name |
Fortinet FortiGate™ Next Generation Firewalls and FortiOS 5.2.7 CC Compliant Firmware |
Plateforme Java Card MultiApp V5.0.A version 5.0.A |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
FR |
status |
archived |
active |
not_valid_after |
03.10.2021 |
08.04.2027 |
not_valid_before |
03.10.2016 |
08.04.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CertificateFortinetCCRA_SOGIS.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_10.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20FortiGate.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_10fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Fortinet%20FortiGate_EAL4_ST_V1.5.pdf(320893)_TMP.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_10en.pdf |
manufacturer |
Fortinet, Inc. |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.fortinet.com/ |
https://www.thalesgroup.com/en/europe/france |
security_level |
EAL4, ALC_FLR.3 |
EAL6+, ALC_FLR.1 |
dgst |
90d3f2a7644280bf |
217b91b3b8ce1ef5 |
heuristics/cert_id |
CSEC2015004 |
ANSSI-CC-2022/10 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
5.2.7 |
5.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2022/22, ANSSI-CC-2022/11, ANSSI-CC-2022/52, ANSSI-CC-2022/13, ANSSI-CC-2022/12 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2021/42, BSI-DSZ-CC-1107-V2-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2022/22, ANSSI-CC-2022/12, ANSSI-CC-2022/55, ANSSI-CC-2022/11, ANSSI-CC-2022/54, ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/52, ANSSI-CC-2022/13 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, BSI-DSZ-CC-1107-V2-2021 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/protection_profiles |
{} |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
CertificateFortinetCCRA_SOGIS.pdf |
certificat-anssi-cc-2022_10.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20161003132402+02'00'
- /ModDate: D:20230313131145+01'00'
- pdf_file_size_bytes: 1479429
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: ANSSI
- /CreationDate: D:20220425145856+02'00'
- /Creator: Microsoft® Word 2019
- /Keywords: version 3.1, révision 5
- /ModDate: D:20220425145856+02'00'
- /Producer: Microsoft® Word 2019
- /Title: ANSSI-CC-2022/10
- pdf_file_size_bytes: 304678
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
Certification Report FortiGate.pdf |
anssi-cc-2022_10fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- FR:
- ANSSI-CC-2021/42: 2
- ANSSI-CC-2022/10: 19
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL2: 2
- EAL6+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.LOCATE: 1
- A.MANAGE: 1
- A.SINGEN: 1
- T:
- T.ACCESS: 1
- T.AUDACC: 1
- T.COMDIS: 1
- T.MEDIAT: 1
- T.NOAUTH: 1
- T.NOHALT: 1
- T.PRIVIL: 1
- T.PROCOM: 1
- T.REPLAY: 1
- T.VIRUS: 1
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 1
- Thales:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 1
- AES-128: 1
- AES128: 1
- AES256: 1
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA2: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- PKCS:
- RFC:
- RFC 4109: 1
- RFC 4307: 1
- RFC 4346: 5
- RFC 4868: 2
- RFC 5246: 7
- RFC 5996: 1
- RFC4346: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: jyjoh
- /CreationDate: D:20161003102334Z
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20161003152458+02'00'
- /Producer: GPL Ghostscript 8.15
- /Title: Microsoft Word - FinalCertification Report FortiGate.doc
- pdf_file_size_bytes: 230084
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
|
pdf_data/st_filename |
Fortinet FortiGate_EAL4_ST_V1.5.pdf(320893)_TMP.pdf |
anssi-cible-cc-2022_10en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0099-V2-2020: 1
- BSI-PP-0055-: 1
- BSI-PP-0056-V2-MA-2012: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6+: 1
- EAL6: 31
- EAL6 augmented: 1
- EAL6+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 8
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 5
- ADV_IMP.1: 6
- ADV_IMP.2: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 7
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 7
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 6
- ATE_FUN.2: 1
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 13
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 10
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 48
- FDP_IFF.1: 62
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 9
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MSA.1: 50
- FMT_MSA.3: 27
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 22
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 60
- FCS_CKM.1: 29
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 1
- FCS_CKM.4: 28
- FCS_CKM.4.1: 2
- FCS_CMK.4: 2
- FCS_COP: 66
- FCS_COP.1: 31
- FCS_COP.1.1: 5
- FCS_RNG: 25
- FCS_RNG.1: 14
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 54
- FDP_ACC.1: 23
- FDP_ACC.2: 6
- FDP_ACF: 48
- FDP_ACF.1: 30
- FDP_IFC: 24
- FDP_IFC.1: 14
- FDP_IFC.2: 2
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 11
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 2
- FDP_RIP: 98
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 8
- FDP_SDI.2: 4
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 23
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 1
- FIA_API.1: 2
- FIA_ATD: 16
- FIA_ATD.1: 4
- FIA_UAU: 70
- FIA_UAU.1: 6
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 3
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 54
- FIA_UID.1: 21
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 38
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MSA: 113
- FMT_MSA.1: 15
- FMT_MSA.2: 2
- FMT_MSA.3: 24
- FMT_MTD: 57
- FMT_MTD.1: 13
- FMT_MTD.3: 1
- FMT_SMF: 85
- FMT_SMF.1: 31
- FMT_SMF.1.1: 2
- FMT_SMR: 98
- FMT_SMR.1: 42
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 56
- FPT_FLS.1: 17
- FPT_FLS.1.1: 2
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_RCV: 12
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 9
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 10
- FTP_TRP.1: 10
|
pdf_data/st_keywords/cc_claims |
- A:
- A.LOCATE: 3
- A.MANAGE: 2
- A.SINGEN: 3
- O:
- O.ACCESS: 13
- O.ADMIN: 7
- O.AUDIT: 11
- O.ENCRYP: 7
- O.IDAUTH: 20
- O.MEDIAT: 7
- O.PROTCT: 13
- O.REUSE: 5
- O.TIME: 9
- O.VIRUS: 5
- OE:
- OE.ADMIN: 6
- OE.PHYCAL: 4
- OE.SINGEN: 3
- T:
- T.ACCESS: 3
- T.AUDACC: 2
- T.COMDIS: 3
- T.MEDIAT: 2
- T.NOAUTH: 3
- T.NOHALT: 2
- T.PRIVIL: 3
- T.PROCOM: 2
- T.REPLAY: 3
- T.VIRUS: 2
|
- A:
- A.CAP_FILE: 3
- A.DELETION: 3
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- A.VERIFICATION: 3
- D:
- D.AAS_ID: 1
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.APP_KEYS: 1
- D.CRYPTO: 5
- D.JCS_CODE: 6
- D.JCS_DATA: 8
- D.OS-: 1
- D.OS-UPDATE-CODE-ID: 3
- D.OS-UPDATE_ADDITIONALCODE: 5
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.ARRAY_VIEWS_CONFID: 7
- O.ARRAY_VIEWS_INTEG: 3
- O.CARD-MANAGEMENT: 5
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 10
- O.CODE_CAP_FILE: 23
- O.CONFID-OS-UPDATE: 4
- O.DELETION: 4
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 9
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 8
- O.JAVAOBJECT: 68
- O.KEY-MNGT: 6
- O.LOAD: 11
- O.NATIVE: 12
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 4
- O.OPERATE: 15
- O.PIN-MNGT: 6
- O.PIN_MNGT: 4
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 2
- O.RNG: 11
- O.SCP: 37
- O.SECURE_AC_ACTIVATION: 10
- O.SECURE_LOAD_ACODE: 14
- O.SID: 13
- O.TDES: 1
- O.TOE_IDENTIFICATION: 7
- O.TRANSACTION: 6
- OE:
- OE.CAP_FILE: 5
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 2
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 10
- OE.NATIVE: 1
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 2
- OE.SCP: 8
- OE.SECURE_ACODE_MANAGEMENT: 2
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 7
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 11
- OP.DELETE_APPLET: 6
- OP.DELETE_CAP_FILE: 4
- OP.DELETE_CAP_FILE_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 8
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 6
- OSP.RNG: 3
- OSP.TOE_IDENTIFICATION: 6
- OSP.VERIFICATION: 3
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFID-OS-UPDATE_LOAD: 3
- T.CONFID_INTEG_SERVICE_DEPLOYEMENT: 3
- T.DELETION: 3
- T.EXE-CODE: 6
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 3
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 6
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 6
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
- T.WRONG_SERVICE_DEPLOYEMENT_STATE: 3
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 8
- AES-128: 1
- AES128: 1
- AES256: 1
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 14
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA2: 1
- SHA224: 1
- SHA3:
- SHA3: 2
- SHA3-384: 1
- SHA3-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 6
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
- EF.SOD: 1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 186-3: 1
- FIPS PUB 140-2: 2
- FIPS PUB 180-3: 2
- FIPS PUB 197: 2
- FIPS PUB 198: 2
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS1: 1
- RFC:
- RFC 4109: 1
- RFC 4307: 1
- RFC 4346: 4
- RFC 4868: 2
- RFC 5246: 6
- RFC 5996: 1
- RFC4346: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 9
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5.0.A JCS platform Security Target ST Ref: 1
- Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5.0.A JCS: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 4
- the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
|
pdf_data/st_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: EWA-Canada
- /CC Version: 3.1 R4
- /CC date: September 2012
- /CEM Version: 3.1 R4
- /CEM date: September 2012
- /CR_Date: [dd month yyyy]
- /CR_Version: [x.x]
- /Client City: Ottawa
- /Client Country: Canada
- /Client Full Name: Fortinet, Incorporated
- /Client Postal Code: K2H 5Z6
- /Client Short Name: Fortinet
- /Client State: Ontario
- /Client Street: 1826 Robertson Road
- /Company: Microsoft
- /CreationDate: D:20160921101656-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer Long Name: Fortinet, Incorporated
- /Developer Short Name: Fortinet
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4+
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1xxx-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: [0.x]
- /ETPlan_date: [dd month yyyy]
- /ETProcRes_Date: [dd month yyyy]
- /ETProcRes_Doc#: 1xxx-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: [0.x]
- /ETProc_Date: [dd month yyyy]
- /ETProc_Doc#: 1593-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.x]
- /ETReport_Date: [dd month yyyy]
- /ETReport_Doc#: 1xxx-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: [0.x]
- /EWP_Date: [dd month yyyy]
- /EWP_Doc#: 1xxx-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: [0.x]
- /Eval number: [TBD]
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: [dd month yyyy (registration)]
- /ModDate: D:20161003152814+02'00'
- /Producer: Adobe PDF Library 10.0
- /ProjectNumber: 1905
- /ST_Date: 20 September 2016
- /ST_Doc#: 1918-002-D002
- /ST_Title: Fortinet FortiGate™ Unified Threate Management Solutions and FortiOS 5.2 CC Compliant Firmware Security Target
- /ST_Version: 1.5
- /SVR_Date: [dd month yyyy]
- /SVR_Doc#: 1593-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: [0.x]
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & Fortinet Proprietary
- /SourceModified: D:20160921141004
- /Sponsor: Fortinet, Incorporated
- /Sponsor City: Ottawa
- /Sponsor Country: Canada
- /Sponsor Postal Code: K2H 8G3
- /Sponsor State: Ontario
- /Sponsor Street: 326 Moodie Drive
- /TOE: Fortinet FortiGate™ Next Generation Firewalls and FortiOS 5.0 CC Compliant Firmware
- /TOE Short: FortiGate™
- /TOE Short with version: FortiGate™ v5.2
- /TOE Short-NoTM: FortiGate
- /TOE Version: v5.2
- /TOE with version: FortiGate™ v5.2
- /Title: Security Target
- pdf_file_size_bytes: 1077666
- pdf_hyperlinks: http://docs.fortinet.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 82
|
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |