name |
BAE Systems STOP™ 8.8.2 |
Huawei GaussDB 200 version 6.5.1 build e3690037 |
category |
Operating Systems |
Databases |
scheme |
CA |
ES |
status |
active |
active |
not_valid_after |
15.09.2028 |
22.03.2027 |
not_valid_before |
15.09.2023 |
22.03.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20CT%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20ST%20v0.24.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf |
manufacturer |
BAE Systems |
Huawei Technologies Co., Ltd. |
manufacturer_web |
https://www.baesystems.com |
https://www.huawei.com |
security_level |
{} |
EAL2+, ALC_FLR.2 |
dgst |
8a5ef8e5642a483d |
b91f3f25e268a1e0 |
heuristics/cert_id |
553-EWA |
2019-32-INF-3664 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.5:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2020-1811, CVE-2020-1790, CVE-2020-1853 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
8.8.2 |
6.5.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 15.09.2023
- level: PP_OS_V4.2.1
- product: BAE Systems STOP™ 8.8.2
- vendor: BAE Systems
|
- category: Database management systems
- certification_date: 22.03.2022
- enhanced:
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei GaussDB 200 version 6.5.1 build e3690037
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
e34797b67a3163c5 |
3f6ac99252bbf14e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf |
pdf_data/cert_filename |
553-EWA CT v1.0.pdf |
2019-32_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20230925152434-04'00'
- /Creator:
- /Keywords:
- /ModDate: D:20230925152502-05'00'
- /Producer: Foxit PDF Editor Printer Version 12.1.0.15345
- /Subject:
- /Title:
- pdf_file_size_bytes: 364620
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20220310164952+01'00'
- /ModDate: D:20220310164952+01'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 847729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
553-EWA CR v1.0.pdf |
2019-32-INF-3664.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 553-EWA
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 7
- EAL2+: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 1
- AGD_PRE: 4
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.2: 8
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_REV.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_TSE.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 14
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 3
- TLSv1.1: 1
- TLSv1.2: 2
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile and uses the software in: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
553-EWA ST v0.24.pdf |
2019-32-ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 1
- FCS_COP.1: 40
- FCS_COP.1.1: 4
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT.1: 9
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_STO_EXT.1: 7
- FCS_STO_EXT.1.1: 2
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FDP:
- FDP_ACF_EXT.1: 7
- FDP_ACF_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 7
- FMT_MOF_EXT.1.1: 2
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 4
- FPT:
- FPT_ACF_EXT.1: 7
- FPT_ACF_EXT.1.1: 2
- FPT_ACF_EXT.1.2: 2
- FPT_ASLR_EXT.1: 7
- FPT_ASLR_EXT.1.1: 2
- FPT_SBOP_EXT.1: 7
- FPT_SBOP_EXT.1.1: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FTP:
- FTP_ITC_EXT.1: 11
- FTP_ITC_EXT.1.1: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 2
- FAU_MTD.1: 2
- FAU_SEL.1: 10
- FAU_SEL.1.1: 2
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 2
- FDP_ACF.1: 17
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 2
- FIA:
- FIA_ATD.1: 16
- FIA_ATD.1.1: 2
- FIA_UAU.1: 9
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 15
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_REV.1: 15
- FMT_REV.1.1: 5
- FMT_REV.1.2: 3
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 21
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 11
- FPT_TRC.1.1: 2
- FPT_TRC.1.2: 2
- FTA:
- FTA_MCS.1: 9
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 4
- A.PROPER_: 2
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 2
- O:
- O.ACCOUNTABILITY: 9
- O.INTEGRITY: 7
- O.MANAGEMENT: 9
- O.PROTECTED_: 2
- O.PROTECTED_COMMS: 8
- O.PROTECTED_STORAGE: 4
- OE:
- OE.PLATFORM: 4
- OE.PROPER_ADMIN: 4
- OE.PROPER_USER: 4
- T:
- T.LIMITED_: 1
- T.LIMITED_PHYSICAL_ACCESS: 1
- T.LOCAL_: 1
- T.LOCAL_ATTACK: 2
- T.NETWORK_: 2
- T.NETWORK_ATTACK: 6
- T.NETWORK_EAVESDROP: 3
|
- A:
- A.AUTHUSER: 2
- A.CONNECT: 3
- A.MANAGE: 3
- A.NO_GENERA: 1
- A.NO_GENERAL_PURPOSE: 2
- A.PEER_FUNC: 1
- A.PHYSICAL: 3
- A.SUPPORT: 4
- A.TRAINEDUS: 1
- A.TRAINEDUSER: 1
- O:
- O.ADMIN_RO: 3
- O.ADMIN_ROL: 1
- O.ADMIN_ROLE: 7
- O.AUDIT: 2
- O.AUDIT_GE: 2
- O.AUDIT_GENERATION: 3
- O.DISCRETIO: 3
- O.DISCRETIONARY: 1
- O.DISCRETIONARY_ACCESS: 5
- O.MANAGE: 13
- O.MEDIATE: 9
- O.RESIDUAL: 2
- O.RESIDUAL_: 1
- O.RESIDUAL_I: 1
- O.RESIDUAL_INFORM: 1
- O.RESIDUAL_INFORMATION: 6
- O.TOE_ACCE: 8
- O.TOE_ACCES: 1
- O.TOE_ACCESS: 10
- OE:
- OE.ADMIN: 10
- OE.INFO: 5
- OE.INFO_PRO: 4
- OE.INFO_PROTECT: 11
- OE.IT_REMOT: 4
- OE.IT_REMOTE: 6
- OE.IT_TRUST: 4
- OE.IT_TRUSTED: 1
- OE.IT_TRUSTED_SYSTEM: 5
- OE.NO_GENE: 3
- OE.NO_GENERAL: 1
- OE.NO_GENERAL_PURPOSE: 4
- OE.PHYSICAL: 8
- T:
- T.ACCESS_TSF: 2
- T.ACCESS_TSFDATA: 2
- T.ACCESS_TSFFUNC: 1
- T.IA_MASQUE: 2
- T.IA_MASQUERADE: 2
- T.IA_USER: 2
- T.RESIDUAL_: 1
- T.RESIDUAL_DATA: 2
- T.TSF: 1
- T.TSF_COMPR: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHOR: 2
- T.UNAUTHORIZED_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 9
- Huawei Technologies Co: 87
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-128: 1
- AES-256: 1
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 2
- DHE: 1
- Diffie-Hellman: 5
- DSA:
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 5
- SHA-512: 4
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- PGP:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 38
- TLS 1.2: 2
- TLSv1.2: 1
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 10
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS PUB 186-4: 4
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-57: 2
- NIST SP 800-90A: 1
- RFC:
- RFC 3526: 2
- RFC 5246: 12
- RFC 5280: 5
- RFC 5288: 8
- RFC 5289: 24
- RFC 5759: 1
- RFC 6066: 2
- RFC 6125: 2
- RFC 6960: 2
- RFC 6961: 2
- RFC 8603: 2
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. Objectives: OE.PLATFORM The OS relies on being installed on trusted hardware: 1
- out of scope: 2
|
- OutOfScope:
- 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools: 1
- Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz: 1
- Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the: 1
- including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE: 1
- is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to: 1
- out of scope: 7
- provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a: 1
- this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE: 1
- with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are: 1
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |