Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Scalable Optical Transport Solution FSP 3000R7 Operating System (CC), Version R7 Rel.17.2.4
IC3S/KOL01/ADVA/EAL2/0520/0021
Hitachi Adaptable Modular Storage 2300 Microprogram Version:0862/ A-M
JISEC-CC-CRP-C0220
name Scalable Optical Transport Solution FSP 3000R7 Operating System (CC), Version R7 Rel.17.2.4 Hitachi Adaptable Modular Storage 2300 Microprogram Version:0862/ A-M
category Network and Network-Related Devices and Systems Access Control Devices and Systems
scheme IN JP
status active archived
not_valid_after 05.01.2026 11.01.2013
not_valid_before 06.01.2021 29.06.2009
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC%20Certificate%20ADVA%20FSP%203000R7%20Rel%2017.2.4.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-ADVA-FSP3000R7_%20Rel%2017%202%204%20EAL2%20version%201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0220_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FSP_3000_R7_Security_Target-2.0%20(17.2.4)_20200421.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0220_est.pdf
manufacturer ADVA OPTICAL NETWORKING SE, Fraunhoferstr.9a 82152 Martinsried, Munich, Germany Hitachi, Ltd.
manufacturer_web https://www.adva.com https://www.hitachi.com/
dgst 64011f7b79ad2a6f 2664475a930e5e47
heuristics/cert_id IC3S/KOL01/ADVA/EAL2/0520/0021 JISEC-CC-CRP-C0220
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions 17.2.4 0862, 2300
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0220
  • certification_date: 01.06.2009
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0220_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a control program (software) that runs on a disk array subsystem manufactured by Hitachi, Ltd.: 滴itachi Adaptable Modular Storage 2300・ The TOE controls data transfer between the disk array subsystem and the host (server) connected to the disk array subsystem and manages the data stored in the subsystem. The TOE provides a function to permit the management operation of the disk array subsystem only for the account of the authorized administrator and a function to record events of the management operation in logs as the security functions. TOE security functions The TOE has the following security functions. (1) Account Authentication function - Identification/Authentication When the administrator performs the setting operations of the disk array subsystem, this function performs the account identification/authentication of the administrator. - Execution control by roles If the role given to the account permits the setting operation, it is executed. If it is not permitted, the setting operation is not executed. - Time-out function If the operation is not performed for a certain period of time, the session of the account is disabled, and it is timed out. - Account management This function manages the user ID, password, account enabled/disabled attribute, and role assignment response per account as the account information. (2) Audit Logging function - Audit log acquisition When an audit event related to the security function in the TOE such as login success/failure of the account of the administrator occurs, this function acquires the event as an audit log. Furthermore, it performs enabled/disabled setting of the audit log acquisition. - Audit log erasing This function erases the audit logs (batch erasing of all audit logs acquired in the past). (3) Setting function This function enables or disables the Account Authentication function and the Audit Logging function.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Hitachi Adaptable Modular Storage 2300 Microprogram
    • product_type: IT Product (Disk Array Control Software)
    • report_link: https://www.ipa.go.jp/en/security/c0220_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0220_est.pdf
    • toe_version: 0862/ A-M
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.03.2013
  • revalidations: [frozendict({'date': '2010-09', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0220_it8210_01.html'})]
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0220_it8210.html
  • toe_japan_name: Hitachi Adaptable Modular Storage 2300 Microprogram 0862/ A-M
  • toe_overseas_link: None
  • toe_overseas_name: Hitachi Adaptable Modular Storage Microprogram 0862/A
maintenance_updates
pdf_data/report_filename CR-ADVA-FSP3000R7_ Rel 17 2 4 EAL2 version 1.0.pdf c0220_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • IN:
    • IC3S/KOL01/ADVA/EAL2/0520/0021: 2
    • IC3S/KOL01/ADVA/EAL2/0520/0021 /CR: 1
    • IC3S/KOL01/ADVA/EAL2/0520/0021/CR: 13
  • JP:
    • CRP-C0220-01: 1
    • Certification No. C0220: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 3
    • EAL2: 5
  • EAL:
    • EAL2: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
  • AGD:
    • AGD_OPE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
pdf_data/report_keywords/eval_facility
  • ERTL:
    • Common Criteria Test Laboratory, ERTL: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408: 6
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /Author: Tapas Bandopadhyay
  • /CreationDate: D:20201113120808+05'30'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20201113120808+05'30'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1049999
  • pdf_hyperlinks: http://www.commoncriteria-india.gov.in/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /CreationDate: D:20090826102507+09'00'
  • /ModDate: D:20090826102507+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 195461
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename FSP_3000_R7_Security_Target-2.0 (17.2.4)_20200421.pdf c0220_est.pdf
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 1
    • AGD_USR.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 4
    • FCS_SSH_EXT: 1
    • FCS_SSH_EXT.1: 14
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 18
    • FCS_TLS_EXT.1.1: 2
  • FIA:
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 14
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU.1: 3
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
  • FMT:
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 4
    • FMT_SMR.2: 10
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 1
    • FPT_APW_EXT.1: 14
    • FPT_APW_EXT.1.1: 2
    • FPT_APW_EXT.1.2: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 13
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 8
    • FTA_SSL.4.1: 1
    • FTA_TAB.1: 10
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_TRP.1: 14
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 13
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_MTD.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 12
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 13
    • FIA_USB: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_RVM: 1
    • FMT_RVM.1: 1
    • FMT_SEP: 1
    • FMT_SEP.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_STM: 1
    • FMT_STM.1: 1
    • FMT_USB.1: 1
  • FPT:
    • FPT_RVM.1: 20
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 19
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
    • FTA_TSE: 1
    • FTA_TSE.1: 9
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECU: 1
    • A.ADMIN_CREDENTIALS_SECURE: 2
    • A.LIMITED_FUNCTIONALITY: 2
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_THRU_TRAFFIC_PROTE: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 2
    • A.PHYSICAL: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_ADMINISTRATOR: 2
  • O:
    • O.DISPLAY_BANNER: 7
    • O.PROTECTED_COMMUNIC: 1
    • O.PROTECTED_COMMUNICATIONS: 2
    • O.SESSION_LOCK: 7
    • O.SYSTEM_MONITORING: 6
    • O.TOE_ADMINISTRATION: 10
    • O.TSF_SELF_TEST: 3
  • OE:
    • OE.ADMIN_CREDENTIALS_S: 1
    • OE.ADMIN_CREDENTIALS_SECURE: 3
    • OE.NO_GENERAL_PURPOS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PR: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 3
    • OE.PHYSICAL: 2
    • OE.TRUSTED_ADMIN: 4
  • T:
    • T.PASSWORD_CRACKING: 3
    • T.SECURITY_FUNCTIONALIT: 2
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
    • T.SECURITY_FUNCTIONALITY_FAILURE: 2
    • T.UNAUTHORIZED_ADMINIS: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 2
    • T.UNDETECTED_ACTIVITY: 3
    • T.UNTRUSTED_COMMUNICA: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.WEAK_AUTHENTICATION_: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 2
  • A:
    • A.SSL: 3
  • OE:
    • OE.SSL: 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
    • tuvit: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 10
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
  • FF:
    • DH:
      • DH: 3
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 3
      • SHA-384: 1
      • SHA-512: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 45
  • TLS:
    • TLS:
      • TLS: 24
      • TLS 1.0: 2
      • TLS 1.1: 2
      • TLS 1.2: 2
      • TLSv1.2: 32
  • TLS:
    • SSL:
      • SSL: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 180-4: 3
    • FIPS PUB 186-4: 9
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2104: 1
    • RFC 2246: 2
    • RFC 2818: 2
    • RFC 3268: 4
    • RFC 4253: 4
    • RFC 4346: 2
    • RFC 4419: 2
    • RFC 4492: 4
    • RFC 5246: 15
    • RFC 5288: 8
    • RFC 5289: 8
    • RFC 5656: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • ISO:
    • ISO/IEC15408: 6
pdf_data/st_metadata
  • /Author: BerndK
  • /CreationDate: D:20200421095026+02'00'
  • /ModDate: D:20201223105146+05'30'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - FSP_3000_R7_Security_Target-2.0 (17.2.4)_20200421.docx
  • pdf_file_size_bytes: 1136128
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /Author: m-ohara
  • /Company: (株)日立製作所
  • /CreationDate: D:20090825211947+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /ModDate: D:20090825212100+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20090825075858
  • /Title: DF800 Securyty Target
  • pdf_file_size_bytes: 649098
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different