Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EMC Avamar® v7.2.1
383-4-347
Fidelis XPS
CCEVS-VR-VID-10449-2012
name EMC Avamar® v7.2.1 Fidelis XPS
category Other Devices and Systems Detection Devices and Systems
scheme CA US
not_valid_after 15.06.2021 01.11.2014
not_valid_before 15.06.2016 07.08.2012
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-347%20ct%20v1.0e.docx
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-347%20CR%20v1.0e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10449-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-347%20EMC%20Avamar%20ST%20v05.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10449-st.pdf
manufacturer EMC Corporation Fidelis Security Systems, Inc.
manufacturer_web https://www.emc.com/ https://www.fidelissecurity.com/
security_level EAL2+, ALC_FLR.2 EAL2+, ALC_FLR.3
dgst 8c6a7c47735fa8ce 14fad481adb43f88
heuristics/cert_id 383-4-347 CCEVS-VR-VID-10449-2012
heuristics/cert_lab [] US
heuristics/cpe_matches cpe:2.3:a:emc:avamar:7.2.1:*:*:*:*:*:*:*, cpe:2.3:a:emc:avamar_server:7.2.1-31:*:*:*:*:*:*:*, cpe:2.3:a:emc:avamar_server:7.2.1-32:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2016-0920, CVE-2016-0906, CVE-2016-0904, CVE-2017-4989, CVE-2016-0903, CVE-2016-0905, CVE-2016-0921 {}
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1
heuristics/extracted_versions 7.2.1 -
heuristics/scheme_data
  • category: Wireless Monitoring
  • certification_date: 07.08.2012
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10449
  • product: Fidelis XPS
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10449
  • vendor: Fidelis Cybersecurity Inc.
pdf_data/cert_filename 383-4-347 ct v1.0e.docx
pdf_data/report_filename 383-4-347 CR v1.0e.pdf st_vid10449-vr.pdf
pdf_data/report_frontpage
  • US:
  • CA:
  • US:
    • cert_id: CCEVS-VR-VID10449-2012
    • cert_item: For Fidelis XPS
    • cert_lab: US NIAP
  • CA:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10449-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2+: 2
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL2: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ASCOPE: 1
    • A.DYNMIC: 1
    • A.LOCATE: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.NOTRST: 1
    • A.PROTCT: 1
  • T:
    • T.COMDIS: 1
    • T.COMINT: 1
    • T.FACCNT: 1
    • T.FALACT: 1
    • T.FALASC: 1
    • T.FALREC: 1
    • T.IMPCON: 1
    • T.INADVE: 1
    • T.INFLUX: 1
    • T.LOSSOF: 1
    • T.MISACT: 1
    • T.MISUSE: 1
    • T.NOHALT: 1
    • T.PRIVIL: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /Author: White, Debra E.
  • /CreationDate: D:20160622085927-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160622085927-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 383-4-XXX CR v0.1
  • pdf_file_size_bytes: 499594
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: Jerry Mancini
  • /CreationDate: D:20120907122419
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20120907122419
  • /Producer: Microsoft® Office Word 2007
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 261561
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename 383-4-347 EMC Avamar ST v05.pdf st_vid10449-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2+: 5
    • EAL2+: 1
  • EAL:
    • EAL 2: 5
    • EAL 2 augmented: 5
    • EAL2: 1
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 14
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 18
    • ADV_TDS: 1
    • ADV_TDS.1: 17
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 15
    • AGD_PRE: 1
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 9
    • ALC_CMS: 1
    • ALC_CMS.2: 7
    • ALC_DEL: 1
    • ALC_DEL.1: 6
    • ALC_FLR: 2
    • ALC_FLR.2: 2
    • ALC_FLR.3: 25
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 8
    • ATE_FUN: 1
    • ATE_FUN.1: 12
    • ATE_IND: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_BCK_EXT: 3
    • FDP_BCK_EXT.1: 8
    • FDP_BCK_EXT.1.1: 2
    • FDP_BCK_EXT.1.2: 2
    • FDP_BCK_EXT.1.3: 2
    • FDP_IFC.1: 4
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 10
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_SEL: 3
    • FAU_SEL.1: 4
    • FAU_SEL.1.1: 1
    • FAU_STG: 12
    • FAU_STG.1: 1
    • FAU_STG.2: 5
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 3
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU: 8
    • FIA_UAU.2: 4
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 4
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 5
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MTD: 6
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA.1: 1
    • FPT_ITC.1: 1
    • FPT_ITI.1: 1
    • FPT_ITT: 3
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_STM: 4
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL: 3
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.MANAGE: 4
    • A.NETWORK: 2
    • A.NOEVIL: 4
    • A.PROTCT: 2
  • O:
    • O.ACCESS: 14
    • O.AUDITS: 7
    • O.BACKUP: 7
    • O.EADMIN: 7
    • O.IDAUTH: 16
    • O.PROTCT: 7
    • O.TIME: 7
  • OE:
    • OE.CREDEN: 6
    • OE.INSTAL: 8
    • OE.NETWORK: 4
    • OE.PERSON: 7
    • OE.PHYCAL: 8
    • OE.TIME: 4
  • T:
    • T.IMPCON: 4
    • T.PRIVIL: 2
    • T.UNAUTH_ACCESS: 4
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 2
    • A.DYNMIC: 3
    • A.LOCATE: 2
    • A.MANAGE: 3
    • A.NOEVIL: 2
    • A.NOTRST: 3
    • A.PROTCT: 2
  • O:
    • O.ACCESS: 12
    • O.AUDITS: 9
    • O.AUDIT_PROTECTION: 5
    • O.AUDIT_SORT: 6
    • O.EADMIN: 6
    • O.EXPORT: 2
    • O.IDANLZ: 7
    • O.IDAUTH: 21
    • O.IDSCAN: 1
    • O.IDSEN: 1
    • O.IDSENS: 8
    • O.INTEGR: 7
    • O.OFLOWS: 5
    • O.PROTCT: 10
    • O.RESPON: 4
    • O.TIME: 7
  • OE:
    • OE.AUDIT_PROTECTION: 1
    • OE.AUDIT_SORT: 1
    • OE.CREDEN: 5
    • OE.INSTAL: 5
    • OE.INTROP: 5
    • OE.PERSON: 6
    • OE.PHYCAL: 7
    • OE.TIME: 1
  • T:
    • T.COMDIS: 3
    • T.COMINT: 2
    • T.FACCNT: 3
    • T.FALACT: 2
    • T.FALASC: 4
    • T.FALREC: 3
    • T.IMPCON: 4
    • T.INADVE: 2
    • T.INFLUX: 3
    • T.LOSSOF: 2
    • T.MISACT: 3
    • T.MISUSE: 2
    • T.NOHALT: 3
    • T.PRIVIL: 2
    • T.SCNCFG: 2
    • T.SCNMLC: 2
    • T.SCNVUL: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DHE: 2
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 6
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
    • Key exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 7
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 140-2: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • but can serve to effectively bypass some of those security functions. As a result, the IMM is out of scope of the evaluated configuration and its available connections should not be used (i.e., connected: 1
    • in the underlying Linux can log directly into an appliance. This interface is generally considered out of scope of the evaluation since it is intended to be used for installation and setup purposes and not for: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: tmacarthur
  • /CreationDate: D:20160615104638-04'00'
  • /Creator: PDFCreator Version 1.1.0
  • /Keywords:
  • /ModDate: D:20160615104638-04'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: EMC Avamar ST v05
  • pdf_file_size_bytes: 657594
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Author: SAIC
  • /CreationDate: D:20120907110447
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20120907110447
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: Fidelis XPS Security Target
  • pdf_file_size_bytes: 1129377
  • pdf_hyperlinks: http://www.pcre.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/cert/convert_garbage True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different