name |
SecureVue v3.6.3 CP1 |
AhnLab Suhoshin Absolute v3.0 |
category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
US |
KR |
status |
archived |
archived |
not_valid_after |
20.05.2015 |
01.06.2019 |
not_valid_before |
20.05.2013 |
22.12.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NISS-136-En.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NISS-136-ST-En.pdf |
manufacturer |
EiQ Networks, Inc. |
AhnLab, Inc. |
manufacturer_web |
https://www.EiQNetworks.com/ |
https://www.ahnlab.com/ |
security_level |
ALC_FLR.2, EAL2+ |
EAL4 |
dgst |
78bafa65426e3c35 |
898d4106bbe49087 |
heuristics/cert_id |
CCEVS-VR-VID-10379-2013 |
KECS-NISS-0136-2008 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.1, ASE_OBJ.2, ATE_IND.2, ADV_ARC.1, ALC_FLR.2, ASE_TSS.1, ADV_FSP.2, ADV_TDS.1, ALC_CMC.2, ASE_ECD.1, AVA_VAN.2, AGD_OPE.1, ALC_CMS.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ASE_REQ.2, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1 |
ADV_IMP.1, ASE_OBJ.2, ADV_ARC.1, ATE_IND.2, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ALC_DVS.1, ALC_CMS.4, ASE_ECD.1, AVA_VAN.3, AGD_OPE.1, ADV_FSP.4, ATE_DPT.2, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ATE_FUN.1, ADV_TDS.3, AGD_PRE.1, ALC_TAT.1, ALC_DEL.1, ASE_CCL.1, ALC_CMC.4 |
heuristics/extracted_versions |
3.6.3 |
3.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: FW
- cert_id: KECS-NISS-0136-2008
- certification_date: 22.12.2008
- enhanced:
- level: EAL4
- product: AhnLab Suhoshin Absolute v3.0
- product_link: https://itscc.kr/certprod/view.do?product_id=136&product_class=4
- vendor: AhnLab, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10379-vr.pdf |
NISS-136-En.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10379-2013
- cert_item: SecureVue, Version 3.6.3 CP1
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10379-2013: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 8
- EAL 2 augmented: 2
- EAL 3: 1
- EAL2: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 2
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 5
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 3
- FAU_SAR.3: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_SOS.1: 1
- FIA_UAU.5: 1
- FIA_UAU.7: 1
- FIA_UAU_EXP.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_ITT_EXP.1: 3
- FPT_TST_EXP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- both of which are out of scope: 1
- operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). 8 of 40 The TOE employs password masking during input, and a password policy that controls the: 1
- out of scope: 2
- resources. 4. The following are not included in the Evaluation Scope: TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered: 1
|
|
pdf_data/report_metadata |
|
- /Author: truestar
- /CreationDate: D:20090420083030+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20090420083030+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: KECS-NISS-0136-2008 인증보고서(AhnLab Suhoshin Absolute V3.0)-EN.hwp
- pdf_file_size_bytes: 583298
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
st_vid10379-st.pdf |
NISS-136-ST-En.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 4: 1
- EAL1: 1
- EAL2: 6
- EAL2 augmented: 4
- EAL3: 1
- EAL5: 1
- EAL7: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.2: 4
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 14
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 14
- ADV_IMP.1: 11
- ADV_TDS.1: 2
- ADV_TDS.3: 20
- AGD:
- AGD_OPE.1: 14
- AGD_PRE.1: 10
- ALC:
- ALC_CMC.4: 17
- ALC_CMS.1: 1
- ALC_CMS.4: 8
- ALC_DEL.1: 7
- ALC_DVS.1: 8
- ALC_LCD.1: 9
- ALC_TAT.1: 10
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 14
- ASE_INT.1: 16
- ASE_OBJ.2: 13
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD.1: 10
- ASE_TSS.1: 7
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 7
- ATE_DPT.2: 8
- ATE_FUN.1: 12
- ATE_FUN.1.1: 1
- ATE_IND.2: 9
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 6
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UAU_EXP.2: 17
- FIA_UAU_EXP.2.1: 2
- FIA_UID.1: 8
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 1
- FPT_ITT_EXP.1: 14
- FPT_ITT_EXP.1.1: 2
- FPT_ITT_EXP.1.2: 2
- FPT_STM.1: 2
- FPT_TST: 2
- FPT_TST_EXP.1: 13
- FPT_TST_EXP.1.1: 2
- FPT_TST_EXP.1.2: 2
- FPT_TST_EXP.1.3: 2
- FTP:
- FTP_ITC: 1
- FTP_ITT.1: 1
- FTP_ITT_EXP.1: 1
- FTP_TST_EXP.1: 1
|
- FAU:
- FAU_ARP.1: 11
- FAU_ARP.1.1: 2
- FAU_GEN.1: 58
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAA.1: 11
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 2
- FAU_SAR.1: 10
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.3: 7
- FAU_SAR.3.1: 2
- FAU_SEL.1: 14
- FAU_SEL.1.1: 2
- FAU_STG.1: 10
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FAU_STG.3: 7
- FAU_STG.3.1: 2
- FAU_STG.4: 7
- FAU_STG.4.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.2: 15
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 4
- FDP_ACF.1: 22
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_IFC.1: 68
- FDP_IFC.1.1: 16
- FDP_IFC.2: 9
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 84
- FDP_IFF.1.1: 18
- FDP_IFF.1.2: 18
- FDP_IFF.1.3: 18
- FDP_IFF.1.4: 18
- FDP_IFF.1.5: 17
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 5
- FIA_AFL.1.2: 3
- FIA_ATD.1: 29
- FIA_ATD.1.1: 10
- FIA_SOS.1: 13
- FIA_SOS.1.1: 2
- FIA_UAU.1: 31
- FIA_UAU.1.1: 10
- FIA_UAU.1.2: 6
- FIA_UAU.4: 11
- FIA_UAU.4.1: 2
- FIA_UAU.7: 6
- FIA_UAU.7.1: 2
- FIA_UID.1: 13
- FIA_UID.2: 27
- FIA_UID.2.1: 8
- FMT:
- FMT_MOF.1: 43
- FMT_MOF.1.1: 2
- FMT_MSA.1: 35
- FMT_MSA.1.1: 2
- FMT_MSA.3: 45
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 96
- FMT_MTD.1.1: 6
- FMT_MTD.2: 12
- FMT_MTD.2.1: 2
- FMT_MTD.2.2: 2
- FMT_SMF.1: 65
- FMT_SMF.1.1: 2
- FMT_SMR: 1
- FMT_SMR.1: 118
- FMT_SMR.1.1: 5
- FMT_SMR.1.2: 4
- FPT:
- FPT_FLS.1: 11
- FPT_FLS.1.1: 2
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 4
- FPT_TEE.1: 9
- FPT_TEE.1.1: 2
- FPT_TEE.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_FLT.1: 10
- FRU_FLT.1.1: 2
- FRU_RSA.1: 9
- FRU_RSA.1.1: 2
- FTA:
- FTA_SSL.1: 9
- FTA_SSL.1.1: 2
- FTA_SSL.1.2: 2
- FTA_SSL.3: 10
- FTA_SSL.3.1: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- RFC:
- RFC 2865: 1
- RFC 3080: 1
- RFC 4251: 2
- RFC 5424: 2
- RFC 959: 1
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- RFC:
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Data Collector Host OS Agents (UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered: 1
- A: SecureVue v3.6 Data Collector is supported to run on VMWare ESX 4.x and ESXi platform but is out of scope of this evaluation. SecureVue Version 3.6.3 CP1 Security Target SecureVue Version 3.6.3 CP1: 1
- Server. Therefore, for the purpose of this evaluation this executable was not tested and considered out of scope. 1.4.4 Trusted Channel between TOE components The TSF includes a trusted communication: 1
- UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe: 1
- both of which are out of scope: 1
- operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). Each user has the type of authentication assigned to it (AD, RADIUS, or Native). If a user is: 1
- out of scope: 4
|
|
pdf_data/st_metadata |
|
- /Author: skheo
- /Company: 인증팀
- /CreationDate: D:20090320144218+09'00'
- /Creator: Word용 Acrobat PDFMaker 8.0
- /ModDate: D:20090320144338+09'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- /Title: Common Crieria 보증문서
- /_TOE: AhnLab Suhoshin Absolute v3.0
- /모델명: AhnLab Suhoshin Absolute
- /문서명: 보안목표명세서
- /문서버전: -001
- /버전: v1.0
- /작성일: 2007년 3월 30일
- /평가등급: Evaluation Assurance Level 4+
- /형상식별자: Absolute-STD
- /회사명-en: Ahnlab Inc.
- /회사명-kr: (주)안철수연구소
- pdf_file_size_bytes: 2009600
- pdf_hyperlinks:
|