| name |
CA Identity Manager r12.5 |
Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S- 6000, S-6000DNS, S-6000DDoS and microDefender appliances |
| category |
Access Control Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
US |
MY |
| status |
archived |
archived |
| not_valid_after |
01.11.2014 |
16.04.2025 |
| not_valid_before |
27.07.2010 |
16.04.2020 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C111-CERTIFICATE-v1.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10341-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C111-CR-v1a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10341-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Invisiron%20CDP%20Security%20Target%20v1.0.pdf |
| manufacturer |
CA Technologies |
Invisiron Pte Ltd |
| manufacturer_web |
https://www.ca.com |
https://invisiron.com |
| security_level |
EAL3+, ALC_FLR.1 |
EAL2 |
| dgst |
6f6882f19b6368bb |
e575168e537a9fe0 |
| heuristics/cert_id |
CCEVS-VR-VID-10341-2010 |
ISCB-5-RPT-C111-CR-v1a |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ASE_TSS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ADV_ARC.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
12.5 |
3.1.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10341/
- categories: ['System Access Control']
- category: System Access Control
- certification_date: 27.07.2010
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10341
- product: CA Identity Manager r12.5
- scheme: US
- url: https://www.niap-ccevs.org/products/10341
- vendor: CA Technologies
|
- cert_no: 2020-002-C111
- certification_date: 16.04.2020
- developer: Invisiron Pte Ltd
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C111
- certification_date: 16.04.2020
- developer: 1 Pemimpin Drive #08-03, One Pemimpin, Singapore 576151
- expiration_date: 16.04.2025
- mutual_recognition: CCRA
- product: Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S-6000, S-6000DNS, S-6000DDoS and microDefender appliances
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C111/ISCB-5-RPT-C111-CR-v1a.pdf
- scope: The TOE is a software and hardware appliance. Each appliance model operate using an identical software image with identical functionality. The TOE is used as a network monitoring and incident management platform. They implement an intrusion and prevention system and reputation based detection. In addition to the security engines the TOE also provides security event logging and packet capture. This data is stored in files which can be exported out from the platforms. The TOE physical boundary defines all hardware and software that is required to support the TOE’s logical boundary as well as the TOE’s security functionality.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C111/Invisiron_CDP_Security_Target_v10.pdf
- type: Network and Network-Related Devices and Systems
- expiration_date: 16.04.2025
- level: EAL2
- product: Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S-6000, S-6000DNS, S-6000DDoS and microDefender appliances
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/106
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
ISCB-5-CERT-C111-CERTIFICATE-v1.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20200423022656Z00'00'
- /Creator: Word
- /ModDate: D:20200423022656Z00'00'
- /Producer: macOS Version 10.15.3 (Build 19D76) Quartz PDFContext
- /Title: Microsoft Word - ISCB-5-CERT-C111-CERTIFICATE-v1.docx
- pdf_file_size_bytes: 267175
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
st_vid10341-vr.pdf |
ISCB-5-RPT-C111-CR-v1a.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10341-2010
- cert_item: CA Identity Manager r12.5
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10341-2010: 1
|
- MY:
- ISCB-5-RPT-C111-CR-v1a: 34
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_IFF.1: 1
|
- FAU:
- FDP:
- FIA:
- FIA_ATD.1: 1
- FIA_SOS.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTP:
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.NOEVIL: 1
- A.PHYSEC: 1
- A.SINGEN: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Eric Winterton
- /CreationDate: D:20100910114002
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20100910114002
- /Producer: Microsoft® Office Word 2007
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 339605
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: HZ
- /CreationDate: D:20200422114328Z00'00'
- /Creator: Word
- /ModDate: D:20200422114328Z00'00'
- /Producer: macOS Version 10.15.3 (Build 19D76) Quartz PDFContext
- /Title: ISCB-3-LTR-M012-TERMINATE_Logrhythm_v7.4-v1
- pdf_file_size_bytes: 1284643
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
| pdf_data/st_filename |
st_vid10341-st.pdf |
Invisiron CDP Security Target v1.0.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 3
- EAL3: 8
- EAL3 augmented: 2
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 16
- ADV_FSP.3: 14
- ADV_TDS.2: 15
- AGD:
- AGD_OPE.1: 15
- AGD_PRE.1: 11
- ALC:
- ALC_CMC.3: 15
- ALC_CMS.3: 8
- ALC_DEL.1: 10
- ALC_DVS.1: 7
- ALC_FLR.1: 12
- ALC_LCD.1: 8
- ASE:
- ASE_CCL.1: 13
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.2: 12
- ASE_REQ.2: 15
- ASE_SPD.1: 9
- ASE_TSS.2: 12
- ATE:
- ATE_COV.2: 7
- ATE_DPT.1: 7
- ATE_FUN.1: 10
- ATE_IND.2: 9
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 1
- ASE_INT.1: 4
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 36
- FDP_ACC.1.1: 3
- FDP_ACF.1: 37
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC.1: 14
- FDP_IFC.1.1: 1
- FDP_IFF.1: 13
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UID.1: 3
- FIA_UID.2: 13
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 18
- FMT_MTD.1.1: 3
- FMT_REV.1: 8
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.2: 8
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FTP:
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_IFF: 2
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.LOCATE: 3
- A.NOEVIL: 3
- A.PATCHES: 3
- O:
- O.ACCESS: 4
- O.AUDIT: 7
- O.AUTH: 6
- O.EAVESDROPPING: 3
- O.FILESYS: 4
- O.MANAGE: 4
- O.ROBUST_ADMIN_GUIDA: 2
- O.ROBUST_ADMIN_GUIDANC: 1
- O.ROBUST_ADMIN_GUIDANCE: 1
- O.ROBUST_TOE_ACCESS: 4
- OE:
- OE.ADMIN: 5
- OE.AUDIT: 5
- OE.FILESYS: 4
- OE.LOCATE: 3
- OE.NOEVIL: 3
- OE.SYSTEM: 1
- T:
- T.ACCESS: 4
- T.ADMIN_ERROR: 4
- T.AUDIT_COMPROMISE: 6
- T.EAVESDROPPING: 3
- T.MASK: 5
- T.MASQUERADE: 3
- T.UNAUTH: 3
|
- A:
- A.NOEVIL: 3
- A.PHYSEC: 2
- A.SINGEN: 3
- O:
- O.ACCOUN: 4
- O.ANALYZER: 4
- O.AUDREC: 4
- O.IDAUTH: 4
- O.MEDIAT: 4
- O.RESPONSE: 4
- O.REVIEW: 4
- O.SECFUN: 4
- O.SECSTA: 4
- O.SENSOR: 4
- O.SINUSE: 4
- O.STORAGE: 4
- O.TOECOM: 4
- OE:
- OE.ADMTRA: 3
- OE.GUIDAN: 3
- OE.PHYSEC: 3
- OE.SINGEN: 3
- T:
- T.AUDACC: 4
- T.AUDFUL: 2
- T.INFLUX: 2
- T.MALICE: 4
- T.MEDIAT: 3
- T.MISUSE: 8
- T.NOAUTH: 2
- T.OLDINF: 3
- T.REPLAY: 3
- T.SELPRO: 2
- T.TOECOM: 2
- T.TUSAGE: 4
|
| pdf_data/st_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 2
- TLS 1.0: 1
- TLS v1.0: 1
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20100910113852
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20100910113852
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1112989
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 120
|
- /CreationDate: D:20200318172827Z00'00'
- /Creator: Word
- /ModDate: D:20200318172827Z00'00'
- /Producer: macOS Version 10.15.3 (Build 19D76) Quartz PDFContext
- /Title: Microsoft Word - Invisiron CDP Security Target v1.0.docx
- pdf_file_size_bytes: 3592417
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |