| name |
FortiGate/FortiOS Version 6.2.7 |
Application CPS2ter v1.12, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 (Identification 01 12) |
| category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
CA |
FR |
| status |
active |
archived |
| not_valid_after |
14.01.2026 |
22.11.2024 |
| not_valid_before |
14.01.2022 |
22.11.2019 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/559-LSS%20CT%20v1.1.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/559-LSS%20CR%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_43fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/559-LSS%20ST%20v1.7.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_43en.pdf |
| manufacturer |
Fortinet, Inc. |
Idemia |
| manufacturer_web |
https://www.fortinet.com/ |
https://www.idemia.com |
| security_level |
{} |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
92cfd27953f92747 |
88bfcd1a293ded1c |
| heuristics/cert_id |
559-LSS |
ANSSI-CC-2019/43 |
| heuristics/cert_lab |
CANADA |
CEA |
| heuristics/cpe_matches |
cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2022-42474, CVE-2021-26092, CVE-2022-42472, CVE-2023-36639, CVE-2023-42789, CVE-2021-32600, CVE-2022-41329, CVE-2022-29054, CVE-2023-42790, CVE-2021-43206, CVE-2023-44247, CVE-2021-26103, CVE-2022-45861, CVE-2021-44170, CVE-2021-26110, CVE-2023-28002, CVE-2022-42475, CVE-2022-22305, CVE-2022-23438, CVE-2023-36641, CVE-2023-29175, CVE-2024-26008, CVE-2023-42785, CVE-2022-29055, CVE-2021-42755, CVE-2022-22302, CVE-2022-35843, CVE-2024-21762, CVE-2022-29053, CVE-2021-26108, CVE-2023-22639, CVE-2023-33305, CVE-2024-47569, CVE-2022-42476, CVE-2024-26011, CVE-2021-44168, CVE-2023-45586, CVE-2023-46715, CVE-2022-39948, CVE-2022-23442, CVE-2023-29182, CVE-2021-44171, CVE-2025-58413, CVE-2021-43081, CVE-2021-36169, CVE-2021-41032, CVE-2021-26109, CVE-2021-43072, CVE-2022-27491, CVE-2023-22641, CVE-2023-22640, CVE-2023-29183, CVE-2023-29178, CVE-2022-26122, CVE-2022-41328, CVE-2022-41335, CVE-2022-22306, CVE-2021-24018, CVE-2023-29181, CVE-2022-23439, CVE-2024-26010, CVE-2021-42757, CVE-2023-29180, CVE-2023-41677, CVE-2024-26009, CVE-2023-42786, CVE-2022-40680, CVE-2021-43074, CVE-2023-36640, CVE-2022-38378, CVE-2024-50571, CVE-2023-45583, CVE-2022-43953, CVE-2024-23110, CVE-2022-41330, CVE-2023-27997, CVE-2022-43947, CVE-2022-22299 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
6.2.7 |
8.2, 1.3, 1.12 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2019/34, ANSSI-CC-2019/36, ANSSI-CC-2019/35, ANSSI-CC-2019/28, ANSSI-CC-2019/33 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2019/34, ANSSI-CC-2019/33, ANSSI-CC-2019/36, ANSSI-CC-2017/49, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-2018, ANSSI-CC-2019/35, ANSSI-CC-2019/28, BSI-DSZ-CC-0973-V2-2016 |
| heuristics/scheme_data |
- certification_date: 14.01.2022
- level: CPP_ND_V2.2E w/ MOD_CPP_FW_v1.4e, MOD_VPNGW_v1.1,MOD_IPS_V1.0
- product: FortiGate/FortiOS Version 6.2.7
- vendor: Fortinet, Inc.
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2019/34, ANSSI-CC-2019/36, BSI-DSZ-CC-1059-2018, ANSSI-CC-2019/35, ANSSI-CC-2019/28, ANSSI-CC-2019/33 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2019/34, ANSSI-CC-2019/36, BSI-DSZ-CC-1059-2018, ANSSI-CC-2019/35, ANSSI-CC-2019/28, ANSSI-CC-2019/33 |
| heuristics/protection_profiles |
bde3d7587cf42e78, 89f2a255423f4a20, 6448a1802bb874d8 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
| pdf_data/cert_filename |
559-LSS CT v1.1.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20220119105838-05'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1640616
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
559-LSS CR v1.1.pdf |
anssi-cc-2019_43fr.pdf |
| pdf_data/report_frontpage |
- FR:
- CA:
- cert_id: 559-LSS
- cert_lab: CANADA
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2019/43
- cert_item: Application CPS2ter v1.12, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2
- cert_item_version: Identification 01 12
- cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
- CA:
|
| pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2019/28: 1
- ANSSI-CC-2019/33: 2
- ANSSI-CC-2019/34: 1
- ANSSI-CC-2019/35: 1
- ANSSI-CC-2019/36: 2
- ANSSI-CC-2019/43: 17
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Idemia:
- NXP:
- NXP: 8
- NXP Semiconductors: 2
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- SCP:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Clark, Cory P.
- /CreationDate: D:20220120072326-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220120072326-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 719060
- pdf_hyperlinks: https://fortiguard.com/, http://www.zerodayinitiative.com/advisories, https://www.openssl.org/news/vulnerabilities.html, https://docs.fortinet.com/vm, https://web.nvd.nist.gov/view/vuln/search, mailto:[email protected], http://nessus.org/plugins/index.php?view=search, https://www.securityfocus.com/, https://www.rapid7.com/db/vulnerabilities, https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/vmware-esxiadministration-guide/706376/about-fortigate-vm-on-vmware-esxi, https://www.exploit-db.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20191126151642+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.29
- /ModDate: D:20191126152730+01'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 705214
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
559-LSS ST v1.7.pdf |
anssi-cible-cc-2019_43en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-2019/28: 2
- ANSSI-CC-2019/33: 1
- ANSSI-CC-2019/34: 1
- ANSSI-CC-2019/35: 1
- ANSSI-CC-2019/36: 1
- NL:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 8
- EAL4 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 9
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 9
- AGD:
- AGD_OPE: 5
- AGD_OPE.1: 6
- AGD_PRE: 8
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 8
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 24
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_GEN_EXT: 2
- FAU_GEN_EXT.1: 6
- FAU_GEN_EXT.1.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 10
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 3
- FAU_STG_EXT.2: 4
- FAU_STG_EXT.2.1: 1
- FAU_STG_EXT.3: 5
- FAU_STG_EXT.4: 4
- FAU_STG_EXT.4.1: 1
- FAU_STG_EXT.5: 4
- FAU_STG_EXT.5.1: 1
- FCO:
- FCO_CPC_EXT: 2
- FCO_CPC_EXT.1: 6
- FCO_CPC_EXT.1.1: 2
- FCO_CPC_EXT.1.2: 2
- FCO_CPC_EXT.1.3: 2
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 16
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 68
- FCS_COP.1: 5
- FCS_NTP_EXT: 2
- FCS_NTP_EXT.1: 5
- FCS_NTP_EXT.1.1: 1
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.3: 1
- FCS_NTP_EXT.1.4: 2
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 24
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHC_EXT: 2
- FCS_SSHC_EXT.1: 5
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 9
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 9
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.1.4: 2
- FCS_TLSC_EXT.2: 8
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT: 4
- FCS_TLSS_EXT.1: 11
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.1.4: 2
- FCS_TLSS_EXT.2: 3
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FDP:
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT.1: 3
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 9
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 3
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF: 11
- FMT_MOF.1: 4
- FMT_MTD: 8
- FMT_MTD.1: 2
- FMT_SMF: 11
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS: 3
- FPT_FLS.1: 1
- FPT_ITT.1: 3
- FPT_PTD: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 2
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 7
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.3: 3
- FPT_TST_EXT.3.1: 1
- FPT_TST_EXT.3.2: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.2: 5
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 10
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 3
|
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 2
- FCS_CKM.4: 2
- FCS_COP: 21
- FCS_COP.1: 1
- FCS_RNG: 14
- FCS_RNG.1: 3
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 6
- FDP_ACF: 24
- FDP_ACF.1: 5
- FDP_ACF.1.4: 1
- FDP_DAU: 7
- FDP_DAU.1: 2
- FDP_ETC: 7
- FDP_ETC.1: 2
- FDP_IFC.1: 4
- FDP_ITC: 10
- FDP_ITC.1: 5
- FDP_ITC.2: 2
- FDP_SDI: 7
- FDP_SDI.2: 2
- FDP_UCT: 8
- FDP_UCT.1: 1
- FDP_UIT: 15
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 4
- FIA_ATD: 13
- FIA_ATD.1: 3
- FIA_UAU: 23
- FIA_UAU.1: 6
- FIA_UID: 18
- FIA_UID.1: 6
- FIA_USB: 14
- FIA_USB.1: 8
- FMT:
- FMT_MSA.3: 4
- FMT_SMF: 13
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FTP:
- FTP_ITC: 15
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_: 1
- A.CONNECTIONS: 2
- A.LIMITED_: 1
- A.NO_THRU_: 1
- A.PHYSICAL_: 1
- A.REGULAR_: 1
- A.RESIDUAL_: 1
- A.TRUSTED_: 1
- A.VS_CORRECT_: 1
- A.VS_ISOLATION: 1
- A.VS_REGULAR_: 1
- A.VS_TRUSTED_: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_: 1
- O.FAIL_SECURE: 1
- O.IPS_ANALYZE: 1
- O.IPS_REACT: 1
- O.PORT_FILTERING: 1
- O.RESIDUAL_: 1
- O.STATEFUL_TRAFFIC_: 1
- O.SYSTEM_MONITORING: 2
- O.TOE_ADMINISTRATION: 2
- OE:
- OE.ADMIN_: 1
- OE.CONNECTIONS: 2
- OE.NO_GENERAL_: 1
- OE.NO_THRU_: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- OE.VM_: 1
- T:
- T.DATA_INTEGRITY: 1
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_ACCESS: 2
- T.NETWORK_DISCLOSURE: 3
- T.NETWORK_DOS: 1
- T.NETWORK_MISUSE: 3
- T.PASSWORD_: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_: 2
- T.UNAUTHORIZED_: 1
- T.UNDETECTED_: 1
- T.UNTRUSTED_: 1
- T.UPDATE_: 1
- T.WEAK_: 2
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 29
- AES-: 1
- AES-128: 2
- constructions:
- MAC:
- HMAC: 10
- HMAC-SHA-256: 10
- HMAC-SHA-384: 7
- HMAC-SHA-512: 8
|
|
| pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 2
- Diffie-Hellman: 12
- RSA:
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 11
- SHA-384: 10
- SHA-512: 9
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 28
- IKEv1: 27
- IKEv2: 26
- IPsec:
- SSH:
- TLS:
- DTLS:
- DTLS: 38
- DTLS 1.0: 2
- DTLS 1.2: 2
- SSL:
- SSL: 9
- SSL 2.0: 3
- SSL 3.0: 3
- TLS:
- TLS: 107
- TLS 1.0: 3
- TLS 1.1: 6
- TLS 1.2: 5
- TLS1.1: 2
- TLS1.2: 2
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
- secp256r1: 7
- secp384r1: 3
- secp521r1: 4
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 3
- FIPS 186-4: 4
- FIPS PUB 186-4: 6
- ISO:
- ISO/IEC 10118-: 1
- ISO/IEC 14888-3: 2
- ISO/IEC 18031:2011: 4
- ISO/IEC 18031:2011 6: 1
- ISO/IEC 9796-2: 2
- ISO/IEC 9797-: 1
- PKCS:
- RFC:
- RFC 1305: 1
- RFC 2409: 2
- RFC 2460: 4
- RFC 2463: 2
- RFC 2818: 9
- RFC 2986: 2
- RFC 3268: 4
- RFC 3513: 2
- RFC 3526: 6
- RFC 3602: 9
- RFC 4106: 6
- RFC 4109: 2
- RFC 4251: 1
- RFC 4253: 3
- RFC 4301: 4
- RFC 4303: 2
- RFC 4304: 3
- RFC 4306: 2
- RFC 4346: 5
- RFC 4347: 2
- RFC 4443: 1
- RFC 4492: 8
- RFC 4868: 5
- RFC 4945: 3
- RFC 5077: 5
- RFC 5114: 2
- RFC 5246: 9
- RFC 5280: 9
- RFC 5282: 1
- RFC 5289: 8
- RFC 5735: 2
- RFC 5759: 1
- RFC 5905: 1
- RFC 5996: 5
- RFC 6125: 4
- RFC 6347: 2
- RFC 6960: 1
- RFC 768: 4
- RFC 791: 4
- RFC 7919: 2
- RFC 792: 3
- RFC 793: 4
- RFC4346: 1
- X509:
|
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 46-3: 3
- FIPS 81: 3
- FIPS PUB 46-3: 1
- NIST:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of t he TSF: 1
- 11 2.2.5 Out of scope features: 2
- Out of scope: 2
- security features overview For more information about CPS2ter security features see [SRS]. 2.2.5 Out of scope features Some features are put out of the evaluation scope and are therefore not part of t he TSF: 1
|
| pdf_data/st_metadata |
|
- /Author: clemecap
- /CreationDate: D:20191003170503+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20191003170503+02'00'
- /Producer: Microsoft® Word 2016
- /Title: Title
- pdf_file_size_bytes: 1051171
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |