Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Black Box Secure KM Switch (CAC Models)
CCEVS-VR-11242-2021
Microsoft SQL Server 2019 Database Engine Enterprise Edition x64 (English), version 15.0.4033.1
2019-44-INF-3227
name Black Box Secure KM Switch (CAC Models) Microsoft SQL Server 2019 Database Engine Enterprise Edition x64 (English), version 15.0.4033.1
category Other Devices and Systems Databases
scheme US ES
not_valid_after 10.12.2026 17.10.2025
not_valid_before 10.12.2021 17.10.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11242-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-44_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11242-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-44-INF-3227.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11242-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-44-ST.pdf
manufacturer Black Box, Inc. Microsoft Corporation
manufacturer_web https://www.blackbox.com https://www.microsoft.com
security_level {} EAL2+, ALC_FLR.2
dgst 7e1ccba3850ecddc d58435cea411a495
heuristics/cert_id CCEVS-VR-11242-2021 2019-44-INF-3227
heuristics/cert_lab US []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 15.0.4033.1
heuristics/scheme_data
  • category: Database management systems
  • certification_date: 17.10.2020
  • enhanced:
  • manufacturer: Microsoft Corp.
  • product: Microsoft SQL Server 2019 Database Engine Enterprise Edition x64 (English), version 15.0.4033.1
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/604-microsoft-sql-server-2019-database-engine-enterprise-edition-x64-english-version-15-0-4033-1
heuristics/protection_profiles 48f73a122587b992, 814f66c77bc7f33b, 9d5c0dd877473e05, 76f8f05a35d87f59 c0b2fe8891b23088, 69ad074e832ce078
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ao_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088V2b_EP_AH_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088V2b_pdf.pdf
pdf_data/cert_filename st_vid11242-ci.pdf 2019-44_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11242-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL2: 1
    • EAL2+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • DEKRA:
    • DEKRA Testing and Certification: 1
pdf_data/cert_metadata
  • /CreationDate: D:20211214171613-05'00'
  • /ModDate: D:20211214171613-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181464
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 762070
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11242-vr.pdf 2019-44-INF-3227.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-11242-2021
    • cert_item: for Black Box Secure KM Switch (CAC Models
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11242-2021: 1
  • ES:
    • 2019-44-INF-3227-v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 8
    • EAL2+: 6
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_ADD: 6
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
    • ALC_FLR.2: 9
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_PHP.3: 1
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SEL.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_TRC.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_TSE.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 5
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 3
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 12
  • DEKRA:
    • DEKRA Testing and Certification: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/report_metadata
pdf_data/st_filename st_vid11242-st.pdf 2019-44-ST.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 68
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_ADD: 7
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_AFL_EXT.1: 4
    • FDP_AFL_EXT.1.1: 1
    • FDP_APC_EXT: 8
    • FDP_APC_EXT.1: 14
    • FDP_FIL_EXT: 6
    • FDP_FIL_EXT.1: 6
    • FDP_PDC_EXT: 13
    • FDP_PDC_EXT.1: 8
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 7
    • FDP_PDC_EXT.3: 2
    • FDP_PDC_EXT.4: 3
    • FDP_PDC_EXT.4.1: 1
    • FDP_PUD_EXT.1: 3
    • FDP_PUD_EXT.1.1: 1
    • FDP_PWR_EXT.1: 3
    • FDP_PWR_EXT.1.1: 1
    • FDP_RDR_EXT.1: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 1
    • FDP_RIP_EXT.1: 5
    • FDP_RIP_EXT.1.1: 1
    • FDP_RIP_EXT.2: 5
    • FDP_RIP_EXT.2.1: 1
    • FDP_SWI_EXT.1: 5
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 6
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 3
    • FDP_SWI_EXT.3.1: 1
    • FDP_TER_EXT.1: 3
    • FDP_TER_EXT.1.1: 1
    • FDP_TER_EXT.2: 3
    • FDP_TER_EXT.2.1: 1
    • FDP_TER_EXT.3: 3
    • FDP_TER_EXT.3.1: 1
    • FDP_TER_EXT.3.2: 1
    • FDP_UAI_EXT.1: 3
    • FDP_UAI_EXT.1.1: 1
    • FDP_UDF_EXT: 7
    • FDP_UDF_EXT.1: 2
  • FIA:
    • FIA_UAU.2: 4
    • FIA_UAU.2.1: 1
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 4
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 3
    • FPT_FLS_EXT.1: 6
    • FPT_FLS_EXT.1.1: 1
    • FPT_NTA_EXT.1: 3
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 4
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 16
    • FIA_ATD.1.1: 3
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 12
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 7
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_MICROPHONES: 1
    • A.NO_TEMPEST: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_USAGE: 3
    • O.COMPUTER_INTERFACE_I: 2
    • O.COMPUTER_INTERFACE_ISOLATION: 3
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 3
    • O.COMPUTER_TO_AUDIO_IS: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.EMULATED_INPUT: 2
    • O.LEAK_PREVENTION_SWIT: 1
    • O.LEAK_PREVENTION_SWITCHING: 1
    • O.NO_OTHER_EXTERNAL_IN: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER_DATA_RETENTI: 1
    • O.NO_USER_DATA_RETENTION: 3
    • O.PERIPHERAL_PORTS_ISOL: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 3
    • O.REJECT_UNAUTHORIZED_: 2
    • O.REJECT_UNAUTHORIZED_ENDPOINTS: 3
    • O.REJECT_UNAUTHORIZED_PERIPHERAL: 4
    • O.SELF_TEST: 5
    • O.SELF_TEST_FAIL_INDICAT: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DIS: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 4
    • O.SESSION_TERMINATION: 2
    • O.TAMPER_EVIDENT_LABE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_INPUT: 2
    • O.USER_AUTHENTICATION_: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_DATA_ISOLATION: 4
  • OE:
    • OE.NO_MICROPHONES: 1
    • OE.NO_TEMPEST: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 4
    • A.MANAGE: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
    • A.SUPPORT: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.ACCESS_HISTORY: 11
    • O.ADMIN_ROLE: 8
    • O.AUDIT_GENERATI: 1
    • O.AUDIT_GENERATION: 6
    • O.DISCRETIONARY_: 1
    • O.DISCRETIONARY_ACCESS: 5
    • O.MANAGE: 11
    • O.MEDIATE: 8
    • O.RESIDUAL_INFOR: 1
    • O.RESIDUAL_INFORMATION: 8
    • O.TOE_ACCESS: 18
  • OE:
    • OE.ADMIN: 12
    • OE.INFO_PROTECT: 19
    • OE.IT_REMOTE: 10
    • OE.IT_TRUSTED_SYSTEM: 9
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 6
    • OE.PHYSICAL: 8
  • T:
    • T.ACCESS_TSFDATA: 3
    • T.ACCESS_TSFFUNC: 3
    • T.IA_MASQUERADE: 4
    • T.IA_USER: 3
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 4
    • T.UNAUTHORIZED_ACCESS: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 21
    • Microsoft Corporation: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_metadata
  • /Author: John Hickey, BLACK BOX
  • /CreationDate: D:20211214170755-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20211214170755-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Unrestricted
  • /Title: PP 3.0 Secure KVM Security Target
  • pdf_file_size_bytes: 681231
  • pdf_hyperlinks: https://www.blackbox.com/NIAP4/documentation
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different