| name |
Check Point VSX R67 with Provider-1 R71 |
Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405) |
| category |
Boundary Protection Devices and Systems |
Key Management Systems |
| scheme |
US |
MY |
| status |
archived |
archived |
| not_valid_after |
01.11.2014 |
04.01.2018 |
| not_valid_before |
11.06.2012 |
04.01.2013 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10375-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr-ISCB-5-RPT-C037-v1a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10375-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-AEP_Keyper_EAL4_ASE_1_3.pdf |
| manufacturer |
Check Point Software Technologies Ltd. |
AEP Networks Ltd. |
| manufacturer_web |
https://www.checkpoint.com/ |
https://www.aepnetworks.com/ |
| security_level |
EAL4+, ALC_FLR.3 |
EAL4+, AVA_VAN.5 |
| dgst |
6318eefdbb0ef57e |
5f49aadb6b4baf28 |
| heuristics/cert_id |
CCEVS-VR-10375-2012 |
ISCB-5-RPT-C037-CR-v1a |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
cpe:2.3:a:checkpoint:provider-1:-:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
1 |
2.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10375/
- categories: ['Enterprise Security Management', ' Firewall', ' Virtual Private Network', ' Wireless Monitoring']
- category: Enterprise Security Management
- certification_date: 11.06.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10375
- product: Check Point VSX R67 with Provider-1 R71
- scheme: US
- url: https://www.niap-ccevs.org/products/10375
- vendor: Check Point Software Technologies Ltd
|
- cert_no: 2013-001-C037
- certification_date: 04.01.2013
- developer: AEP Networks Ltd.
- enhanced:
- assurance_level: EAL4+ AVA_VAN.5
- category: Key Management System
- cert_id: C037
- certification_date: 04.01.2013
- developer: AEP Networks Ltd. Knaves Beech Business Centre,Loudwater, Buckinghamshire,HP10 9UT,UNITED KINGDOM. URL: http://www.aepnetworks.com/Email: [email protected]: +44 1628 642 600Fax: +44 1628 642 605
- expiration_date: 04.01.2018
- mutual_recognition: CCRA
- product: Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/ISCB-5-RPT-C037-CR-v1a.pdf
- scope: Keyper Hardware Security Module (HSM) v2.0 or the Target of Evaluation (TOE) is a dedicated hardware product which provides secure digital signature services, cryptographic services and key management services to applications that reside on physically separate host computer systems. The TOE is a secure module that is contained within an outer casing. The outer casing includes a Keypad, LCD screen, smart card reader and a number of external ports; they are out of the evaluation scope. The TOE is tamper reactive; and has been validated against the requirements for the FIPS PUB 140-2 at level 4. Keyper Hardware Security Module (HSM) v2.0 is intended for use in a dedicated network with devices and applications that make use of its cryptographic functions. Keyper Hardware Security Module (HSM) v2.0 should be provided appropriate physical and logical protections. The TOE encompasses two models: AEP Keyper Enterprise (Hardware: 9720, Software: 011126) and AEP Keyper Professional (Hardware: 9720, Software: 010405). Both models share the same features and architecture (the only difference is performance), therefore both models shall be considered together. Two additional “High Availability” models also exist, however they are out of the scope of this evaluation. The functions of the TOE that are within the scope of evaluation covering: Secure generation, distribution and destruction of cryptographic keys. Secure storage and management of keys throughout their lifecycle. User authentication to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only. Security management to enable role-based management of the core functions of the TOE. Access control for key management functions to ensure that only specified roles are permitted to perform defined tasks. Auditing of security relevant events to provide suitable accountability. Self-test of the core cryptographic functions and algorithms of the TOE. Tamper protection to ensure that the TOE is adequately protected from unauthorised physical access.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf
- type: Web based frontend to the Microsoft Certification Authority (CA) services
- expiration_date: 04.01.2018
- level: EAL4+ AVA_VAN.5
- product: Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/98
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
f0acae5742fb48a1, 44cdd911811b36d2 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_fw_tf_br_v1.1.pdf |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid10375-vr.pdf |
cr-ISCB-5-RPT-C037-v1a.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-10375-2012
- cert_item: Check Point VSX
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-5-RPT-C037-CR-v1a: 30
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 2
- EAL4: 4
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 1
- FCS_COP: 3
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACF: 7
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_SOS.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_PHP.2: 1
- FPT_PHP.3: 1
- FPT_RCV.1: 1
- FPT_STM.1: 1
- FPT_TST.1: 1
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.LOCATE: 1
- A.NOEVIL: 1
- A.SINGEN: 1
- T:
- T.ACCESS: 1
- T.ASPOOF: 1
- T.AUDFUL: 1
- T.AUMACC: 1
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.FAULT: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MEDIAT: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NACCESS: 1
- T.NMODIFY: 1
- T.NOAUTH: 1
- T.NOHALT: 1
- T.OLDINF: 1
- T.PRIVIL: 1
- T.PROCOM: 1
- T.REPEAT: 1
- T.REPLAY: 1
- T.SELPRO: 1
- T.TUSAGE: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 140-2: 2
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
- PKCS:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: NIAP CCEVS
- /CreationDate: D:20120803130512
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120803130512
- /Producer: Microsoft® Office Word 2007
- /Title: VID 10375 VR
- pdf_file_size_bytes: 463322
- pdf_hyperlinks: http://www.niap-ccevs.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /Author: ISCB Department
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20130109091227+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: AEP Networks
- /Document Type: REPORT
- /Identifier: ISCB-5-RPT-C037-CR-v1a
- /Index: MyCB_TMP_011
- /Keywords: Keyper
- /ModDate: D:20130109091238+08'00'
- /Phase: Release
- /Producer: Adobe PDF Library 10.0
- /Project Code: C037
- /Released: 4 January 2013
- /ST Title: Security Target for the Keyper Hardware Security Module (HSM) v2.0
- /ST Version: v1.3
- /SourceModified: D:20130109011207
- /Sponsor: AEP Networks
- /Subject: Keyper Hardware Security Module (HSM) v2.0
- /TOE Name: Keyper Hardware Security Module (HSM) v2.0
- /TOE Version: version 2.0
- /Title: C037 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 442113
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
| pdf_data/st_filename |
st_vid10375-st.pdf |
st-AEP_Keyper_EAL4_ASE_1_3.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 4: 4
- EAL4: 9
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 7
- ADV_IMP.1: 5
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 4
- ALC_FLR.2: 1
- ALC_FLR.3: 9
- ALC_LCD.1: 4
- ALC_TAT.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 4
- ATE_DPT.1: 4
- ATE_FUN.1: 8
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 3
- ASE_CCL.1: 1
- ASE_ECD: 3
- ASE_ECD.1: 1
- ASE_INT: 3
- ASE_INT.1: 1
- ASE_OBJ: 3
- ASE_OBJ.2: 1
- ASE_REQ: 8
- ASE_REQ.2: 1
- ASE_SPD: 3
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 28
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 13
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 4
- FAU_STG.2: 17
- FAU_STG.2.1: 1
- FAU_STG.2.2: 2
- FAU_STG.2.3: 1
- FAU_STG.3: 9
- FAU_STG.3.1: 1
- FAU_STG.4: 16
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 29
- FCS_CKM.1.1: 2
- FCS_CKM.2: 26
- FCS_CKM.2.1: 2
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP.1: 68
- FCS_COP.1.1: 7
- FDP:
- FDP_ACC.1: 4
- FDP_ETC.2: 9
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 30
- FDP_IFC.1.1: 4
- FDP_IFC.2: 10
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 40
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 5
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 5
- FDP_ITC: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 17
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 2
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FDP_UCT.1: 10
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 5
- FIA_ATD.1: 18
- FIA_ATD.1.1: 1
- FIA_SOS.1: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 16
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FIA_USB.1: 29
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF.1: 23
- FMT_MOF.1.1: 1
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 21
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 2
- FMT_MTD.1: 18
- FMT_MTD.1.1: 1
- FMT_REV.1: 13
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 2
- FPT_RVM: 1
- FPT_SEP: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 2
- FPT_TDC.1: 11
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRC.1: 10
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT.2: 9
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 14
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM.1: 24
- FCS_CKM.1.1: 1
- FCS_CKM.2: 20
- FCS_CKM.2.1: 1
- FCS_CKM.4: 24
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 4
- FCS_RND: 2
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FCS_RND.1.2: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 6
- FDP_ACF: 22
- FDP_ACF.1: 4
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 17
- FDP_IFC.1: 6
- FDP_IFF: 21
- FDP_IFF.1: 3
- FDP_IFF.3: 2
- FDP_IFF.4: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.3: 3
- FMT_MTD: 20
- FMT_MTD.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITC: 1
- FPT_ITC.1: 7
- FPT_ITC.1.1: 1
- FPT_ITI.1: 9
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_PHP.1: 1
- FPT_PHP.2: 13
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RCV.1: 8
- FPT_RCV.1.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST.1: 21
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.LOCATE: 3
- A.NOEVIL: 3
- A.PHYSEC: 1
- A.SINGEN: 5
- D:
- D.INFO: 11
- D.PACKET: 8
- D.PACKETS: 1
- D.TSF: 3
- O:
- O.ACCESS: 4
- O.ACCOUN: 6
- O.AUDITS: 3
- O.AUDREC: 10
- O.CMA: 5
- O.CREDEN: 1
- O.EADMIN: 4
- O.ENCRYP: 7
- O.EXPORT: 2
- O.FAULT: 7
- O.GENPUR: 1
- O.GUIDANCE: 1
- O.IDANLZ: 10
- O.IDAUTH: 19
- O.IDSCAN: 1
- O.IDSENS: 7
- O.INTEGR: 7
- O.LIMEXT: 7
- O.MAC: 13
- O.MEDIAT: 10
- O.OFLOWS: 9
- O.PROTCT: 10
- O.RESPON: 7
- O.SECFUN: 13
- O.SECSTA: 7
- O.SELPRO: 8
- O.SINUSE: 6
- O.VPN: 7
- OE:
- OE.AUDIT_PROTECTION: 1
- OE.AUDIT_SORT: 1
- OE.CREDEN: 1
- OE.IDAUTH: 12
- OE.INSTAL: 2
- OE.PERSON: 2
- OE.PHYCAL: 2
- OE.SINGEN: 7
- OE.TIME: 1
- OE.VLAN: 8
- OE.VPN: 7
- T:
- T.ACCESS: 5
- T.ASPOOF: 1
- T.AUDFUL: 1
- T.AUMACC: 1
- T.COMDIS: 1
- T.COMINT: 3
- T.FACCNT: 1
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 1
- T.FAULT: 2
- T.IMPCON: 1
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MEDIAT: 4
- T.MISACT: 1
- T.MISUSE: 1
- T.NACCESS: 2
- T.NMODIFY: 3
- T.NOAUTH: 5
- T.NOHALT: 1
- T.OLDINF: 1
- T.PRIVIL: 3
- T.PROCOM: 3
- T.REPEAT: 1
- T.REPLAY: 3
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
- T.SELPRO: 3
- T.TUSAGE: 3
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 32
- TLS v1.0: 1
- TLSv1.0: 10
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 3
- physical tampering: 7
- SCA:
- Side-channel: 5
- Side-channels: 2
- side channel: 1
- side-channel: 3
- side-channels: 4
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 7
- FIPS 180-2: 1
- FIPS 180-3: 1
- FIPS 197: 2
- FIPS PUB 140-2: 9
- FIPS PUB 180-2: 1
- FIPS PUB 197: 3
- FIPS PUB 198: 3
- FIPS PUB 46-3: 4
- FIPS140: 1
- FIPS197: 1
- FIPS198: 1
- FIPS46-3: 1
- NIST:
- NIST SP 800-67: 2
- NIST SP 800-90: 3
- SP 800-67: 2
- SP 800-90: 4
- PKCS:
- PKCS #1: 1
- PKCS#1: 3
- PKCS#12: 1
- RFC:
- RFC 0854: 1
- RFC 0959: 1
- RFC 1305: 1
- RFC 1334: 1
- RFC 1777: 2
- RFC 1778: 1
- RFC 1994: 1
- RFC 2104: 3
- RFC 2246: 3
- RFC 2284: 1
- RFC 2401: 1
- RFC 2404: 3
- RFC 2406: 4
- RFC 2409: 5
- RFC 2560: 1
- RFC 2616: 1
- RFC 2631: 3
- RFC 2661: 1
- RFC 2716: 1
- RFC 2821: 1
- RFC 2865: 1
- RFC 3193: 1
- RFC 3526: 4
- RFC 3947: 1
- RFC 3948: 1
- RFC 5114: 4
- RFC 792: 1
- RFC0854: 1
- RFC0959: 1
- RFC1305: 2
- RFC1334: 2
- RFC1777: 4
- RFC1778: 1
- RFC1994: 1
- RFC2104: 1
- RFC2246: 3
- RFC2284: 1
- RFC2401: 2
- RFC2404: 1
- RFC2406: 1
- RFC2409: 2
- RFC2560: 4
- RFC2616: 4
- RFC2631: 1
- RFC2661: 2
- RFC2716: 2
- RFC2821: 1
- RFC2865: 1
- RFC3193: 2
- RFC3526: 1
- RFC3947: 2
- RFC3948: 2
- RFC5114: 1
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS PUB 140-2: 2
- FIPS PUB 186-2: 5
- NIST:
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Nir Naaman
- /CreationDate: D:20120730183937+03'00'
- /Creator: Microsoft® Word 2010
- /Keywords: traffic filter, firewall, VPN, IPSec, SSL VPN, IDS/IPS, intrusion detection, virtualization, security management
- /ModDate: D:20120731134931-04'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: Check Point VSX
- pdf_file_size_bytes: 2616705
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 175
|
- /Author: Doug Stuart
- /Category: ASE
- /Company: stratsec
- /CreationDate: D:20121218144137+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /DEV_Fullname: AEP Networks
- /DEV_Shortname: AEP
- /DEV_Sponsor: David Miller
- /DOC_Classification: COMMERCIAL-IN-CONFIDENCE
- /DOC_Id: KPR_EAL4_ASE
- /DOC_Phase: DRAFT
- /DOC_Released: 13-DEC-2012
- /DOC_Title: Keyper HSM EAL4 Security Target
- /DOC_Version: 1.3
- /EVAL_CC: 3.1 (Rev 3)
- /EVAL_EAL: EAL4
- /ModDate: D:20121218144151+08'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20121213065300
- /Subject: Security Target
- /TOE_Fullname: Keyper Hardware Security Module Version 2.0
- /TOE_Shortname: Keyper HSM
- /TOE_Version: 2.0
- /Title: Keyper Hardware Security Module (HSM) v2.0
- pdf_file_size_bytes: 737530
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 77
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |