
    • ISO/IEC 14888-2: 2
    • ISO/IEC 18031: 14
    • ISO/IEC 18033-2: 5
  • NIST:
    • NIST SP 800-90: 1
  • PKCS:
    • PKCS#5: 1
pdf_data/st_metadata
  • /Author: Greg Milliken
  • /CreationDate: D:20110527131502Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110621111006-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /Title: Security Target
  • pdf_file_size_bytes: 887892
  • pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.emc.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Author: lake
  • /CreationDate: D:20250307182342+09'00'
  • /Creator: Hancom PDF 1.3.0.545
  • /ModDate: D:20250307182342+09'00'
  • /PDFVersion: 1.4
  • /Producer: Hancom PDF 1.3.0.545
  • pdf_file_size_bytes: 1710794
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 123
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different