Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SDoT Filter SW Version 6.2a Revision 6.2.15566.31149
CSA_CC_22008
Lexmark MX521, MX931, CX730, CX930, and CX931 MFPs with Trusted Platform Module without Fax and Hard Drive and with Firmware Version 081.234
589-EWA
name SDoT Filter SW Version 6.2a Revision 6.2.15566.31149 Lexmark MX521, MX931, CX730, CX930, and CX931 MFPs with Trusted Platform Module without Fax and Hard Drive and with Firmware Version 081.234
category Boundary Protection Devices and Systems Multi-Function Devices
scheme SG CA
not_valid_after 07.09.2028 23.06.2028
not_valid_before 07.09.2023 23.06.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/-CER-SDoT-Filter-SW-CC-Certificate.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589-EWA%20CT.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/-CER-SDoT-Filter-SW-Certificate-Report.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589%20EWA%20CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_SDoTSGW6.2a_SecurityTarget_Lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589-EWA_Lexmark_TPM_noFax_noHD_ST_112.pdf
manufacturer INFODAS GmbH Lexmark International, Inc.
manufacturer_web https://www.infodas.com/en/ https://www.lexmark.com/
security_level EAL4+, ALC_FLR.2, AVA_VAN.5 {}
dgst 771ab894e3d06375 c6f126baeb1591a3
heuristics/cert_id CSA_CC_22008 589-EWA
heuristics/cert_lab [] CANADA
heuristics/cpe_matches {} cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx521_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-22960
heuristics/extracted_sars ASE_TSS.1, ASE_ECD.1, ASE_SPD.1, ASE_INT.1, AVA_VAN.5, ASE_OBJ.2, ASE_CCL.1, ALC_FLR.2, ASE_REQ.2 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/extracted_versions 6.2, 6.2.15566.31149 081.234
heuristics/scheme_data
  • certification_date: 23.06.2023
  • level: PP_HCD_V1.0
  • product: Lexmark MX521, MX931, CX730, CX930, and CX931 Multi-Function Printers with Trusted Platform Module, without Fax and Hard Drive and with Firmware Version 081.234
  • vendor: Lexmark International, Inc.
heuristics/protection_profiles {} b2cfec7a92fa2940
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf
pdf_data/cert_filename -CER-SDoT-Filter-SW-CC-Certificate.pdf 589-EWA CT.pdf
pdf_data/cert_keywords/cc_cert_id
  • SG:
    • CSA_CC_22008: 1
  • CA:
    • 589-EWA: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_metadata
  • /CreationDate: D:20230920180946+08'00'
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ActionId: 26421bad-f606-455a-bac1-5073c97e8805
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ContentBits: 0
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Enabled: true
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Method: Privileged
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Name: Sensitive Normal
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SetDate: 2022-02-18T04:59:28Z
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_ActionId: 26421bad-f606-455a-bac1-5073c97e8805
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Application: Microsoft Azure Information Protection
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Enabled: True
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Extended_MSFT_Method: Manual
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Name: RESTRICTED
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Owner: [email protected]
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SetDate: 2021-08-12T02:02:37.1377634Z
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /ModDate: D:20230920180946+08'00'
  • pdf_file_size_bytes: 388012
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate: D:20230628103005-04'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20230628103011-05'00'
  • /Producer: Foxit PDF Editor Printer Version 12.1.0.15345
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 367700
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename -CER-SDoT-Filter-SW-Certificate-Report.pdf 589 EWA CR.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 589-EWA
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • SG:
    • CSA_CC_22008: 2
  • CA:
    • 589-EWA: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 2
  • ATE:
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC: 2
  • FIA:
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MTD.3: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.ACCESS: 1
    • OE.AUDIT_ENFORCE: 1
    • OE.BOOT: 1
    • OE.DEDICATED_ADMIN_NET: 1
    • OE.DIFF_NET: 1
    • OE.HIGH_AVAILABILITY: 1
    • OE.HIGH_PROTECTION: 1
    • OE.HSM: 1
    • OE.NTP_SERVER: 1
    • OE.PKI: 1
    • OE.ROLE_SEPARATION: 1
    • OE.TRUSTW_ONLY: 1
    • OE.TRUSTW_STAFF: 1
    • OE.USER_IDENT: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 2
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 4
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
    • CCMB-2018-04-003: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_metadata
  • /CreationDate: D:20230928144140+08'00'
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ActionId: eb99f75e-9f8d-4433-96f7-1bbac9f1e82f
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ContentBits: 0
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Enabled: true
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Method: Privileged
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Name: Sensitive Normal
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SetDate: 2022-08-02T09:37:22Z
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_ActionId: eb99f75e-9f8d-4433-96f7-1bbac9f1e82f
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Application: Microsoft Azure Information Protection
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Enabled: True
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Extended_MSFT_Method: Manual
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Name: RESTRICTED
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Owner: [email protected]
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SetDate: 2020-11-20T03:35:11.8228409Z
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /ModDate: D:20230928144141+08'00'
  • pdf_file_size_bytes: 538747
  • pdf_hyperlinks: https://www.csa.gov.sg/our-programmes/certification-and-labelling-schemes/singapore-common-criteria-scheme/product-list, https://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
pdf_data/st_filename ST_SDoTSGW6.2a_SecurityTarget_Lite.pdf 589-EWA_Lexmark_TPM_noFax_noHD_ST_112.pdf
pdf_data/st_keywords/cc_cert_id
  • SG:
    • CSA_CC_22008: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 5
    • EAL4 augmented: 3
    • EAL4+: 1
  • EAL:
    • EAL 1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 3
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 2
    • ASE_ECD: 1
    • ASE_ECD.1: 2
    • ASE_INT: 1
    • ASE_INT.1: 2
    • ASE_OBJ: 1
    • ASE_OBJ.2: 2
    • ASE_REQ: 1
    • ASE_REQ.2: 2
    • ASE_SPD: 1
    • ASE_SPD.1: 2
    • ASE_TSS: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 1
    • FAU_ARP.1: 8
    • FAU_ARP.1.1: 1
    • FAU_GEN: 2
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 9
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 6
    • FAU_STG.2: 10
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 9
    • FAU_STG.3.1: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 11
    • FCS_CKM.1: 15
    • FCS_CKM.2: 8
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 45
    • FCS_COP.1: 7
  • FDP:
    • FDP_ACC: 37
    • FDP_ACC.1: 17
    • FDP_ACF: 37
    • FDP_ACF.1: 37
    • FDP_IFC: 38
    • FDP_IFC.1: 18
    • FDP_IFF: 52
    • FDP_IFF.1: 39
    • FDP_IFF.3: 8
    • FDP_IFF.3.1: 1
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
  • FIA:
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 17
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 1
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 31
    • FMT_MTD.1: 7
    • FMT_MTD.3: 7
    • FMT_MTD.3.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 12
    • FMT_SMR.2: 11
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_INC: 4
    • FPT_INC.1: 11
    • FPT_INC.1.1: 2
    • FPT_INC.1.2: 2
    • FPT_INC.1.3: 2
    • FPT_STM: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TDC: 1
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_TRP: 2
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 9
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 16
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 40
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 7
    • FCS_TLS_EXT.1: 6
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT.1: 2
    • FDP_DSK_EXT.1.2: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 10
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 3
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 8
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 13
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 4
    • A.AUDIT: 5
    • A.BOOT: 5
    • A.DEDICATED_ADMIN: 1
    • A.DEDICATED_ADMIN_NET: 4
    • A.DIFF_NET: 5
    • A.HIGH_AVAILABILITY: 5
    • A.HIGH_PROTECTION: 4
    • A.HSM: 5
    • A.NTP_SERVER: 5
    • A.PKI: 5
    • A.ROLE_SEPARATION: 4
    • A.TRUSTW_ONLY: 4
    • A.TRUSTW_STAFF: 5
    • A.USER_IDENT: 5
  • OE:
    • OE.ACCESS: 4
    • OE.AUDIT_ENFORCE: 5
    • OE.BOOT: 4
    • OE.DEDICATED_ADMIN_NET: 3
    • OE.DIFF_NET: 7
    • OE.HIGH_AVAILABILITY: 5
    • OE.HIGH_PROTECTION: 8
    • OE.HSM: 2
    • OE.NTP_SERVER: 5
    • OE.PKI: 5
    • OE.ROLE_SEPARATION: 5
    • OE.TRUSTW_ONLY: 4
    • OE.TRUSTW_STAFF: 6
    • OE.USER_IDENT: 2
  • OSP:
    • OSP.AUDIT: 5
    • OSP.CONFIG_AUDIT: 5
    • OSP.DUAL_CONTROL: 4
    • OSP.FLOW_CONTROL: 5
    • OSP.PROTOCOLS: 6
  • OT:
    • OT.AUDIT: 10
    • OT.AUDIT_CHANGE_LOG: 8
    • OT.AUDIT_LOG_AVAILABILITY: 10
    • OT.AUDIT_PROTECT: 8
    • OT.BANDWIDTH: 6
    • OT.DEFAULT: 4
    • OT.FILTER: 16
    • OT.FOUR_EYES: 6
    • OT.INIT: 10
    • OT.LABELS: 12
    • OT.PRE_FILTER: 6
    • OT.PROTECTION: 6
    • OT.PROTOCOLS: 11
    • OT.PROTOCOL_DENY: 11
    • OT.ROLE_SEPARATION: 13
    • OT.SANITISED_DATA: 9
    • OT.SECURE_CHANNEL: 8
    • OT.USER_AUTHENTICATION: 11
    • OT.WARNING: 10
  • T:
    • T.AUDIT_ACCESS: 7
    • T.AUDIT_COLLAPSE: 6
    • T.AUDIT_CONTROL: 5
    • T.AUTH: 6
    • T.INSERT: 6
    • T.MALICIOUS_CODE: 8
    • T.MISCONFIG: 6
    • T.REVEAL_TO_LOW: 15
    • T.WRONG_LABEL: 6
  • A:
    • A.NETWORK: 2
    • A.PHYSICAL: 2
    • A.TRAINED_USERS: 2
    • A.TRUSTED_ADMIN: 2
  • D:
    • D.TSF: 12
    • D.USER: 15
  • O:
    • O.ACCESS: 1
    • O.ACCESS_: 1
    • O.ACCESS_CONTROL: 10
    • O.ADMIN_ROLES: 9
    • O.AUDIT: 12
    • O.COMMS_PROTECTION: 14
    • O.PURGE_DATA: 6
    • O.STORAGE_ENCRYPTION: 2
    • O.TSF_SELF_TEST: 4
    • O.UPDATE_VERIFICATION: 5
    • O.USER_AUTHORIZATION: 11
  • OE:
    • OE.ADMIN_TRAINING: 2
    • OE.ADMIN_TRUST: 2
    • OE.NETWORK_PROTECTION: 2
    • OE.PHYSICAL_PROTECTION: 2
    • OE.USER_TRAINING: 2
  • OSP:
    • OSP: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.NET_COMRPOMISE: 1
    • T.TSF_COMPROMISE: 2
    • T.TSF_FAILURE: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_UPDATE: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 2
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 3
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 2
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 2
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
      • SHA-256: 1
      • SHA-384: 1
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 8
      • SHA-384: 5
      • SHA-512: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 17
      • TLS 1.2: 1
  • IKE:
    • IKE: 9
    • IKEv1: 11
    • IKEv2: 8
  • IPsec:
    • IPsec: 42
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 4
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 3
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 2
    • malfunction: 5
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 41: 1
  • CC:
    • CCMB-2017-04-002: 3
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2104: 2
    • RFC 3447: 1
    • RFC 3986: 1
    • RFC3986: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 18031:2011: 3
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-56B: 1
    • NIST SP 800-90A: 3
    • NIST SP 800-90B: 1
  • RFC:
    • RFC 3164: 1
    • RFC 3602: 6
    • RFC 4106: 2
    • RFC 4109: 2
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4304: 2
    • RFC 4868: 2
    • RFC 5282: 1
    • RFC2409: 1
pdf_data/st_metadata
  • /Author: INFODAS GmbH
  • /CreationDate: D:20230925100039+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /ModDate: D:20230925100039+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: Security Target
  • /Title: Security Target
  • pdf_file_size_bytes: 1889726
  • pdf_hyperlinks: http://www.w3.org/TR/xmldsig-core1/, http://www.w3.org/TR/xml/, http://www.xmlspif.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 103
  • /Author: sjackson
  • /CreationDate: D:20230620104749-04'00'
  • /Creator: PDFCreator 3.2.0.11758
  • /Keywords:
  • /ModDate: D:20230628102901-05'00'
  • /Producer: PDFCreator 3.2.0.11758
  • /Subject:
  • /Title: Lexmark TPM noFax noHD ST 112
  • pdf_file_size_bytes: 594574
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different