Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Eaglehawk SBX Enigma Version: 4.2.4
Certificate Number: 2009/52
Hitachi Command Suite Common Component Version: 7.0.1-00
JISEC-CC-CRP-C0303
name Eaglehawk SBX Enigma Version: 4.2.4 Hitachi Command Suite Common Component Version: 7.0.1-00
category Data Protection Access Control Devices and Systems
scheme AU JP
not_valid_after 13.07.2017 01.09.2016
not_valid_before 30.04.2009 15.08.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Eaglehawk_sbx_enigma_CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Eaglehawk_Security_Target_v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf
manufacturer Eaglehawk Limited Hitachi, Ltd.
manufacturer_web https://www.eaglehawk.com/ https://www.hitachi.com/
dgst 63b8349ac58ccde9 3d4662c844b7ac14
heuristics/cert_id Certificate Number: 2009/52 JISEC-CC-CRP-C0303
heuristics/extracted_versions 4.2.4 7.0.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0303
  • certification_date: 01.08.2011
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Hitachi Command Suite Common Component
    • product_type: Foundational Module Software
    • report_link: https://www.ipa.go.jp/en/security/c0303_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0303_est.pdf
    • toe_version: 7.0.1-00
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.09.2016
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
  • toe_japan_name: Hitachi Command Suite Common Component 7.0.1-00
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename Eaglehawk_sbx_enigma_CR.pdf c0303_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2009/52: 1
  • JP:
    • CRP-C0303-01: 1
    • Certification No. C0303: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2+: 5
    • EAL2: 3
    • EAL2+: 2
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 1
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
    • A.VERSION: 1
  • T:
    • T.ILLEGAL_ACCESS: 2
    • T.UNAUTHORISED_ACCESS: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Microsoft:
    • Microsoft: 6
pdf_data/report_keywords/pq_crypto
  • Falcon:
    • Falcon: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • SSH:
    • SSH: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /AISEF: stratsec
  • /Author: Terence.Caulfield
  • /Category: Report
  • /Cert_Level: EAL 2+
  • /Company: Australasian Information Security Evaluation Program
  • /CreationDate: D:20090430145419+10'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /Developer: Eaglehawk Limited
  • /IssueDate: 9 Apr 2009 - IssueDate
  • /ModDate: D:20090430145430+10'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Product: Eaglehawk SBX Enigma Version 4.2.4
  • /SourceModified: D:20090430044623
  • /Subject: Certificate Number: 2009/52
  • /Title: Certification Report
  • /docVersion: 0.2
  • pdf_file_size_bytes: 160709
  • pdf_hyperlinks: http://www.dsd.gov.au/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110928100804+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110928100931+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 345195
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename Eaglehawk_Security_Target_v1.5.pdf c0303_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2+: 3
    • EAL2+: 6
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_AFC.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 20
    • FMT_MSA.1: 9
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 4
    • FMT_MTD.1: 7
    • FMT_REV: 15
    • FMT_REV.1: 7
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.2: 8
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 4
  • FTA:
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
    • FTA_TSE.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.EDUCATED_: 1
    • A.EDUCATED_MANAGEMENT: 1
    • A.NETWORK_: 1
    • A.NETWORK_SECURITY: 2
    • A.NO_EVIL: 2
    • A.NO_GENERAL_: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.OS_VALIDATED: 1
    • A.OS_VALIDATION: 1
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_CONTROL: 9
    • O.AUDIT_GENERATION: 8
    • O.CRYPTOGRAPHY: 5
    • O.CRYPTOGRATHY: 2
    • O.ROLE-: 2
    • O.ROLE-BASED_MANAGEMENT: 2
    • O.ROLE-BASE_: 1
    • O.ROLE-BASE_MANAGEMENT: 4
  • OE:
    • OE.CRYPTO_KEY_: 1
    • OE.CRYPTO_KEY_MANAGEMENT: 2
    • OE.MANAGEMANT_EDUCATION: 1
    • OE.MANAGEMENT_EDUCATION: 4
    • OE.MANAGMENT_: 1
    • OE.NO_EVIL: 3
    • OE.NO_GENERAL_: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.OS_: 1
    • OE.OS_VALIDATE: 1
    • OE.OS_VALIDATION: 1
    • OE.PHYSICAL: 3
    • OE.ROLE-: 1
    • OE.ROLE-BASE_MANAGEMENT: 1
    • OE.SECURE_NETWORK: 3
  • T:
    • T.ACCIDENTAL_ADMIN: 3
    • T.AUDIT_: 1
    • T.AUDIT_COMPROMISE: 1
    • T.BYPASS: 3
    • T.DATA_COMPROMISE: 2
    • T.MASQUERADE: 3
  • A:
    • A.ADMINISTRATORS: 3
    • A.ADMINISTROTORS: 1
    • A.CLIENTS: 4
    • A.NETWORKS: 3
    • A.PASSWORD: 3
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 3
    • A.VERSION: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • OE:
    • OE.BANNER: 4
    • OE.PASSWORD: 4
    • OE.SECURE_CHANNEL: 4
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • E2:
      • E2: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2007-09-003: 1
  • FIPS:
    • FIPS197: 2
pdf_data/st_metadata
  • /Author: William Tice
  • /CreationDate: D:20090429184951-04'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20090429184951-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - Eaglehawk_Security_Target_v1.5.doc
  • pdf_file_size_bytes: 617018
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
  • /Author: Hitachi, Ltd. Software Division
  • /CreationDate: D:20110926112144
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110926112144
  • /Producer: Microsoft® Office Word 2007
  • /Subject: HSCC-ST
  • /Title: Hitachi Command Suite Common Component ST
  • pdf_file_size_bytes: 455862
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different