name |
Symantec™ Control Compliance Suite v10.5.1 |
CA eHealth Network Performance Manager r6.1.2 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
CA |
US |
status |
archived |
archived |
not_valid_after |
15.05.2017 |
01.11.2014 |
not_valid_before |
16.09.2011 |
19.05.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/symantec-ccs-v1051-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10367-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/symantec-ccs-v1051-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10367-st.pdf |
manufacturer |
Symantec Corporation |
CA Technologies |
manufacturer_web |
https://www.symantec.com |
https://www.ca.com |
security_level |
EAL3+, ALC_FLR.2 |
EAL2 |
dgst |
8a4f10021c7b792e |
fb721dfc90adae4a |
heuristics/cert_id |
383-4-178 |
CCEVS-VR-VID-10367-2010 |
heuristics/cert_lab |
CANADA |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
10.5.1 |
6.1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Network Management
- certification_date: 19.05.2010
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10367
- product: CA eHealth Network Performance Manager r6.1.2
- scheme: US
- url: https://www.niap-ccevs.org/product/10367
- vendor: CA Technologies
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
symantec-ccs-v1051-cert-eng.pdf |
st_vid10367-vr.pdf |
pdf_data/report_frontpage |
- US:
- CA:
- cert_id: 383-4-178-CR
- cert_lab: CANADA
|
- US:
- cert_id: CCEVS-VR-VID10367-2010
- cert_item: CA eHealth Network Performance Manager 6.1.2
- cert_lab: US NIAP
- CA:
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-178: 1
- 383-4-178-CR: 1
|
- US:
- CCEVS-VR-VID10367-2010: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 6
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 7
- Cisco Systems, Inc: 1
- Microsoft:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-3: 1
- FIPS 197: 1
- ISO:
- PKCS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- Interface. The Reports Center is not needed for this functionality. This is untrusted because it is out of scope of the TSF and was such was not tested. Reports Scheduler – This is accessed through the Motif: 1
- out of scope: 4
- to fail over to backup systems in the event of a failure. This is untrusted because it is out of scope of the TSF and was such was not tested. VALIDATION REPORT CA eHealth 6.1.2 11 Disaster Recovery: 1
- to the standby system occurs, which then becomes the active system. This is untrusted because it is out of scope of the TSF and was such was not tested. 6.1.3 Not installed These components are not installed with: 1
- which is not included in the evaluated configuration. This is untrusted because it is out of scope of the TSF and was such was not tested. High Availability configuration – High availability (HA) is: 1
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1 Revision 3
- /CC date: July 2009
- /CEM Version: 3.1 Revision 3
- /CEM date: July 2009
- /CR_Date: 16 September 2011
- /CR_Version: 1.0
- /Client City: Mountain View
- /Client Country: USA
- /Client Full Name: Symantec Corporation
- /Client Postal Code: 94043
- /Client Short Name: Symantec
- /Client State: California
- /Client Street: 350 Ellis Street
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Microsoft
- /CreationDate: D:20110919131233-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: Symantec Corporation
- /Developer Short Name: Symantec
- /EAL Level: 3+
- /EAL Level Base: 3
- /EAL Level Text: 3 augmented
- /EAL Long: EAL 3 Augmented
- /EAL Short: EAL 3+
- /ER Document Date: 21 September 2010
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1693-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 0.1
- /ETPlan_date: TBD
- /ETProcRes_Date: TBD
- /ETProcRes_Doc#: 1693-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 0.1
- /ETProc_Date: TBD
- /ETProc_Doc#: 1693-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: 0.1
- /ETReport_Date: 26 August 2011
- /ETReport_Doc#: 1693-000-D002
- /ETReport_Title: Preliminary Evaluation Technical Report
- /ETReport_TitleShort: PETR
- /ETReport_Version: 0.4
- /EWP_Date: 10 November 2010
- /EWP_Doc#: 1693-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-178
- /Eval_End_Date: 1 October 2011
- /Eval_Start_Date: 1 October 2010
- /LeadEvaluator: Kim Frawley-Braun
- /LeadEvaluatorInitials: KB
- /ModDate: D:20110926132427-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1693
- /ST_Date: 25 August, 2011
- /ST_Title: Symantec™ Control Compliance Suite v10.5.1 Security Target
- /ST_Version: 0.19
- /SVC_Date: TBD
- /SVC_Doc#: 1693-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 0.1
- /SVR_Date: TBD
- /SVR_Doc#: 1693-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Mountain View
- /Security Classification: EWA-Canada & Symantec Proprietary
- /SourceModified: D:20110919171209
- /Sponsor: Symantec
- /Sponsor City: California
- /Sponsor Country: USA
- /Sponsor Postal Code: 94043
- /Sponsor State: Mountain View
- /Sponsor Street: 350 Ellis Street
- /TOE: Symantec™ Control Compliance Suite v10.5.1
- /TOE Short: Symantec™ CCS v10.5.1
- /TOE Short with version: Symantec™ CCS v10.5.1
- /TOE Short-NoTM: Symantec CCS v10.5.1
- /TOE Version: v10.5.1
- /TOE with version: Symantec™ Control Compliance Suite v10.5.1
- /TOE-NoTM: Symantec Control Compliance Suite v10.5.1
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 101299
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
|
pdf_data/st_filename |
symantec-ccs-v1051-sec-eng.pdf |
st_vid10367-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL3: 3
- EAL3 augmented: 1
- EAL3+: 3
|
- EAL:
- EAL2: 6
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 5
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.2: 13
- ADV_TDS.1: 13
- AGD:
- AGD_OPE.1: 16
- AGD_PRE.1: 12
- ALC:
- ALC_CMC.2: 10
- ALC_CMS.2: 8
- ALC_DEL.1: 11
- ASE:
- ASE_CCL.1: 13
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.2: 12
- ASE_REQ.2: 15
- ASE_SPD.1: 9
- ASE_TSS.2: 12
- ATE:
- ATE_COV.1: 6
- ATE_FUN.1: 10
- ATE_IND.2: 9
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FMT:
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_STM.1: 7
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_GEN_EXT: 2
- FAU_GEN_EXT.1: 66
- FAU_GEN_EXT.1.1: 5
- FAU_GEN_EXT.1.2: 5
- FAU_GEN_EXT.1.3: 1
- FAU_SAR: 3
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SAR_EXT: 1
- FAU_SAR_EXT.1: 13
- FAU_SAR_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 8
- FIA_UID.1: 4
- FIA_UID.2: 8
- FMT:
- FMT_MOF.1: 18
- FMT_MOF.1.1: 2
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 29
- FMT_MTD.1.1: 3
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHEN: 2
- A.MANAGE: 3
- A.NOEVIL: 2
- A.PROTECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 4
- O.ANALYZE: 4
- O.AUDIT: 4
- O.CERT: 4
- O.ROBUST: 4
- O.SAFEFAIL: 4
- O.SCAN: 4
- OE:
- OE.AUTHEN: 3
- OE.MANAGE: 6
- OE.PROTECT: 4
- OE.TIME: 3
- T:
- T.ACCOUNT: 2
- T.EXPLOIT: 2
- T.FALASC: 2
- T.SELPRO: 2
- T.SPOOF: 2
- T.TOEFAIL: 2
|
- A:
- A.ADMIN: 3
- A.CLIENT: 3
- A.LOCATE: 3
- A.NOEVIL: 3
- A.PASSWORD: 3
- A.PATCHES: 3
- A.PROTECT: 3
- O:
- O.ACCESS: 4
- O.AUDIT: 6
- O.CRYPTOGRAPHIC: 2
- O.CRYPTOGRAPHIC_FUNCTIO: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 2
- O.IDEN: 4
- O.MANAGE: 6
- O.MONITOR: 4
- O.ROBUST_ADMIN_GUIDANC: 1
- O.ROBUST_ADMIN_GUIDANCE: 5
- OE:
- OE.ADMIN: 5
- OE.CLIENT: 3
- OE.LOCATE: 3
- OE.NOEVIL: 3
- OE.PASSWORD: 3
- OE.PROTECT: 3
- T:
- T.ACCESS: 3
- T.ADMIN_ERRO: 1
- T.ADMIN_ERROR: 3
- T.AUDIT_COMP: 1
- T.AUDIT_COMPROMISE: 2
- T.CRYPTO_COM: 1
- T.CRYPTO_COMPROMISE: 1
- T.DOS: 2
- T.EAVESDROPPI: 1
- T.EAVESDROPPING: 2
- T.MASK: 4
- T.MODIFY: 3
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 8
- Cisco Systems, Inc: 1
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 12
- FIPS 180-2: 1
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS PUB 180-2: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Interface. The Reports Center is not needed for this functionality. This is untrusted because it is out of scope of the TSF and was such was not tested. Reports Scheduler – This is accessed through the Motif: 1
- out of scope: 4
- to fail over to backup systems in the event of a failure. This is untrusted because it is out of scope of the TSF and was such was not tested. Disaster Recovery configuration - An eHealth environment: 1
- to the standby system occurs, which then becomes the active system. This is untrusted because it is out of scope of the TSF and was such was not tested. 2.2.3 Not installed These components are not installed with: 1
- which is not included in the evaluated configuration. This is untrusted because it is out of scope of the TSF and was such was not tested. High Availability configuration – High availability (HA) is: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20100526203404
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20100526203404
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 898971
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 96
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |