Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Trend Micro TippingPoint Security Management System (SMS) v6.2.0
ISCB-5-RPT-C133-CR-v1
Gigamon GigaVUE Version 5.9.00
CCEVS-VR-VID-11129-2021
name Trend Micro TippingPoint Security Management System (SMS) v6.2.0 Gigamon GigaVUE Version 5.9.00
scheme MY US
status active archived
not_valid_after 03.05.2029 25.02.2023
not_valid_before 03.05.2024 25.02.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C133-CERTIFICATE-V1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11129-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C133-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11129-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trend%20Micro%20SMS%206.2.0%20ST-v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11129-st.pdf
manufacturer Trend Micro Incorporated. Gigamon, Inc
manufacturer_web https://www.trendmicro.com https://www.gigamon.com
security_level EAL2 {}
dgst 633dc7480c953157 e7ac47e224fdfe97
heuristics/cert_id ISCB-5-RPT-C133-CR-v1 CCEVS-VR-VID-11129-2021
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:a:gigamon:gigavue:5.9:*:*:*:*:*:*:*, cpe:2.3:a:gigamon:gigavue:5.9.00.04:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2020-12252, CVE-2020-12251
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1
heuristics/extracted_versions 6.2.0 5.9.00
heuristics/scheme_data
  • cert_no: 2024-003-C133
  • certification_date: 03.05.2024
  • developer: Trend Micro Incorporated.
  • enhanced:
    • assurance_level: EAL2
    • category: Network and Network-Related Devices and Systems
    • cert_id: C133
    • certification_date: 03.05.2024
    • developer: 11305 Alterra ParkwayAustin, TX 78758Phone: +1 (817) 569-8900Toll-free: (888) 762-8736https://www.trendmicro.com/en_za/contact.html
    • expiration_date: 03.05.2029
    • mutual_recognition: CCRA
    • product: Trend Micro TippingPoint Security Management System (SMS) v6.2.0
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/ISCB-5-RPT-C133-CR-v1.pdf
    • scope: The TOE provides centralized control for managing large-scale deployments of the following TippingPoint products: TippingPoint NX Series Next-Generation Intrusion Prevention System (IPS)—uses a combination of technologies, including deep packet inspection, threat reputation, and advanced malware analysis, on a flow-by-flow basis to detect and prevent attacks on the network. TippingPoint Threat Protection System (TPS)—a network security platform that offers comprehensive threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks. The TOE also provides capabilities for communicating threat data with TippingPoint Deep Discovery (DD) devices. TippingPoint DD is a threat protection platform providing capabilities to detect, analyze and respond to network-based attacks.
    • status: Valid
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C133/Trend_Micro_SMS_6.2.0_ST-v1.0.pdf
    • type: Network and Network-Related Devices and Systems
  • expiration_date: 03.05.2029
  • level: EAL2
  • product: Trend Micro TippingPoint Security Management System (SMS) v6.2.0
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/171
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11129/
  • categories: ['Network Device']
  • category: Network Device
  • certification_date: 25.02.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 25.02.2023
  • id: CCEVS-VR-VID11129
  • product: Gigamon GigaVUE Version 5.9.00
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11129
  • vendor: Gigamon Inc
heuristics/protection_profiles {} 89f2a255423f4a20
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf
pdf_data/cert_filename ISCB-5-CERT-C133-CERTIFICATE-V1.pdf st_vid11129-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11129-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/cert_metadata
  • /CreationDate: D:20240506114507+08'00'
  • /Creator: TOSHIBA e-STUDIO3525AC
  • /ModDate: D:20240510121415+08'00'
  • /Producer: SECnvtToPDF V1.0
  • pdf_file_size_bytes: 815976
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20210226121301-05'00'
  • /ModDate: D:20210226121301-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180788
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-5-RPT-C133-CR-v1.pdf st_vid11129-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID11129-2021
    • cert_item: Gigamon GigaVUE Version 5.9.00
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C133-CR-V1: 33
    • ISCB-5-RPT-C133-CR-v1: 2
  • US:
    • CCEVS-VR-VID11129-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.1.1: 1
    • FAU_SAR.1: 1
    • FAU_SAR.3: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.5: 1
    • FIA_UAU.7: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 3
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_SSL.1: 1
    • FTA_TAB.1: 1
  • FTP:
    • FTP_ITC.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_COP: 3
    • FCS_RBG_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.MANAGE: 1
    • A.PROTECT: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 2
  • NXP:
    • NXP: 1
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 3
  • SSH:
    • SSH: 21
    • SSHv1: 2
    • SSHv2: 2
  • TLS:
    • TLS:
      • TLS: 11
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RBG: 1
    • RNG: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • Timing Attack: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2017-004-001: 1
    • CCMB-2017-004-002: 1
    • CCMB-2017-004-003: 1
    • CCMB-2017-004-004: 1
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /CreationDate: D:20240510051519Z00'00'
  • /Creator: Word
  • /ModDate: D:20240510051519Z00'00'
  • /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
  • /Title: ISCB-5-RPT-C133-CR-v1
  • pdf_file_size_bytes: 1537825
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /CreationDate: D:20220119151105-05'00'
  • /ModDate: D:20220119151105-05'00'
  • pdf_file_size_bytes: 915939
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
pdf_data/st_filename Trend Micro SMS 6.2.0 ST-v1.0.pdf st_vid11129-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 11
    • ADV_FSP.2: 12
    • ADV_TDS.1: 12
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.2: 9
    • ALC_CMS.2: 7
    • ALC_DEL.1: 6
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 11
    • ASE_INT.1: 13
    • ASE_OBJ.2: 11
    • ASE_REQ.2: 14
    • ASE_SPD.1: 8
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_SPD: 2
    • ASE_SPD.1: 7
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR: 6
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 2
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 8
    • FIA_UAU.1: 4
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 3
    • FMT_MTD.1: 17
    • FMT_MTD.1.1: 6
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 2
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_STM: 3
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_MCS: 2
    • FTA_MCS.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_SSL: 6
    • FTA_SSL.1: 6
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
    • FTA_TAH: 2
    • FTA_TAH.1: 6
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 2
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 3
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 6
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 3
    • FCS_CKM.4.1: 1
    • FCS_COP: 23
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 2
    • FCS_SSHC_EXT.1: 5
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHC_EXT.1.9: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 5
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT: 2
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSS_EXT.1: 6
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 4
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 3
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 5
    • FMT_MOF.1: 1
    • FMT_MTD: 11
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.2: 3
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 3
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 4
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 4
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 3
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 3
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 5
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.MANAGE: 2
    • A.PROTECT: 3
  • O:
    • O.AUDIT: 6
    • O.AUDIT_REVIEW: 3
    • O.I_AND_A: 8
    • O.LOGIN_BANNER: 3
    • O.LOGIN_HISTORY: 5
    • O.PASSWORD_CONTROLS: 3
    • O.PROTECTED: 1
    • O.PROTECTED_COMMS: 4
    • O.SECURITY_MANAGEMENT: 3
    • O.SESSION_LIMITS: 5
    • O.SESSION_SECURITY: 3
    • O.STORAGE: 5
    • O.THROTTLE: 3
  • OE:
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.BRUTE_FORCE: 3
    • T.INAPPRORIATE_USE: 2
    • T.INTEGRITY_COMPROMISE: 3
    • T.NETWORK_COMPROMISE: 2
    • T.NO_ACCOUNTABILITY: 3
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACTIVITY: 3
  • A:
    • A.ADMIN_CREDENTIALS_: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_: 2
    • T.UNAUTHORIZED_ADMINISTRATOR_: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 1
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
    • E2:
      • E2: 1
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 8
      • SHA-384: 5
      • SHA-512: 8
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 13
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 11
  • TLS:
    • TLS:
      • TLS: 12
      • TLS 1.2: 1
      • TLS v1.0: 2
      • TLS v1.1: 2
      • TLS v1.2: 3
  • SSH:
    • SSH: 65
    • SSHv2: 14
  • TLS:
    • DTLS:
      • DTLS: 1
    • SSL:
      • SSL: 2
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 45
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 3
      • TLS v1.2: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 2
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • GCM:
    • GCM: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-256: 6
    • P-384: 8
    • P-521: 8
    • curve P-256: 1
    • secp256r1: 4
    • secp384r1: 4
    • secp521r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-004-001: 1
    • CCMB-2017-004-002: 1
    • CCMB-2017-004-003: 1
    • CCMB-2017-004-004: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 10116:2017: 1
    • ISO/IEC 14888-3: 2
    • ISO/IEC 18031:2011: 5
    • ISO/IEC 19772:2009: 1
  • NIST:
    • NIST SP 800-56A: 5
  • RFC:
    • RFC 2818: 2
    • RFC 2986: 2
    • RFC 3526: 4
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4492: 6
    • RFC 5077: 1
    • RFC 5246: 2
    • RFC 5280: 4
    • RFC 5289: 12
    • RFC 6125: 2
    • RFC 7919: 1
  • X509:
    • X.509: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Console 12 1G/10G Ports (QSFP) 4 10/100/1000M Ports Configurable Ports (provided functionality out of scope as stated in Section 2.3.3) Provided by Port Modules Provided by TAP modules, Bypass Combo modules: 1
    • QSFP) 4 10/100/1000M Ports Configurable Ports (provided functionality out of scope as stated in Section 2.3.3: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Apted, Tony J. [RA]
  • /CreationDate: D:20240403093836+08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240403093836+08'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Third Party Protected Information
  • /Title: Trend Micro SMS
  • pdf_file_size_bytes: 852877
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 45
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different