name |
ZonePoint version 3.0, build 330 |
EnterpriseDB Postgres Plus Advanced Server 8.4 |
category |
Data Protection |
Databases |
scheme |
FR |
US |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.11.2014 |
not_valid_before |
22.04.2014 |
29.07.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rapport.%202014-36.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/PRIMX-ZonePoint%203.0%20Cible%20de%20sécurité%20(PX128371r9).pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-st.pdf |
manufacturer |
PrimX Technologies |
EnterpriseDB Corporation |
manufacturer_web |
https://www.primx.eu/en/index.aspx |
https://www.enterprisedb.com/ |
security_level |
EAL3+, AVA_VAN.3, ALC_FLR.3 |
EAL2+, ALC_FLR.2 |
dgst |
7f2507d1e1ff6907 |
711c094f140cc311 |
heuristics/cert_id |
ANSSI-CC-2014/36 |
CCEVS-VR-VID-10412-2011 |
heuristics/cert_lab |
AMOSSYS |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VAN.3, ALC_FLR.3 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
3.0 |
8.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: DBMS
- certification_date: 29.07.2011
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10412
- product: EnterpriseDB Postgres Plus Advanced Server 8.4
- scheme: US
- url: https://www.niap-ccevs.org/product/10412
- vendor: EnterpriseDB Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
110f0820b080edc2 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_DBMS_BR_V1.2.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
rapport. 2014-36.pdf |
st_vid10412-vr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 3 augmenté ALC_FLR.3, AVA_VAN.3
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/36
- cert_item: ZonePoint
- cert_item_version: version 3.0, build 330
- cert_lab: Amossys 4 bis allée du bâtiment, 35000 Rennes, France
- developer: Prim'X Technologies 10 place Charles Béraudier, 69428 Lyon Cedex 03, France Commanditaire Prim'X Technologies 10 place Charles Béraudier, 69428 Lyon Cedex 03, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
- US:
|
- FR:
- US:
- cert_id: CCEVS-VR-VID10412-2011
- cert_item: Postgres Plus Advanced Server v8.4
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10412-2011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL3+: 2
- EAL4: 2
- ITSEC:
|
- EAL:
- EAL 2: 3
- EAL 2 augmented: 2
- EAL2: 2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ALC:
- ATE:
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.OS_PP_VALIDATED: 1
- A.PHYSICAL: 1
- T:
- T.DENIAL_OF_SERVICE: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNIDENTIFIED_ACTIONS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- TOE within its Operational Environment. 5.2. Clarification of Scope Configuration Options that are Out of Scope: “Trust” authentication option (not in TOE) When the trust authentication option is specified: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: rapport. 2014-36
- pdf_file_size_bytes: 142163
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
|
pdf_data/st_filename |
|
st_vid10412-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 3
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 2
- ADV_FSP.2: 6
- ADV_TDS.1: 7
- AGD:
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 4
- ALC_DEL.1: 4
- ALC_FLR.2: 9
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 6
- ATE_IND.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 12
- FAU_GEN.1: 4
- FAU_GEN.2: 1
- FAU_SEL: 10
- FAU_SEL.1: 2
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF: 7
- FDP_ACF.1: 5
- FDP_ITC: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 14
- FIA_ATD.1.1: 1
- FIA_UAU.2: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 6
- FIA_UID.2: 1
- FIA_UID_EXT: 2
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 2
- FMT_MSA.3: 3
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_REV.1: 19
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 2
- FPT_ITT.1: 2
- FPT_OVR_EXT.1: 1
- FPT_STM.1: 2
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTA:
- FTA_MCS.1: 8
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 3
- A.NO_GENERAL_: 1
- A.NO_GENERAL_PURPOSE: 2
- A.OS_PP_VALIDA: 1
- A.OS_PP_VALIDATED: 2
- A.PHYSICAL: 3
- O:
- O.ACCESS_: 2
- O.ACCESS_HISTORY: 4
- O.ADMIN_: 3
- O.ADMIN_GUIDANCE: 11
- O.ADMIN_ROLE: 3
- O.AUDIT_: 4
- O.AUDIT_GENERATION: 4
- O.AUTH: 8
- O.AVAIL: 7
- O.CONFIGURATION_IDEN: 1
- O.CONFIGURATION_IDENTIFICATI: 4
- O.CONFIGURATION_IDENTIFICATION: 4
- O.DOCUMENTED_DESIGN: 9
- O.INTERNAL_: 2
- O.INTERNAL_TOE_DOMAINS: 4
- O.MANAGE: 15
- O.MEDIATE: 8
- O.PARTIAL_: 5
- O.PARTIAL_FUNCTIONAL_TEST: 6
- O.PARTIAL_SELF_PROTECTION: 6
- O.PROTCOMM: 7
- O.RESIDUAL_INFORMATIO: 1
- O.RESIDUAL_INFORMATION: 7
- O.TOE_ACCESS: 10
- O.VULNERABILITY_ANALY: 1
- O.VULNERABILITY_ANALYSIS: 9
- OE:
- OE.AUTH: 7
- OE.NO_EVIL: 4
- OE.NO_GENERAL_: 2
- OE.NO_GENERAL_PURPOSE: 2
- OE.OS_PP_VALIDATED: 5
- OE.PHYSICAL: 4
- OE.PROTCOMM: 8
- T:
- T.ACCIDENTAL_ADMIN_ERR: 1
- T.DENIAL_OF_SERVICE: 5
- T.MASQUERADE: 3
- T.POOR_DESIGN: 5
- T.POOR_IMPLEMENTATION: 3
- T.POOR_TEST: 3
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 7
- T.UNAUTHORIZED_ACCESS: 4
- T.UNIDENTIFIED_ACTIONS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- RFC:
- RFC 1321: 4
- RFC 1413: 2
- RFC 1964: 1
- RFC 2743: 1
- RFC 4510: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- PostGIS Spatial Extensions EDB*Plus Slony Replication PG Agent Update Monitor 1.4.7.2 Out of Scope The following components of the PPAS 8.4 product are not included in the TOE: Infinite Cache: 1
- Bouncer Procedural Language Debugger StackBuilder Plus 1.4.7.3 Configuration Options that are Out of Scope. 1.4.7.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is: 1
- Out of Scope: 2
- out of scope: 1
- platforms are included in the TOE. In addition, the following components in the IT environment are out of scope. Postgres Plus Advanced Server v8.4 Security Target 15 Authenticator servers, if configured : 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20110812120756
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110812120756
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1153309
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |