name |
HiRDB / Single Server Version 7 07-03 |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
category |
Databases |
Detection Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.11.2014 |
not_valid_before |
22.11.2006 |
01.10.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0065_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf |
manufacturer |
Hitachi, Ltd. |
Tenable Network Security, Inc. |
manufacturer_web |
https://www.hitachi.com/ |
https://www.tenable.com/ |
security_level |
EAL1 |
EAL2+, ALC_FLR.2 |
dgst |
6b0ce7e3167a63fb |
7a9d9dd29e76bfba |
heuristics/cert_id |
JISEC-CC-CRP-C0065 |
CCEVS-VR-VID-10443-2012 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2022-33757, CVE-2021-45960, CVE-2016-1000028, CVE-2018-1148, CVE-2021-20106, CVE-2022-32973, CVE-2022-22826, CVE-2018-20843, CVE-2018-1147, CVE-2018-1141, CVE-2022-22822, CVE-2022-3499, CVE-2024-0955, CVE-2022-32974, CVE-2019-1559, CVE-2016-1000029, CVE-2022-0778, CVE-2016-4055, CVE-2020-5765, CVE-2022-22825, CVE-2019-3923, CVE-2022-22823, CVE-2021-3449, CVE-2019-3962, CVE-2021-46143, CVE-2021-20079, CVE-2021-20135, CVE-2021-3450, CVE-2018-5407, CVE-2019-3982, CVE-2017-5179, CVE-2024-0971, CVE-2023-3253, CVE-2020-5774, CVE-2023-3252, CVE-2022-28291, CVE-2023-6178, CVE-2022-22824, CVE-2023-3251, CVE-2022-22827, CVE-2023-6062, CVE-2022-4313, CVE-2022-23990, CVE-2016-9260, CVE-2022-23852, CVE-2017-18214, CVE-2019-3961 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions |
7, 07, 03 |
4.4, 5.0.1, 2.0.1, 3.6, 2.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0098
- certification_date:
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE(HiRDB / Single Server Version 8) is a software product for Relational Database Management System(RDBMS). The TOE acts as a database server and provides access to the information stored in the database. Users generally access to the information stored in the database by requests for SQL execution at HiRDB server from HiRDB clients. The TOE provides functions that work for various and efficient data manipulation to meet the needs of users. And it also provides security functions that restrict access to user data to authorized users. Security functions of the TOE include the following. - Audit - Discretionary Access Control - Identification and Authentication - Security Management
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: HiRDB / Single Server Version 8
- product_type: IT Product (Data Base Management System)
- toe_version: 08-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0098_it7133.html
- toe_japan_name: HiRDB / Single Server Version 8 08-01
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Enterprise Security Management
- certification_date: 01.10.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10443
- product: Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1. Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10443
- vendor: Tenable, Inc
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
44cdd911811b36d2 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0065_ecvr.pdf |
st_vid10443-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10443-2012
- cert_item: Tenable SecurityCenter 4 and Components
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0065: 1
|
- US:
- CCEVS-VR-VID10443-2012: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 4
- EAL 2 augmented: 3
- EAL 4: 1
- EAL2: 1
- EAL2+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.OS: 1
- A.PROTCT: 1
- A.WKSTN: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061122204438+09'00'
- /ModDate: D:20061122204438+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 20053
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Evaluation Team
- /CreationDate: D:20121024103543
- /Creator: Microsoft® Office Word 2007
- /Keywords: VR
- /ModDate: D:20121024103543
- /Producer: Microsoft® Office Word 2007
- /Subject: Validator Report
- /Title: Validation Report for IronPort Messaging Gateway
- pdf_file_size_bytes: 441073
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
|
st_vid10443-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 9
- EAL2 augmented: 4
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 22
- ADV_FSP.2: 12
- ADV_TDS.1: 12
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.2: 8
- ALC_CMS.2: 8
- ALC_DEL.1: 6
- ALC_FLR.2: 22
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 9
- ATE_IND.2: 8
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 6
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_SEL: 2
- FAU_SEL.1: 5
- FAU_SEL.1.1: 1
- FAU_STG: 4
- FAU_STG.2: 9
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 2
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID: 2
- FIA_UID.1: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MDT.1: 1
- FMT_MOF: 2
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MTD: 2
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 2
- FPT_ITC.1: 2
- FPT_ITI.1: 2
- FPT_ITT: 2
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS: 3
- A.ASCOPE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.NOTRST: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 12
- O.AUDITS: 5
- O.EADMIN: 5
- O.EXPORT: 3
- O.IDANLZ: 5
- O.IDAUTH: 20
- O.IDSCAN: 7
- O.IDSENS: 7
- O.INTEGR: 7
- O.OFLOWS: 6
- O.PROTCT: 11
- O.RESPON: 5
- OE:
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_SORT: 2
- OE.CREDEN: 6
- OE.INSTAL: 7
- OE.INTROP: 5
- OE.PERSON: 5
- OE.PHYCAL: 6
- OE.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.FACCNT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 3
- T.IMPCON: 3
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MISACT: 3
- T.MISUSE: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.SCNCFG: 3
- T.SCNMLC: 3
- T.SCNVUL: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |