name |
Voltage SecureMail Suite 2.0 |
Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3 |
category |
Other Devices and Systems |
Databases |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
07.09.2012 |
27.01.2025 |
not_valid_before |
29.05.2007 |
27.01.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1050c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1050a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1050b_pdf.pdf |
manufacturer |
Voltage Security |
Microsoft Corporation |
manufacturer_web |
https://www.voltage.com/ |
https://www.microsoft.com |
security_level |
EAL2 |
EAL4+, ALC_FLR.2 |
dgst |
71199d48be16022d |
4b359a9de7790aef |
heuristics/cert_id |
CCEVS-VR-0029-2007 |
BSI-DSZ-CC-1050-2020 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
ALC_FLR.2 |
heuristics/extracted_versions |
2.0 |
14.0.3223.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Secure Messaging
- certification_date: 29.05.2007
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date:
- id: CCEVS-VR-VID10129
- product: Voltage SecureMail Suite 2.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10129
- vendor: Voltage Security
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c0b2fe8891b23088 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088V2b_pdf.pdf |
pdf_data/cert_filename |
|
1050c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200131082713+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /ModDate: D:20200131084759+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Zertifikat, Urkunde
- /Title: Certification Report BSI-DSZ-CC-1050-2020
- pdf_file_size_bytes: 301903
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10129-vr.pdf |
1050a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-07-0029
- cert_item: ® TM Voltage Security, Inc. Palo Alto, CA Voltage SecureMail Suite 2.0
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1050-2020
- cert_item: Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3
- cert_lab: BSI
- developer: Microsoft Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02, 23 March 2017, BSI-CC- PP-0088-V2-2017
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1050: 1
- BSI-DSZ-CC-1050-2020: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0088-V2: 1
- BSI-CC-PP-0088-V2-2017: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL2: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL2+: 1
- EAL4+: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.4: 1
- FCS_COP: 5
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.AUDIT_BACKUP: 1
- A.EXTSRVPROT: 1
- A.LOCATE: 1
- A.LOWEXP: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- A.SECURE_COMMS: 1
- A.USERDOCS: 1
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 21
- Microsoft Corporation: 8
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
|
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- ID: BSI-DSZ-CC-1050; SQL Server 2017 Database Engine Enterprise Edition x64 (English) 14.0.3223.3, (confidential document) [8] DBMS Working Group Technical Community Protection Profile for Database Management Systems: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20070606103547-07'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /ModDate: D:20070606145721-04'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070606173502
- /Title: D
- /_AdHocReviewCycleID: 301627650
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Rose Ignacio
- /_EmailSubject: Voltage VID 10129 Validation Report
- pdf_file_size_bytes: 223595
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
|
pdf_data/st_filename |
st_vid10129-st.pdf |
1050b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 67
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 10
- ADO_IGS: 1
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 15
- ADV_RCR.1: 8
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 15
- AGD_USR: 1
- AGD_USR.1: 13
- ATE:
- ATE_COV.1: 8
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_SOF.1: 11
- AVA_VLA.1: 12
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN_EXP: 30
- FAU_GEN_EXP.1: 4
- FAU_GEN_EXP.2: 9
- FAU_GEN_EXP.2.1: 1
- FAU_SAR_EXP: 26
- FAU_SAR_EXP.1: 6
- FAU_SAR_EXP.3: 9
- FAU_SAR_EXP.3.1: 1
- FCO:
- FCO_NRO_EXP.1: 9
- FCO_NRO_EXP.1.1: 1
- FCO_NRO_EXP.1.2: 1
- FCO_NRO_EXP.1.3: 1
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 17
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 33
- FCS_CKM_EXP.1: 4
- FCS_COP: 17
- FCS_COP.1: 25
- FCS_COP_EXP.1: 10
- FCS_COP_EXP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_SAR_EXP: 1
- FIA:
- FIA_UAU_EXP: 53
- FIA_UAU_EXP.2: 5
- FIA_UID: 5
- FIA_UID_EXP: 68
- FIA_UID_EXP.2: 5
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 37
- FMT_MSA.2.1: 1
- FMT_MTD_EXP: 19
- FMT_MTD_EXP.1: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.2: 1
- FMT_SMR_EXP: 21
- FMT_SMR_EXP.1: 9
- FPT:
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_RVM.1: 1
- FPT_RVM_EXP: 17
- FPT_RVM_EXP.1: 2
- FPT_SEP.1: 1
- FPT_SEP_EXP: 17
- FPT_SEP_EXP.1: 4
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 15
- FIA_ATD.1.1: 3
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_REV.1: 12
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTA:
- FTA_MCS.1: 7
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TAH: 1
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 4
- A.AUDIT: 2
- A.AUDIT_BACKUP: 2
- A.EXTSRVPROT: 4
- A.LOCATE: 2
- A.LOWEXP: 2
- A.NO_EVIL: 2
- A.PHYSICAL: 4
- A.SECURE_COMMS: 2
- A.USERDOCS: 4
- O:
- O.ACCESS: 8
- O.ACCOUN: 4
- O.ALGS: 6
- O.AUDREC: 4
- O.DESTROY: 6
- O.GUIDAN: 6
- O.IDENTITY: 6
- O.KEYGEN: 4
- O.MANAGE: 8
- O.MEDIAT: 4
- O.PART_SEL_PRO: 6
- O.PROOF: 4
- O.SECUREKEYS: 6
- O.SECURE_COM: 5
- OE:
- OE.ACCOUN: 5
- OE.ADMTRA: 9
- OE.DOMAIN_SEP: 5
- OE.GENPUR: 5
- OE.MANAGE: 9
- OE.MEDIAT: 5
- OE.NOEVIL: 8
- OE.NO_BYPASS: 5
- OE.PHYSEC: 10
- OE.TIME: 6
- T:
- T.AUDACC: 4
- T.BYPASS: 2
- T.COMPROMISE: 2
- T.MISUSE: 4
- T.NOAUTH: 4
- T.SPOOF: 2
- T.USAGE: 4
|
- A:
- A.AUTHUSER: 3
- A.CONNECT: 4
- A.MANAGE: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL: 3
- A.SUPPORT: 4
- A.TRAINEDUSER: 3
- O:
- O.ACCESS_HISTORY: 11
- O.ADMIN_ROLE: 8
- O.AUDIT_GENERATI: 1
- O.AUDIT_GENERATION: 6
- O.DISCRETIONARY_: 1
- O.DISCRETIONARY_ACCESS: 5
- O.MANAGE: 11
- O.MEDIATE: 8
- O.RESIDUAL_INFOR: 1
- O.RESIDUAL_INFORMATION: 8
- O.TOE_ACCESS: 18
- OE:
- OE.ADMIN: 12
- OE.INFO_PROTECT: 19
- OE.IT_REMOTE: 10
- OE.IT_TRUSTED_SYSTEM: 9
- OE.NO_GENERAL_: 2
- OE.NO_GENERAL_PURPOSE: 6
- OE.PHYSICAL: 8
- T:
- T.ACCESS_TSFDATA: 3
- T.ACCESS_TSFFUNC: 3
- T.IA_MASQUERADE: 4
- T.IA_USER: 3
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 4
- T.UNAUTHORIZED_ACCESS: 4
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 12
- Microsoft Corporation: 3
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 12
- FIPS 180-2: 1
- FIPS 186-2: 9
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- PKCS:
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |