Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31
JISEC-CC-CRP-C0593
Crunchy Certified PostgreSQL 12.5
516-LSS
name Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31 Crunchy Certified PostgreSQL 12.5
category Multi-Function Devices Databases
scheme JP CA
status archived active
not_valid_after 29.03.2023 16.03.2026
not_valid_before 29.03.2018 16.03.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/516-LSS%20CT%20no%20sig%20Eng.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/516%20LSS%20CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target%20-%20Crunchy%20Certified%20PostgreSQL%2012%20-%20v1.8%20-%20515-LSS.pdf
manufacturer Dell, Inc. Crunchy Data Solutions Inc.
manufacturer_web https://www.dell.com https://crunchydata.com/
security_level EAL2 EAL2+, ALC_FLR.2
dgst 6b431a5164a4c478 514db6064d93b43b
heuristics/cert_id JISEC-CC-CRP-C0593 516-LSS
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.0.31 12.5
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0593
  • certification_date: 01.03.2018
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0593_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Dell Color MFP S3845cdn
    • product_type: Multi-Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0593_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0593_est.pdf
    • toe_version: Controller ROM Ver. 1.0.31
    • vendor: Dell Inc.
  • expiration_date: 01.04.2023
  • supplier: Dell Inc.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0593_it6625.html
  • toe_overseas_name: Dell Color MFP S3845cdnController ROM Ver. 1.0.31
  • certification_date: 16.03.2021
  • level: DBMS PP Base Package, V2.12
  • product: Crunchy Certified PostgreSQL 12.5
  • vendor: Crunchy Data Solutions, Inc.
heuristics/protection_profiles {} c0b2fe8891b23088
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088V2b_pdf.pdf
pdf_data/cert_filename c0593_eimg.pdf 516-LSS CT no sig Eng.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 516-LSS: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
  • Lightship:
    • Lightship Security: 1
pdf_data/cert_metadata
  • /CreationDate: D:20180409142712+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180409142752+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 413818
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20210325160326-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1640422
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0593_erpt.pdf 516 LSS CR.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0593-01: 1
    • Certification No. C0593: 1
  • CA:
    • 516-LSS: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
  • EAL:
    • EAL 2+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 1
    • A.SECMODE: 1
    • A.USER: 1
  • T:
    • T.COMM_TAP: 2
    • T.CONFDATA: 2
    • T.CONSUME: 2
    • T.DATA_SEC: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 13
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • Lightship:
    • Lightship Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 2
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • X509:
    • X.509: 1
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20180619105647+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20180619105727+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 383511
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
pdf_data/st_filename c0593_est.pdf Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 11
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 16
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UIA.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 3
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 3
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 2
    • FIA_UID.1: 5
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 2
    • FIA_USB.1: 5
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 3
    • FMT_REV.1: 13
    • FMT_REV.1.1: 7
    • FMT_REV.1.2: 8
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_TRC.1: 7
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 5
    • FTA_MCS.1.1: 3
    • FTA_MCS.1.2: 2
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 4
    • A.SECMODE: 4
    • A.USER: 3
  • O:
    • O.AUDITS: 7
    • O.CIPHER: 5
    • O.COMM_SEC: 6
    • O.FAX_SEC: 6
    • O.MANAGE: 8
    • O.RESTRICT: 5
    • O.USER: 8
    • O.VERIFY: 2
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 3
    • OE.SEC: 7
    • OE.USER: 3
  • T:
    • T.COMM_TAP: 3
    • T.CONFDATA: 4
    • T.CONSUME: 3
    • T.DATA_SEC: 4
  • A:
    • A.AUTHUSER: 2
    • A.CONNECT: 2
    • A.MANAGE: 2
    • A.NO_GENERAL_PURPOSE: 2
    • A.PHYSICAL: 2
    • A.SUPPORT: 2
    • A.TRAINEDUSER: 2
  • O:
    • O.ADMIN_ROLE: 8
    • O.AUDIT_GENERATION: 6
    • O.DISCRETIONARY_ACCESS: 6
    • O.MANAGE: 10
    • O.MEDIATE: 8
    • O.RESIDUAL_INFORMATION: 8
    • O.TOEACCESS: 1
    • O.TOE_ACCESS: 17
  • OE:
    • OE.ADMIN: 11
    • OE.INFO_PROTECT: 19
    • OE.IT_REMOTE: 9
    • OE.IT_TRUSTED_SYSTEM: 9
    • OE.NO_GENERAL_PURPOSE: 7
    • OE.PHYSICAL: 7
  • T:
    • T.ACCESS_TSFDATA: 2
    • T.ACCESS_TSFFUNC: 2
    • T.IA_MASQUERADE: 3
    • T.IA_USER: 2
    • T.RESIDUAL_DATA: 2
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 4
    • SHA2:
      • SHA-2: 3
      • SHA256: 5
      • SHA384: 2
      • SHA512: 2
  • MD:
    • MD5:
      • MD5: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 21
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
  • X509:
    • X.509: 4
  • RFC:
    • RFC 1321: 4
    • RFC 1413: 2
    • RFC 1964: 1
    • RFC 2743: 1
    • RFC 4510: 1
    • RFC 7677: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide: 1
    • Out of Scope: 2
    • methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is: 1
    • platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional Dependencies: 1
pdf_data/st_metadata
  • /CreationDate: D:20180612075934+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20180612080157+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Subject: Security Target
  • /Title: Dell Color MFP S3845cdn
  • pdf_file_size_bytes: 422531
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 87
  • /Author: Paul Laurence
  • /CreationDate: D:20210316110349-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20210316110349-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 1146452
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different