Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Varonis Data Security Platform 8.6
CCEVS-VR-11100-2020
ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
BSI-DSZ-CC-0623-V3-2024
name Varonis Data Security Platform 8.6 ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
scheme US DE
status archived active
not_valid_after 09.12.2022 07.05.2029
not_valid_before 09.12.2020 08.05.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11100-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11100-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11100-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V3b_pdf.pdf
manufacturer Varonis ZEMO GmbH
manufacturer_web https://varonis.com https://zemo.de
security_level {} EAL3+, ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, ADV_TDS.3
dgst 8f950717e5915159 d648123b397e3e21
heuristics/cert_id CCEVS-VR-11100-2020 BSI-DSZ-CC-0623-V3-2024
heuristics/cert_lab US BSI
heuristics/extracted_sars AGD_PRE.1, ALC_CMC.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, ALC_TSU_EXT.1, ADV_FSP.1 ALC_LCD.1, ADV_TDS.3, ALC_CMS.3, ALC_TAT.1, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMC.3, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1
heuristics/extracted_versions 8.6 2.0.0, 3.2.0
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11100/
  • categories: ['Application Software']
  • category: Application Software
  • certification_date: 09.12.2020
  • evaluation_facility: Acumen Security
  • expiration_date: 09.12.2022
  • id: CCEVS-VR-VID11100
  • product: Varonis Data Security Platform 8.6
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11100
  • vendor: Varonis Systems, Inc.
heuristics/protection_profiles a1cc4a4e079f4d1f 854be21fba7a106c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf
pdf_data/cert_filename st_vid11100-ci.pdf 0623V3c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11100-2020: 1
  • DE:
    • BSI-DSZ-CC-0623-V3-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20201215162301-05'00'
  • /ModDate: D:20201215162301-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180020
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015"
  • /Subject: Common Criteria, Certification, Zertifizierung, Mobile Card Terminal for the German Healthcare System (MobCT), BSI-CC-PP-0052-2015
  • /Title: Certification Report BSI-DSZ-CC-0623-V3-2024
  • pdf_file_size_bytes: 232618
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11100-vr.pdf 0623V3a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-11100-2020
    • cert_item: for the Varonis Data Security Platform 8.6
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.5 valid until: 7 May 2029
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0623-V3-2024
    • cert_item: ZEMO VML-GK2 HW V2.0.0 / FW V3.2.0
    • cert_lab: BSI
    • developer: ZEMO GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11100-2020: 1
  • DE:
    • BSI-DSZ-CC-0623-V3-2024: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL 4: 4
    • EAL3+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_FLR: 3
    • ALC_TAT.1: 4
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 3
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • OE:
    • OE.ENVIRONMENT: 1
    • OE.MEDIC: 1
    • OE.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 6
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 1
    • HPC:
      • HPC: 4
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-3072: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
  • BSI:
    • AIS 32: 1
    • AIS 38: 1
  • FIPS:
    • FIPS180-4: 1
    • FIPS197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC6234: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1170, 2024-03-21; SVN Liste aller entwicklungsrelevanten Dokumente, Version 809, 2024-03-22, (confidential documents) [11] Guidance documentation for the TOE, Version 2.2.0, 2023-11-24, Bedienungsanleitung: 1
    • Report, Version 3, 2024-03-25, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20201215161934-05'00'
  • /ModDate: D:20201215161934-05'00'
  • pdf_file_size_bytes: 540899
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename st_vid11100-st.pdf 0623V3b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0032: 1
    • BSI-CC-PP-0052: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 3
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.3: 5
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 7
    • FCS_CKM_EXT.1: 5
    • FCS_CKM_EXT.1.1: 2
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 2
  • FDP:
    • FDP_DAR_EXT.1: 8
    • FDP_DAR_EXT.1.1: 2
    • FDP_DEC_EXT.1: 6
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT.1: 6
    • FDP_NET_EXT.1.1: 2
  • FMT:
    • FMT_CFG_EXT.1: 7
    • FMT_CFG_EXT.1.1: 2
    • FMT_CFG_EXT.1.2: 2
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 2
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
  • FPR:
    • FPR_ANO_EXT.1: 8
  • FPT:
    • FPT_AEX_EXT.1: 7
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 2
    • FPT_AEX_EXT.1.3: 3
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 2
    • FPT_API_EXT.1: 5
    • FPT_API_EXT.1.1: 2
    • FPT_IDV_EXT.1: 5
    • FPT_IDV_EXT.1.1: 3
    • FPT_LIB_EXT.1: 5
    • FPT_LIB_EXT.1.1: 3
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 3
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 2
    • FPT_TUD_EXT.1.5: 3
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTP:
    • FTP_DIT_EXT.1: 7
    • FTP_DIT_EXT.1.1: 4
    • FTP_TUD_EXT.2: 1
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 31
    • FCS_COP.1: 5
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 25
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 5
    • FDP_IFC: 41
    • FDP_IFC.1: 11
    • FDP_IFF: 45
    • FDP_IFF.1: 25
    • FDP_ITC.1: 21
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 9
    • FDP_RIP: 15
    • FDP_RIP.1: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SVR: 2
    • FDP_SVR.1: 12
    • FDP_SVR.1.1: 5
    • FDP_SVR.1.2: 3
    • FDP_SVR.1.3: 3
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 2
    • FTA_SSL.4: 10
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.ADMIN: 3
    • A.CARDS: 4
    • A.DEVELOPER: 1
    • A.DMS: 3
    • A.ENVIRONMEN: 1
    • A.ENVIRONMENT: 2
    • A.MEDIC: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUTH_STATE: 9
    • O.DMS_CONNECT: 1
    • O.DMS_CONNECTION: 5
    • O.LOG_CARDS: 3
    • O.LOG_DATA: 6
    • O.MANAGEMENT: 9
    • O.PIN: 7
    • O.PROTECTION: 8
    • O.RESIDUAL: 6
    • O.SEALING: 3
    • O.SELFTESTS: 6
    • O.TIME: 6
    • O.TRANSFER: 3
  • OE:
    • OE.ADMIN: 9
    • OE.CARDS: 8
    • OE.DEVELOPER: 1
    • OE.DMS: 4
    • OE.ENVIRONMENT: 6
    • OE.MEDIC: 10
    • OE.PHYSICAL: 6
  • OSP:
    • OSP.DMS_CONN: 1
    • OSP.DMS_CONNE: 1
    • OSP.DMS_CONNECTION: 1
    • OSP.EMERGENC: 1
    • OSP.EMERGENCY_: 1
    • OSP.EMERGENCY_DATA: 1
    • OSP.LOG_CARD: 1
    • OSP.LOG_CARDS: 1
    • OSP.LOG_DATA: 3
    • OSP.SEALING: 3
    • OSP.SELFTESTS: 3
    • OSP.TIME: 3
    • OSP.TRANSFER: 3
  • T:
    • T.ACCESS: 3
    • T.ADMIN_PIN: 3
    • T.AUTH_STATE: 3
    • T.DATA: 3
    • T.FIRMWARE: 3
    • T.MAN_HW: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 44
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 5
      • AES-256: 1
    • HPC:
      • HPC: 14
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • TLS:
    • TLS:
      • TLS: 5
      • TLS 1.2: 2
  • VPN:
    • VPN: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • BouncyCastle:
    • BouncyCastle: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 2
  • RFC:
    • RFC 5246: 5
    • RFC 5288: 2
    • RFC 5289: 8
    • RFC 8017: 1
  • X509:
    • X.509: 5
  • FIPS:
    • FIPS 197: 1
  • X509:
    • X.509: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • done by an authorised card that is out of scope of this ST: 1
    • out of scope: 1
    • the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
pdf_data/st_metadata
  • /Author: Acumen Security, LLC.
  • /CreationDate: D:20201125090344-05'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20201125090344-05'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 680114
  • pdf_hyperlinks: https://www.varonis.com/support/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: Protection Profile, Mobile Card Terminal, Electronic Health Card
  • /Subject: Mobile Card Terminal, electronic Health Card
  • /Title: Common Criteria Protection Profile BSI-PP-0052
  • pdf_file_size_bytes: 461165
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different