| name |
Log Radar v3.2.15 with modules Console, Collector and Archiver |
DocuSign QSCD for remote signing version 1.2.0.7 |
| category |
Detection Devices and Systems |
Products for Digital Signatures |
| scheme |
MY |
NL |
| status |
archived |
active |
| not_valid_after |
01.09.2019 |
30.01.2029 |
| not_valid_before |
13.02.2013 |
30.01.2024 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300054-01-Cert.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C010-CR-v1a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300054-01-CR.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LogRadar_ST-Document_v1-0R.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300054-01-ST%20v4.3.8.pdf |
| manufacturer |
TecForte Sdn Bhd |
DocuSign, Inc. |
| manufacturer_web |
https://www.tecforte.com |
https://www.docusign.com/ |
| security_level |
EAL2 |
EAL4+, AVA_VAN.5 |
| dgst |
5e01e4eeaa77cb17 |
8f1aeadd016f144a |
| heuristics/cert_id |
ISCB-5-RPT-C010-CR-v1a |
NSCIB-CC-2300054-01-CR |
| heuristics/cert_lab |
[] |
|
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
3.2.15 |
1.2.0.7 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2013-002-C010
- certification_date: 13.02.2013
- developer: TecForte Sdn Bhd
- enhanced:
- assurance_level: EAL2
- category: Detection Devices and Systems
- cert_id: C010
- certification_date: 13.02.2013
- developer: Leong Wei Khuan Level 27, Quill 7,Jalan Stesen Sentral 5,Kuala Lumpur Sentral,50470 Kuala Lumpur,MALAYSIA. URL: http://www.tecforte.comEmail: [email protected]: +603 2776 6936Fax: +603 2776 6999
- expiration_date: 13.02.2018
- mutual_recognition: CCRA
- product: Log Radar v3.2.15 with modules Console, Collector and Archiver
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/ISCB-5-RPT-C010-CR-v1a.pdf
- scope: The Target of Evaluation (TOE) is Log Radar v3.2.15 with modules Console, Collector and Archiver; commonly referred as LogRadar. LogRadar is an automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications. Its key aims are to collect, normalise process and manage such information (logs) from a real time context. The modules included in the scope of the security evaluation and certification are: Console - acts as the interfacing point between user and TOE, Collector - its core function is to collect streams of data as and when they occur and process these device specific logs into a common and normalised form, and Archiver - functions as a backup daemon. In the context of the evaluation, the TOE is expected to provide the following major security features: Identification and authentication – the TOE provides user identification and authentication independent from the operating system on which it operates on. Security audit – the TOE records each individual user session and tracks each action within the session. Granular access control – the TOE allows users access permission within the application to be dynamically and granularly assigned via users and group memberships. Password management – the TOE provides a full password management function including the management of password policy rules as well as password expiry settings. Sessions management – the TOE maintain session management and restricts a single login for only a single valid session. Socket layer – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Import and export of configuration data – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Automated archive – the TOE provides a mechanism where the auto archival of aggregated reports, rawlogs and syslogs will be automatically hashed with MD-5 checksum, archived with AES encryption and stored at predetermined times. Real time syslog collection – the TOE provides the ability for authorised users to dynamically configure the TOE to listen to syslog streams from network devices, servers and/or any other supported applications.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/LogRadar_ST-Document_v1-0R.pdf
- type: Automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications.
- expiration_date: 13.02.2018
- level: EAL2
- product: Log Radar v3.2.15 with modules Console, Collector and Archiver
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/80
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
ee319f4a624019b0, eabbd431e1f174cd |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf |
| pdf_data/cert_filename |
|
NSCIB-CC-2300054-01-Cert.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-PP-2018/02-M01: 1
- NL:
- NSCIB-2300054-01: 1
- NSCIB-CC-2300054-01: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2018/02-M01: 1
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Wim Ton
- /CreationDate: D:20240130161604+00'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20240130161604+00'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 124661
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ISCB-5-RPT-C010-CR-v1a.pdf |
NSCIB-CC-2300054-01-CR.pdf |
| pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2300054-01-CR
- cert_item: DocuSign QSCD for remote signing version 1.2.0.7
- cert_lab: SGS Brightsight B.V.
- developer: DocuSign
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C010-CR-v1a: 31
|
- FR:
- ANSSI-CC-PP-2016/05-M01: 1
- ANSSI-CC-PP-2018/02-M01: 1
- NL:
- NSCIB-2300054-01: 1
- NSCIB-CC-2300054-01-CR: 14
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2016/05-M01: 1
- ANSSI-CC-PP-2018/02-M01: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- other:
- JIL: 2
- JIL-AAPHD: 1
- JIL-AMHD: 1
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Norhazimah Abdul Malek
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20130218150743+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: TecForte Sdn Bhd
- /Document Type: REPORT
- /Identifier: ISCB-5-RPT-C010-CR-v1a
- /Index: ISCB_TMP_011
- /Keywords: Log Radar v3.2.15
- /ModDate: D:20130218150748+08'00'
- /Phase: External
- /Producer: Adobe PDF Library 10.0
- /Released: 13 February 2013
- /ST: LogRadar Security Target
- /ST Version: v1.0R
- /SourceModified: D:20130218070717
- /Sponsor: TecForte Sdn Bhd
- /Subject: Log Radar v3.2.15 with modules Console, Collector and Archiver
- /TOE: Log Radar
- /TOE Name: LogRadar
- /TOE Version: v3.2.15
- /Title: C010 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 476755
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
|
| pdf_data/st_filename |
LogRadar_ST-Document_v1-0R.pdf |
NSCIB-CC-2300054-01-ST v4.3.8.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-PP-2018/02-M01: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2018/02-M01: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_GEN.3: 15
- FAU_GEN.3.1: 1
- FAU_GEN.3.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FCS:
- FCS_COP.1: 23
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 14
- FDP_ACC.2: 8
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 2
- FDP_ACF.1: 10
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 2
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFC.2: 1
- FDP_IFF: 2
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_UAU: 1
- FIA_UAU.1: 5
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 11
- FMT_MOF.1.1: 2
- FMT_MSA: 3
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_REV: 2
- FMT_REV.1: 6
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SAE: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FMT_SMT: 1
- FPT:
- FPT_ETC: 4
- FPT_ETC.2: 8
- FPT_ETC.2.1: 1
- FPT_ETC.2.2: 1
- FPT_ETC.2.3: 1
- FPT_ETC.2.4: 2
- FPT_FMT: 1
- FPT_ITC: 2
- FPT_ITC.2: 8
- FPT_ITC.2.1: 1
- FPT_ITC.2.2: 1
- FPT_ITC.2.3: 1
- FPT_ITC.2.4: 1
- FPT_ITC.2.5: 2
- FPT_STM.1: 7
- FPT_TDC: 1
- FRU:
- FRU_RSA: 1
- FRU_RSA.1: 8
- FRU_RSA.1.1: 1
- FRU_SRA.1: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_TRP: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG.2: 4
- FAU_STG.2.1: 1
- FAU_STG.2.2: 2
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 13
- FCS_CKM.1: 9
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 22
- FCS_COP.1: 17
- FCS_RND.1: 1
- FCS_RNG: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 81
- FDP_ACC.1: 15
- FDP_ACF: 46
- FDP_ACF.1: 56
- FDP_ETC: 7
- FDP_ETC.2: 9
- FDP_IFC: 20
- FDP_IFC.1: 4
- FDP_IFF: 18
- FDP_IFF.1: 24
- FDP_ITC: 7
- FDP_ITC.2: 11
- FDP_RIP: 1
- FDP_RIP.1: 6
- FDP_SDI: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 5
- FDP_UCT.1.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 4
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 13
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 5
- FIA_UAU.6: 6
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 4
- FIA_UID.2.1: 1
- FIA_USB: 2
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 2
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 43
- FMT_MSA.1: 8
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MTD: 13
- FMT_MTD.1: 5
- FMT_SMF: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 4
- FMT_SMR: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RPL: 1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TDC: 1
- FPT_TDC.1: 4
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 10
- FPT_TST_EXT.1.1: 3
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 4
- FTP_TRP: 24
- FTP_TRP.1: 21
- FTP_TRP.1.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.DIRECT: 2
- A.INTEGR: 3
- A.LOCATE: 3
- A.MANAGE: 2
- A.NOEVIL: 3
- A.NOTRST: 2
- A.PROTCT: 2
- A.REM_OPER: 1
- A.TIME: 6
- O:
- O.ACCESS: 19
- O.AUDITS: 7
- O.EADMIN: 12
- O.EXPORT: 10
- O.IDAUTH: 29
- O.INTEGR: 6
- O.PROTCT: 9
- O.SECRMT: 2
- O.TMSTMP: 2
- OE:
- OE.INSTAL: 4
- OE.INSTALL: 1
- OE.INTEGR: 5
- OE.OFLOWS: 5
- OE.PERSON: 7
- OE.PHYCAL: 7
- OE.TMSTMP: 6
- T:
- T.COMINT: 3
- T.DLOSS: 5
- T.IMPCON: 3
- T.INFLUX: 3
- T.INSECUSE: 3
- T.INTEGR: 3
- T.LOSSOF: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.UNATHDVCE: 2
|
- A:
- A.ACCESS_PROTECTED: 1
- A.AUTH_DATA: 1
- A.CA: 2
- A.PRIVILEGED_USER: 1
- A.SEC_REQ: 1
- A.SIGNATURE_REQUEST_DISCLOSURE: 1
- A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 1
- A.SIGNER_DEVICE: 1
- A.SIGNER_ENROLMENT: 1
- A.TSP_AUDITED: 1
- OE:
- OE.ENV: 1
- OE.SIGNER_AUTHENTICATION_DATA: 1
- OE.SVD_AUTHENTICITY: 1
- OSP:
- OSP.CRYPTO: 1
- OSP.RANDOM: 3
- OSP.TSP_AUDITED: 1
- OT:
- OT.AUDIT_PROTECTION: 1
- OT.PRIVILEGED_USER_MANAGEMENT: 2
- OT.PRIVILEGED_USER_PROTECTION: 2
- OT.RANDOM: 2
- OT.RNG: 3
- OT.SAD_VERIFICATION: 2
- OT.SAP: 1
- OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 2
- OT.SIGNATURE_INTEGRITY: 2
- OT.SIGNER_KEY_PAIR_GENERATION: 2
- OT.SIGNER_PROTECTION: 2
- OT.SVD: 1
- OT.SYSTEM_PROTECTION: 1
- R:
- R.AUDIT: 1
- R.RAD: 2
- R.RANDOM: 1
- R.SAD: 23
- R.SSA: 4
- R.SVD: 32
- R.TSFDATA: 4
- R.TSF_DATA: 6
- T:
- T.ADMIN_IMPERSONATION: 3
- T.AUDIT_ALTERATION: 1
- T.AUTHENTICATION_SIGNER_IMPERSONA: 1
- T.AUTHENTICATION_SIGNER_IMPERSONATION: 2
- T.AUTHORISATION_DATA_DISCLOSE: 1
- T.AUTHORISATION_DATA_UPDATE: 3
- T.CONTEXT_ALTERATION: 3
- T.DTBSR_FORGERY: 2
- T.ENROLMENT_SIGNER_AUTHENTICATION: 1
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 2
- T.ENROLMENT_SIGNER_IMPERSONATION: 3
- T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 1
- T.PRIVILEGED_USER_INSERTION: 3
- T.RANDOM: 4
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_M: 1
- T.SAD_FORGERY: 3
- T.SAP_BYPASS: 3
- T.SAP_REPLAY: 2
- T.SIGNATURE_FORGERY: 2
- T.SIGNATURE_REQUEST_DISCLOSURE: 2
- T.SIGNER_AUTHENTICATION_DATA_MODI: 1
- T.SVD_FORGERY: 2
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 5
- AES-128: 1
- AES-256: 2
- AES256: 6
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- RSA:
- RSA 2048: 1
- RSA 3072: 1
- RSA 4096: 1
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
- SHA256: 4
- SHA384: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 23
- TLS v1.2: 1
- TLS1.2: 1
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 2
- P-384: 2
- P-521: 2
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 2
- physical tampering: 4
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS PUB 186-4: 1
- FIPS PUB 198-1: 1
- ISO:
- NIST:
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2865: 1
- RFC 4346: 1
- RFC 5246: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: WKhuan
- /Company:
- /CreationDate: D:20130115175724+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20130115175735+08'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20130115013704
- pdf_file_size_bytes: 614209
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
- /Author: Guy
- /CreationDate: D:20240130103924+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20240130103924+01'00'
- /Producer: Microsoft® Word 2016
- /Title: Functional Design – Cosign version 3
- pdf_file_size_bytes: 3514076
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 144
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |