name |
Citrix MetaFrame Presentation Server 4.0 |
Hitachi Storage Command Suite Common Component Version: 6.0.0-01 |
category |
Access Control Devices and Systems |
Access Control Devices and Systems |
scheme |
UK |
JP |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
08.04.2014 |
not_valid_before |
01.08.2005 |
24.12.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP219.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0199_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFS_T488_Citrix_ST_V10.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0199_est.pdf |
manufacturer |
Citrix Systems, Inc. |
Hitachi, Ltd. |
manufacturer_web |
https://www.citrix.com |
https://www.hitachi.com/ |
security_level |
EAL2 |
EAL2+, ALC_FLR.1 |
dgst |
7da57a5dc5ab73a9 |
a8a4d61467d0612f |
heuristics/cert_id |
CRP219 |
JISEC-CC-CRP-C0199 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, ADV_SPM.1, ATE_COV.1, AGD_ADM.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions |
4.0 |
6.0.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0199
- certification_date: 01.12.2008
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides some kinds of storage management software that manage a plural of storage devices that are connected through SAN with common functions. Storage management software is such as Hitachi Device Manager Software, Hitachi Replication Manager Software and Hitachi Tiered Storage Manager Software. Hitachi Storage Command Suite is the general term for these software and TOE. TOE is provided customers as built-in module included in each software package. TOE security functions TOE has the following security functions. - Identification/authentication (Authentication function of external authentication server can be used as substitute.) - Privilege information management (Privilege information is attached to each user's information and it decides each user's role for storage management software.) - Warning banner
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Hitachi Storage Command Suite Common Component
- product_type: IT Product (Foundational Module Software)
- report_link: https://www.ipa.go.jp/en/security/c0199_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0199_est.pdf
- toe_version: 6.0.0-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.04.2014
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0199_it8223.html
- toe_japan_name: Hitachi Storage Command Suite Common Component 6.0.0-01
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP219.pdf |
c0199_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P219: 1
|
- JP:
- CRP-C0199-01: 1
- Certification No. C0199: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FTP:
- FTP_ITC.1: 1
- FTP_ITC.2: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.TOKEN: 1
- T:
- T.ILLEGAL_ACCESS: 1
- T.UNAUTHORISED_: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20050906112345Z
- /Creator: LFS T488 CITRIX_V40_CertRep_P219_10 - Microsoft Word
- /ModDate: D:20131119172038Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: LFS T488 CITRIX_V40_CertRep_P219_10.doc
- pdf_file_size_bytes: 1021419
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20090622183039+09'00'
- /ModDate: D:20090622183039+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 89546
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
LFS_T488_Citrix_ST_V10.pdf |
c0199_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 8
- EAL2 augmented: 2
- EAL2+: 1
|
- EAL:
- EAL2: 6
- EAL2 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP.1: 21
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 23
- FDP_ACF.1: 16
- FDP_IFC.1: 3
- FDP_ITT.1: 17
- FDP_ITT.1.1: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 1
- FPT_ITT.1: 15
- FPT_ITT.1.1: 2
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 1
- FTP_ITC.2: 9
- FTP_ITC.2.1: 1
- FTP_ITC.2.2: 1
- FTP_ITC.2.3: 1
|
- FAU:
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS: 7
- FIA_SOS.1: 10
- FIA_SOS.1.1: 2
- FIA_TAB: 5
- FIA_TAB.1: 5
- FIA_UAU: 5
- FIA_UAU.1: 16
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC.1: 5
- FPT_ITC.1.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 15
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 3
- FTA_TAB.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APP_: 1
- A.APP_CONFIG: 1
- A.PUBLISHED_: 1
- A.SMARTCARD: 1
- A.THIRD_PARTY_: 1
- A.TRUSTADMIN: 1
- A.USER_: 1
- OE:
- OE.CERTIFICATES: 3
- OE.CLIENT_: 1
- OE.CLIENT_PHYSICAL: 1
- OE.CLIENT_TPSW: 3
- OE.IPSEC: 8
- OE.LIMIT_AUT: 1
- OE.LIMIT_AUTH: 2
- OE.MALWARE_: 1
- OE.MALWARE_PROT: 1
- OE.MALWARE_PROTECT: 2
- OE.MEMORY: 4
- OE.OS_CONFIG: 2
- OE.OS_CONFIG_: 2
- OE.OS_CONFIG_CLIENT: 2
- OE.OS_CONFIG_SERVER: 2
- OE.PASSWORD: 1
- OE.PASSWORD_: 1
- OE.PASSWORD_SETUP: 1
- OE.SECURE_: 1
- OE.SECURE_EN: 1
- OE.SECURE_ENCRYPTION: 2
- OE.SERVER_: 1
- OE.SERVER_PHYSICAL: 2
- OE.SERVER_TH: 1
- OE.SERVER_THIRD_: 1
- OE.SERVER_THIRD_PARTY_SW: 1
- OE.SESSION_K: 1
- OE.SESSION_KEYS: 3
- OE.TRUSTED_: 1
- OE.TRUSTED_OPS: 2
- OSP:
- OT:
- OT.APPS_: 1
- OT.APPS_AVAIL: 2
- OT.AUTHENTIC_: 4
- OT.AUTHENTIC_CLIENT: 1
- OT.AUTHENTIC_SERVER: 1
- OT.CONF: 3
- OT.CONF_: 1
- OT.CONF_CLIENT: 2
- OT.CUTPASTE: 1
- OT.CUT_PASTE: 2
- OT.DRIVES: 3
- OT.GATE_ALLO: 1
- OT.GATE_ALLOW: 2
- OT.INTEG: 3
- OT.INTEG_: 1
- OT.INTEG_CLIENT: 2
- OT.SECURE_ENC: 1
- OT.SECURE_ENCRYP: 1
- OT.SECURE_ENCRYPTION: 2
- T:
- T.AUTHENTIC: 4
- T.AVAIL: 4
- T.MISDIRECT: 2
- T.MOD_CONF: 4
- T.MOD_HW_CLIENT: 1
- T.MOD_HW_SERVER: 1
|
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.CLIENTS: 4
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.TOKEN: 4
- O:
- O.BANNER: 6
- O.MGMT: 7
- O.PASSWORD: 7
- OE:
- OE.AUTH: 6
- OE.BANNER: 7
- OE.PASSWORD: 6
- OE.SECURE_CHANNE: 1
- OE.SECURE_CHANNEL: 6
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 3
- FIPS 140-1: 1
- FIPS 140-2: 3
- FIPS 186-2: 1
- FIPS140: 10
- FIPS140-1: 2
- FIPS140-2: 2
- RFC:
- RFC 2246: 3
- RFC 2412: 1
- RFC 2451: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-: 1
- out of scope: 2
- the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Version 1.0 Page 35 of 56 July 2005: 1
|
|
pdf_data/st_metadata |
- /CreationDate: 9:9 7/25/2005
- /Creator: Windows NT 4.0
- /Producer: GNU Ghostscript 7.05
- /Title: Untitled Document
- pdf_file_size_bytes: 328607
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
- /Author: k-fujii
- /Company: 株式会社日立製作所
- /CreationDate: D:20090608174647+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20090608174751+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20090608084535
- /Title: HiCommand Suite Common Component
- pdf_file_size_bytes: 559113
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |