name |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
EMC® Ionix™ for IT Operations Intelligence (SMARTS®) - SAM 8.1.1, IP 8.1.1, NPM 3.1, SIA 2.3.1.1, EISM 3.0, SAM Adapters 1.3 |
category |
Detection Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
CA |
status |
archived |
archived |
not_valid_after |
01.11.2014 |
15.05.2017 |
not_valid_before |
01.10.2012 |
12.04.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-ionix-v13-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-ionix-v13-sec-eng.pdf |
manufacturer |
Tenable Network Security, Inc. |
EMC Corporation |
manufacturer_web |
https://www.tenable.com/ |
https://www.emc.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL2+, ALC_FLR.2 |
dgst |
7a9d9dd29e76bfba |
4c0f9bdfc70a1779 |
heuristics/cert_id |
CCEVS-VR-VID-10443-2012 |
383-4-187 |
heuristics/cert_lab |
US |
CANADA |
heuristics/cpe_matches |
cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-6062, CVE-2021-20079, CVE-2023-3252, CVE-2021-3450, CVE-2017-18214, CVE-2018-5407, CVE-2022-22827, CVE-2021-46143, CVE-2022-22822, CVE-2022-22826, CVE-2024-0955, CVE-2020-5765, CVE-2016-1000029, CVE-2022-3499, CVE-2018-1141, CVE-2022-33757, CVE-2019-1559, CVE-2023-3251, CVE-2021-45960, CVE-2022-23852, CVE-2022-28291, CVE-2022-0778, CVE-2022-32973, CVE-2022-4313, CVE-2017-5179, CVE-2019-3982, CVE-2020-5774, CVE-2022-23990, CVE-2021-3449, CVE-2022-22825, CVE-2019-3962, CVE-2018-20843, CVE-2016-4055, CVE-2016-9260, CVE-2024-0971, CVE-2019-3961, CVE-2022-22824, CVE-2018-1147, CVE-2016-1000028, CVE-2018-1148, CVE-2023-3253, CVE-2019-3923, CVE-2022-32974, CVE-2021-20106, CVE-2021-20135, CVE-2022-22823, CVE-2023-6178 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.2, ALC_CMC.2, AGD_PRE.1, ADV_ARC.1, ALC_CMS.2, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ATE_COV.1, ADV_TDS.1, ALC_FLR.2, ATE_IND.2, AVA_VAN.2 |
ALC_CMC.2, ASE_INT.1, ATE_FUN.1, ATE_COV.1, ADV_TDS.1, ASE_TSS.1, ADV_FSP.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ADV_ARC.1, ALC_CMS.2, ALC_DEL.1, AGD_OPE.1, ALC_FLR.2, ASE_ECD.1, AVA_VAN.2 |
heuristics/extracted_versions |
3.6, 4.4, 2.1, 5.0.1, 2.0.1 |
2.3.1.1, 1.3, 3.1, 3.0, 8.1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Enterprise Security Management
- certification_date: 01.10.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10443
- product: Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1. Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10443
- vendor: Tenable, Inc
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10443-vr.pdf |
emc-ionix-v13-cert-eng.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10443-2012
- cert_item: Tenable SecurityCenter 4 and Components
- cert_lab: US NIAP
- CA:
|
- US:
- CA:
- cert_id: 383-4-187-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10443-2012: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 3
- EAL 4: 1
- EAL2: 1
- EAL2+: 3
|
- EAL:
- EAL 2: 4
- EAL 2 augmented: 2
- EAL 2+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.OS: 1
- A.PROTCT: 1
- A.WKSTN: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Evaluation Team
- /CreationDate: D:20121024103543
- /Creator: Microsoft® Office Word 2007
- /Keywords: VR
- /ModDate: D:20121024103543
- /Producer: Microsoft® Office Word 2007
- /Subject: Validator Report
- /Title: Validation Report for IronPort Messaging Gateway
- pdf_file_size_bytes: 441073
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author: User
- /CCEF: EWA-Canada
- /CR date: 12 April 2012
- /CR version: 1.0
- /Certificate date: 12 April 2012
- /CreationDate: D:20120412092611-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer name: EMC Corporation
- /Document number: 383-4-187-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of EMC Corporation Ionix™ for IT Operations Intelligence (SMARTS®) - SAM 8.1.1, IP 8.1.1, NPM 3.1, SIA 2.3.1.1, EISM 3.0, SAM Adapters 1.3 Document No. 1694-000-D002, Version 1.3, 28 March
- /Evaluation completion date: 28 March 2012
- /ModDate: D:20120501084033-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ST Title: EMC Corporation® Ionix™ for IT Operations Intelligence (SMARTS®) - SAM 8.1.1, IP 8.1.1, NPM 3.1, SIA 2.3.1.1, EISM 3.0, SAM Adapters 1.3 Security Target
- /ST date: 17 February 2012
- /ST version: 0.8
- /SourceModified: D:20120412132516
- /Sponsor: EMC
- /TOE Version: 5.0
- /TOE name and version: EMC® Ionix™ for IT Operations Intelligence (SMARTS®) - SAM 8.1.1, IP 8.1.1, NPM 3.1, SIA 2.3.1.1, EISM 3.0, SAM Adapters 1.3
- /TOE short name: EMC Ionix
- /Title: 383-4-187
- pdf_file_size_bytes: 84844
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
st_vid10443-st.pdf |
emc-ionix-v13-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 9
- EAL2 augmented: 4
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 22
- ADV_FSP.2: 12
- ADV_TDS.1: 12
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.2: 8
- ALC_CMS.2: 8
- ALC_DEL.1: 6
- ALC_FLR.2: 22
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 9
- ATE_IND.2: 8
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 6
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_SEL: 2
- FAU_SEL.1: 5
- FAU_SEL.1.1: 1
- FAU_STG: 4
- FAU_STG.2: 9
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 2
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID: 2
- FIA_UID.1: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MDT.1: 1
- FMT_MOF: 2
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MTD: 2
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 2
- FPT_ITC.1: 2
- FPT_ITI.1: 2
- FPT_ITT: 2
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MTD: 1
- FMT_MTD.1: 17
- FMT_MTD.1.1: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ASCOPE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.NOTRST: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 12
- O.AUDITS: 5
- O.EADMIN: 5
- O.EXPORT: 3
- O.IDANLZ: 5
- O.IDAUTH: 20
- O.IDSCAN: 7
- O.IDSENS: 7
- O.INTEGR: 7
- O.OFLOWS: 6
- O.PROTCT: 11
- O.RESPON: 5
- OE:
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_SORT: 2
- OE.CREDEN: 6
- OE.INSTAL: 7
- OE.INTROP: 5
- OE.PERSON: 5
- OE.PHYCAL: 6
- OE.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.FACCNT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 3
- T.IMPCON: 3
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MISACT: 3
- T.MISUSE: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.SCNCFG: 3
- T.SCNMLC: 3
- T.SCNVUL: 3
|
- A:
- A.INSTALL: 2
- A.LOCATE: 2
- A.MANAGE: 2
- A.NETCON: 2
- A.NOEVIL: 2
- A.PROTECT: 2
- A.SECURE: 2
- A.TIMESTAMP: 2
- O:
- O.ACCESS: 4
- O.ADMIN: 7
- O.AUDIT: 10
- O.IDAUTH: 8
- O.MONITOR: 8
- O.PROTECT: 10
- O.ROOTANL: 8
- O.SECURE: 4
- OE:
- OE.AVAIL: 3
- OE.MANAGE: 5
- OE.PHYSICAL: 3
- OE.PLATFORM: 3
- OE.PROTECT: 5
- OE.SUPPORT: 5
- OE.TIME: 5
- T:
- T.AVAIL: 2
- T.COMINT: 2
- T.EAVESDROP: 2
- T.PRIVIL: 2
- T.TAMPERING: 2
- T.UNAUTH: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Kenneth Lasoski
- /CreationDate: D:20120217135345Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120413104231-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Ionix™ for IT Operations Intelligence (SMARTS®) - SAM 8.1.1, IP 8.1.1, NPM 3.1, SIA 2.3.1.1, EISM 3.0, SAM Adapters 1.3
- /Title: Security Target
- pdf_file_size_bytes: 964120
- pdf_hyperlinks: mailto:[email protected], http://www.emc.com/, http://www.corsec.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |