name |
TightGate-Pro (CC) Version 1.4 |
Red Hat Enterprise Linux Version 5.6 Virtualization with KVM |
category |
Access Control Devices and Systems |
Operating Systems |
scheme |
DE |
DE |
status |
archived |
archived |
not_valid_after |
02.12.2020 |
01.09.2019 |
not_valid_before |
02.12.2015 |
20.04.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0589a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0724a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0589b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0724b_pdf.pdf |
manufacturer |
m-privacy GmbH |
Red Hat, Inc. |
manufacturer_web |
https://www.m-privacy.de |
https://www.redhat.com |
security_level |
EAL3+, ALC_FLR.3, ALC_CMS.4 |
EAL4+, ALC_FLR.3 |
dgst |
81092ca72bcac6f7 |
6d2b52efe729c040 |
heuristics/cert_id |
BSI-DSZ-CC-0589-2015 |
BSI-DSZ-CC-0724-2012 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2011-1593, CVE-2011-1182, CVE-2011-2022, CVE-2011-2213, CVE-2011-2492, CVE-2011-1746, CVE-2011-1745, CVE-2011-1093 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ASE_ECD.1, APE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ATE_IND.2, ADV_FSP.3, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.4 |
5.6 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
eb8ecfa4c35990cb |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0040b.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0589a_pdf.pdf |
0724a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ALC_CMS.4, ALC_FLR.3 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-0589-2015
- cert_item: TightGate-Pro (CC) Version 1.4
- cert_lab: BSI
- developer: m-privacy GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Remote-Controlled Browsers Systems (ReCoBS), Version 1.0, 26 February 2008, BSI-CC-PP-0040-2008
|
- DE:
- cert_id: BSI-DSZ-CC-0724-2012
- cert_item: Red Hat Enterprise Linux, Version 5.6 Virtualization with KVM
- cert_lab: BSI
- developer: Red Hat, Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 8
- EAL 3 augmented: 3
- EAL 4: 6
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- ITSEC:
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 5
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 1.0, Date 11.11.2015, Evaluation Technical Report – Summary, datenschutz cert GmbH, (confidential document) [8] Remote-Controlled Browsers Systems (ReCoBS), Version 1.0, 26 February 2008: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- gz” (confidential document). [11] Installation Handbook „TightGate-Pro, Dediziertes Remote-Controlled Browser System zum: 1
- list for the TOE, m-privacy GmbH, Date 24/07/2015, file: “parts_of_the_TOE_20150724.gz” (confidential document). [10] List of sourcefiles of the TOE, m-privacy GmbH, Date 20/07/2015, file: 1
|
- ConfidentialDocument:
- Report, Version 4, 2012-03-30, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] EAL4 Evaluated Configuration Guide for Red Hat Enterprise Linux with KVM support on IBM: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit ind er Informationstechnik
- /CreationDate: D:20151215082400+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, m-privacy TightGate-Pro(CC) Version 1.4, m-privacy GmbH, Remote-Controlled Browser-System (ReCoBS)"
- /ModDate: D:20151215083145+01'00'
- /Producer: LibreOffice 4.2
- /Title: Certification Report BSI-DSZ-CC-0589-2015
- pdf_file_size_bytes: 1067121
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://p.m-privacy.de/Dokumentation-TightGate-Pro-CC.zip.sig, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20120425080814+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Red Hat, Enterprise Linux, KVM"
- /ModDate: D:20120425092913+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Red Hat Enterprise Linux 5.6 KVM
- /Title: Certification Report BSI-DSZ-CC-0724
- pdf_file_size_bytes: 1220596
- pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
0589b_pdf.pdf |
0724b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 7
- EAL3 augmented: 3
- EAL3+: 1
|
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.4: 7
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 8
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.2: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 1
- FIA:
- FIA_SOS.1: 2
- FIA_UAU.2: 2
- FIA_UID.1: 3
- FIA_UID.2: 3
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 3
- FPT:
|
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 33
- FCS_CKM.1.1: 3
- FCS_CKM.2: 11
- FCS_CKM.2.1: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 15
- FCS_COP.1.1: 1
- FCS_RNG: 2
- FCS_RNG.1: 25
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 4
- FDP:
- FDP_ACC.1: 22
- FDP_ACC.1.1: 1
- FDP_ACC.2: 10
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 21
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 10
- FDP_IFC.2: 20
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 26
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 18
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 2
- FDP_ITC.2.3: 2
- FDP_ITC.2.4: 2
- FDP_ITC.2.5: 2
- FDP_RIP: 2
- FDP_RIP.2: 17
- FDP_RIP.2.1: 1
- FDP_RIP.3: 18
- FDP_RIP.3.1: 2
- FDP_TDC.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 20
- FIA_ATD.1.1: 2
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.2: 15
- FIA_USB.2.1: 2
- FIA_USB.2.2: 2
- FIA_USB.2.3: 2
- FIA_USB.2.4: 2
- FMT:
- FMT_MSA.1: 31
- FMT_MSA.1.1: 3
- FMT_MSA.3: 34
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MSA.4: 7
- FMT_MSA.4.1: 1
- FMT_MTD.1: 77
- FMT_MTD.1.1: 11
- FMT_REV.1: 16
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 28
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 19
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTA:
- FTA_SSL.1: 8
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 8
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.AUTHUSER: 3
- A.CONNECT: 4
- A.DETECT: 3
- A.MANAGE: 5
- A.PEER: 6
- A.PHYSICAL: 4
- A.TRAINEDUSER: 3
- O:
- O.AUDITING: 15
- O.COMP: 31
- O.CRYPTO: 16
- O.DISCRETIONARY: 9
- O.MANAGE: 24
- O.NETWORK: 13
- O.TRUSTED_CHANNEL: 5
- OE:
- OE.ADMIN: 5
- OE.INFO_PROTECT: 8
- OE.INSTALL: 4
- OE.MAINTENANCE: 2
- OE.PHYSICAL: 3
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.TRUSTED: 5
- T:
- T.ACCESS: 19
- T.COMM: 4
- T.IA: 6
- T.INFOFLOW: 4
- T.RESTRICT: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 140-2: 2
- FIPS 186-3: 1
- FIPS PUB 186-3: 4
- RFC:
- RFC 4252: 7
- RFC 4253: 10
- RFC 768: 1
- RFC 791: 2
- RFC 792: 1
- RFC 793: 1
- RFC4253: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
pdf_data/st_metadata |
- /CreationDate: D:20151123102500+01'00'
- /Creator: Writer
- /Producer: LibreOffice 4.2
- /Subject: Remote-Controlled Browser Systems Protection Profile (ReCoBS-PP)
- /Title: Security Target
- pdf_file_size_bytes: 918178
- pdf_hyperlinks: http://www.m-privacy.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |