name |
Secureworks V3.0 |
Data Security Kit(D) Software V1.00J |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
AU |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
31.01.2013 |
not_valid_before |
01.09.2003 |
31.10.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecureworksCR.pdf |
https://www.commoncriteriaportal.org/files/epfiles/c0056_ecvr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecureworksST.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ |
manufacturer |
Oullim Information Technology, Inc. |
KYOCERA MITA Corporation |
manufacturer_web |
https://www.oullim.co.kr/ |
|
security_level |
EAL3 |
EAL3 |
dgst |
8272a50e75769ddb |
28a5dbecb883b240 |
heuristics/cert_id |
Certificate Number: 2003/28 |
JISEC-CC-CRP-C0056 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
{} |
heuristics/extracted_versions |
3.0 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0056
- certification_date: 01.10.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0056_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-C2520/KM-C3225/KM-C3232" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
- evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
- product: Data Security Kit(D) Software
- product_type: IT Product (data protection function in digital Multi Function Device)
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2007-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0056_it5064_02.html'})]
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0056_it5064.html
- toe_japan_name: Data Security Kit(D) Software V1.00J
- toe_overseas_link: None
- toe_overseas_name: Data Security Kit(D) Software V2.10J
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
SecureworksCR.pdf |
c0056_ecvr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certificate Number: 2003/28: 1
|
- JP:
- Certification No. C0056: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_ARP: 1
- FAU_GEN: 2
- FAU_SAA: 1
- FAU_SAR: 2
- FAU_SEL: 1
- FAU_STG: 2
- FCS:
- FDP:
- FDP_IFC: 1
- FDP_IFF: 1
- FDP_RIP: 1
- FIA:
- FIA_AFL: 1
- FIA_ATD: 1
- FIA_UAU: 3
- FIA_UID: 1
- FMT:
- FMT_MOF: 1
- FMT_MSA: 2
- FMT_MTD: 2
- FMT_SMF: 1
- FMT_SMR: 1
- FPR:
- FPT:
- FPT_AMT: 1
- FPT_RVM: 1
- FPT_SEP: 1
- FPT_STM: 1
- FPT_TST: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: peter lilley
- /CreationDate: D:20031015095232+10'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20031015095249+10'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: AUSTRALASIAN INFORMATION SECURITY EVALUATION PROGRAM
- pdf_file_size_bytes: 476967
- pdf_hyperlinks: http://www.dsd.gov.au/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /CreationDate: D:20061102201015+09'00'
- /ModDate: D:20061102201015+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12181
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
SecureworksST.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP: 1
- ACM_CAP.3: 20
- ACM_SCP.1: 10
- ADO:
- ADO_DEL.1: 9
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.2: 18
- ADV_RCR.1: 8
- AGD:
- AGD_ADM.1: 14
- AGD_USR.1: 13
- ALC:
- ATE:
- ATE_COV.2: 10
- ATE_DPT.1: 9
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_MSU.1: 14
- AVA_SOF.1: 11
- AVA_VLA.1: 10
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_APR.1: 2
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 10
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG: 2
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP: 2
- FCS_COP.1: 18
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 48
- FDP_IFC.1.1: 4
- FDP_IFF: 2
- FDP_IFF.1: 55
- FDP_IFF.1.1: 5
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 4
- FDP_IFF.1.4: 7
- FDP_IFF.1.5: 4
- FDP_IFF.1.6: 5
- FDP_ITC.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 12
- FIA_ATD.1.1: 4
- FIA_SEL.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 18
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 26
- FMT_MOF.1.1: 2
- FMT_MSA.1: 65
- FMT_MSA.1.1: 6
- FMT_MSA.2: 2
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 18
- FMT_MTD.1.1: 2
- FMT_MTD.2: 11
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_PSE.1: 16
- FPR_PSE.1.1: 2
- FPR_PSE.1.2: 2
- FPR_PSE.1.3: 2
- FPR_RIP.1: 1
- FPT:
- FPT_AMT.1: 7
- FPT_AMT.1.1: 1
- FPT_RMV.1: 2
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 8
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 2
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DIRECT: 4
- A.GENPUR: 3
- A.LOWEXP: 3
- A.NOACC: 4
- A.NOEVIL: 2
- A.NOREMO: 3
- A.PHYSEC: 3
- A.PUBLIC: 2
- A.SINGEN: 3
- A.T: 1
- D:
- O:
- O.ACCOUN: 7
- O.ALARM: 6
- O.AUDREC: 9
- O.EAL: 4
- O.ENCRYP: 2
- O.IDAUTH: 12
- O.LIMEXT: 6
- O.MEDIAT: 20
- O.PRIVACY: 7
- O.SECFUN: 19
- O.SECSTA: 14
- O.SECSTRA: 2
- O.SELPRO: 11
- O.SINUSE: 6
- OE:
- OE.ADMTRA: 3
- OE.DIRECT: 4
- OE.GENPUR: 4
- OE.GUIDAN: 3
- OE.LOWEXP: 3
- OE.NOACC: 3
- OE.NOCAA: 1
- OE.NOEVIL: 3
- OE.NOREMO: 3
- OE.NOREMOTE: 1
- OE.PHYSEC: 3
- OE.PUBLIC: 3
- OE.REMACC: 2
- OE.SINGEN: 3
- T:
- T.ASPOOF: 2
- T.AUDACC: 7
- T.AUDFUL: 4
- T.LOWEXP: 2
- T.MEDIAT: 3
- T.NOAUTH: 7
- T.OLDINF: 1
- T.PRIVACY: 2
- T.PROCOM: 1
- T.REPEAT: 1
- T.REPLAY: 4
- T.SELPRO: 2
- T.TUSAGE: 2
- T.UNDETECT: 1
- T.UNDETECTED: 2
- T.USAGE: 4
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 140-1: 3
- FIPS PUB 180-1: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Since remote access control of administrator is optional functional requirement in the ALFPP and out of scope, the following assumption from ALFPP is not included in the ST. [Table 3-4] Omitted Assumptions: 1
- functionality and intend for it to be evaluated. The SECUREWORKS 3.0’s remote administration is an out of scope feature. However, the End Users’ remote authentication is a target of evaluation feature because: 1
- out of scope: 4
- this ST chose this component for hashing algorithms. However, this FCS_COP is also stated in the out of scope functions, because this ST omitted this component because the remote administration is an out of: 1
|
|
pdf_data/st_metadata |
- /Author: ???
- /CreationDate: D:20030918103724+10'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20030918103856+10'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- pdf_file_size_bytes: 2377266
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |