| name |
Microsoft Exchange Server 2007 Enterprise Edition (English), Version/Build 08.02.0176.002 |
Logiciel Mistral IPversion 2.0.84 |
| category |
Other Devices and Systems |
Boundary Protection Devices and Systems |
| scheme |
DE |
FR |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
22.12.2019 |
| not_valid_before |
16.11.2009 |
22.12.2014 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0436a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_91.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0436b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-2014-91_Cible-Lite.pdf |
| manufacturer |
Microsoft Corporation |
Thales Communications & Security |
| manufacturer_web |
https://www.microsoft.com |
https://www.thalescommuninc.com |
| security_level |
EAL4+ |
AVA_VAN.3, ALC_FLR.3, EAL3+ |
| dgst |
95badceef1b711cb |
b2414d8a803f52fb |
| heuristics/cert_id |
BSI-DSZ-CC-0436-2009 |
ANSSI-CC-2014/91 |
| heuristics/cert_lab |
BSI |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_MSU.2, ALC_FLR.3, ATE_FUN.1, ADV_RCR.1, ADV_LLD.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ADV_IMP.1, ALC_LCD.1, ADV_HLD.2, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ADV_SPM.1 |
ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
08.02.0176.002 |
2.0.84 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
0436a_pdf.pdf |
ANSSI-CC-2014_91.pdf |
| pdf_data/report_frontpage |
- FR:
- DE:
- cert_id: BSI-DSZ-CC-0436-2009
- cert_item: Microsoft Exchange Server 2007 Enterprise Edition (English) Version/Build 08.02.0176.002
- cert_lab: BSI
- developer: Microsoft Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 3
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL4 augmented: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.3: 4
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 17
- Microsoft Corporation: 5
|
|
| pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
- tuvit: 12
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 02.0176.002, EVALUATION TECHNICAL REPORT, Version 3, Date 2009-10-01, TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE: Exchange Server 2007 Common Criteria Evaluation, Configuration: 1
- Server, Version: 1.05, Date: 2009-09-28; including all document as referenced in chapter 3.2. (confidential documents) [9] Microsoft Exchange Server 2007 Enterprise Edition Common Criteria Evaluation – Guidance: 1
- OutOfScope:
- TOE in the certified version and configuration. The version of the help-file on the product DVD is out of scope of the certification. The TOE has to be installed and configured according to the Guidance Addendum: 1
- any client. The way external lists for filtering of messages are compiled and transferred is also out of scope of the evaluation. Some security functionality of the TOE environment, namely of the operating: 1
- out of scope: 2
|
|
| pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20091209111723+01'00'
- /Creator: Writer
- /Keywords: "Microsoft Exchange Server 2007 Enterprise Edition (English) Version/Build 08.02.0176.002, Microsoft Corporation, Common Criteria, Certification, Zertifzierung"
- /ModDate: D:20091218092509+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0436-2009
- pdf_file_size_bytes: 966828
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2014_91
- pdf_file_size_bytes: 790624
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
0436b_pdf.pdf |
CC-2014-91_Cible-Lite.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 9
- EAL4 augmented: 4
|
- EAL:
- EAL3: 4
- EAL3 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADD: 2
- AGD_ADM.1: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.3: 8
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 8
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_TDS.1: 2
- ADV_TDS.2: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.1: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_FLR.3: 7
- ALC_LCD.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_ACC: 26
- FDP_ACC.1: 13
- FDP_ACF: 21
- FDP_ACF.1: 16
- FDP_IFC: 45
- FDP_IFC.1: 17
- FDP_IFF: 43
- FDP_IFF.1: 35
- FIA:
- FIA_AFL: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.8: 30
- FIA_UID: 1
- FIA_UID.1: 3
- FIA_UID.2: 2
- FIA_UID.3: 34
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 95
- FMT_MSA.1: 14
- FMT_MSA.3: 22
- FMT_SMF.1: 32
- FMT_SMF.1.1: 1
- FMT_SMR.1: 22
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FRU:
|
- FAU:
- FAU_GEN: 9
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_GEN_EXT.3: 12
- FAU_GEN_EXT.3.1: 2
- FAU_SEG.1: 2
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT.1: 15
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.3: 12
- FAU_STG_EXT.3.1: 2
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 26
- FCS_CKM.3: 1
- FCS_CKM.4: 16
- FCS_CKM_EXT: 31
- FCS_CKM_EXT.4: 13
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.5: 17
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 86
- FCS_COP.1: 17
- FCS_IPS_EXT: 4
- FCS_IPS_EXT.1: 20
- FCS_IPS_EXT.1.1: 2
- FCS_IPS_EXT.1.2: 2
- FCS_IPS_EXT.1.3: 2
- FCS_IPS_EXT.1.4: 2
- FCS_IPS_EXT.1.5: 2
- FCS_IPS_EXT.1.6: 2
- FCS_IPS_EXT.1.7: 2
- FCS_IPS_EXT.1.8: 3
- FCS_RBG_EXT: 5
- FCS_RBG_EXT.1: 16
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FDP:
- FDP_ACC.1: 7
- FDP_ETC: 7
- FDP_ETC.2: 4
- FDP_IFC: 31
- FDP_IFC.1: 13
- FDP_IFF: 29
- FDP_IFF.1: 21
- FDP_ITC: 21
- FDP_ITC.1: 28
- FDP_ITC.2: 36
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT: 12
- FDP_UCT.1: 2
- FDP_UIT: 16
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 2
- FIA_AFL.1.1: 1
- FIA_PMG_EXT: 9
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 13
- FIA_UAU.1: 4
- FIA_UAU.6: 1
- FIA_UAU.7: 1
- FIA_UAU_EXT: 5
- FIA_UAU_EXT.2: 9
- FIA_UAU_EXT.2.1: 1
- FIA_UIA: 1
- FIA_UIA_EXT: 15
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID: 8
- FIA_UID.1: 4
- FIA_UID.2: 1
- FMT:
- FMT_MDT: 1
- FMT_MOF: 4
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 20
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 43
- FMT_MTD.1: 10
- FMT_SKP_EXT.1: 1
- FMT_SMF.1: 29
- FMT_SMF.1.1: 1
- FMT_SMR: 21
- FMT_SMR.1: 16
- FPT:
- FPT_APW_EXT: 4
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.1: 5
- FPT_SDP_EXT.1.1: 1
- FPT_SDP_EXT.2: 9
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SIE_EXT: 8
- FPT_SIE_EXT.1: 6
- FPT_SIE_EXT.1.1: 1
- FPT_SIE_EXT.2: 4
- FPT_SIE_EXT.2.1: 1
- FPT_SKP_EXT: 4
- FPT_SKP_EXT.1: 8
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 14
- FPT_STM.1.1: 1
- FPT_TDC: 6
- FPT_TDC.1: 4
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FPT_TUD_EXT: 19
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 5
- FTA_SSL.1: 2
- FTA_SSL.4: 1
- FTA_SSL_EXT: 5
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 6
- FTA_TAB.1: 5
- FTP:
- FTP_ITC: 12
- FTP_ITC.1: 11
- FTP_TRP.1: 6
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.BLOCKLIST: 4
- A.COM_PROT: 3
- A.INSTALL: 3
- A.NO_EVIL_ADM: 1
- A.NO_EVIL_ADMIN: 2
- A.PHYS_PROTECT: 4
- A.PLATFORM: 4
- O:
- O.CONBLK: 7
- O.DAC: 11
- O.MAIL_FLOW: 5
- O.QUOTA: 7
- O.REDUCE_SPAM: 6
- O.RESTDIST: 7
- OE:
- OE.BLOCKLIST: 3
- OE.COM_PROT: 3
- OE.INSTALL: 7
- OE.PHYSICAL: 3
- OE.PLATFORM: 16
- OSP:
- T:
- T.AUTH_DAC: 4
- T.DL_MISUSE: 4
- T.OVERFLOW: 4
- T.SPAM: 7
- T.UNAUTHUSE: 3
- T.UNAUTH_DAC: 3
|
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 3
- A.ALARM: 3
- A.AUDIT: 3
- A.CEC_CRYPTO_REGULATION: 3
- A.CONFIGURATION_CONTROL: 3
- A.KEY_TRANSPORTATION: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES: 3
- A.PHYSICAL_ENVIRONMENT_TOE: 3
- A.POLICIES_CONTINUITY: 3
- A.SECURED_MANAGEMENT_DEVICES: 3
- A.SGC_TO_FRONT-END: 3
- A.STAND_ALONE_CEC: 3
- A.SW_PROTECTION: 3
- A.TRUSTED_ADMIN: 3
- A.TRUSTED_NETWORK: 2
- A.TRUSTED_NETWORKS: 1
- D:
- D.APPLICATIVE_DATA: 6
- D.AUDIT: 3
- D.AUTHENTICATION_DATA: 11
- D.CONFIG_PARAM: 22
- D.CRYPTO_KEY: 4
- D.CRYPTO_KEYS: 18
- D.CRYPTO_KEYS_PROTECTION_PWD: 3
- D.SECURITY_POLICIES: 23
- D.SOFTWARE: 4
- D.SOFTWARES: 3
- D.SUPERVISION_DATA: 3
- D.SWUPDATE_PUBLICKEYS: 5
- D.TIME_BASE: 8
- D.TOPOLOGIC_INFO: 5
- O:
- O.AUDIT: 12
- O.AUDIT_PROTECTION: 6
- O.AUTHENTICATION_FAILURE: 4
- O.CRYPTOPERIOD: 4
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 6
- O.DISPLAY_BANNER: 5
- O.FLOW_PARTITIONING: 5
- O.KEYS_INJECTION: 5
- O.LED: 1
- O.LOCAL_DATA_PROTECTION: 11
- O.MANAGEMENT: 6
- O.POL_ENFORCEMENT: 6
- O.POL_VIEW: 7
- O.PROTECTED_COMMUNICATIONS: 10
- O.RESIDUAL_INFORMATION_CLEAR: 5
- O.ROLES: 4
- O.SELF_TEST: 7
- O.SESSION_LOCK: 5
- O.SOFTWARE_UPDATES: 5
- O.SUPERVISION: 5
- O.SUPERVISION_IMPACT: 4
- O.TIME_BASE: 5
- O.VIEW: 5
- O.VISUAL: 1
- O.VISUAL_ALARMS: 5
- OE:
- OE.ACCESS_CONTROL_CEC: 3
- OE.ACCESS_CONTROL_NTP_SERVER: 3
- OE.ACCESS_CONTROL_SF: 2
- OE.ACCESS_CONTROL_SGC: 3
- OE.ACCESS_CONTROL_SGL: 2
- OE.ALARM: 3
- OE.AUDIT_ANALYSIS: 2
- OE.AUDIT_MNGT: 3
- OE.AUDIT_RECORD_SGC: 5
- OE.CEC_CRYPTO_REGULATION: 6
- OE.DISPLAY_BANNER_SGC: 3
- OE.KEYS_TRANSPORTATION: 1
- OE.KEY_TRANSPORTATION: 2
- OE.LINUX_GUIDANCE: 3
- OE.NTP_SERVER_LOCATION: 2
- OE.PHYSICAL_ENVIRONMENT_CEC: 3
- OE.PHYSICAL_ENVIRONMENT_NTP_SERVER: 3
- OE.PHYSICAL_ENVIRONMENT_SF: 2
- OE.PHYSICAL_ENVIRONMENT_SGC: 3
- OE.PHYSICAL_ENVIRONMENT_SGL: 2
- OE.PHYSICAL_ENVIRONMENT_TOE: 3
- OE.POLICIES_CONTINUITY: 3
- OE.SECURED_CEC: 3
- OE.SECURED_NTP_SERVER: 2
- OE.SECURED_SGC: 3
- OE.SECURED_SGL: 2
- OE.SGC_TO_FRONT-END: 3
- OE.SGL_CONNECTION: 4
- OE.STAND_ALONE_CEC: 3
- OE.SW_PROTECTION: 3
- OE.SW_UPDATE_KEY: 3
- OE.TOE_INTEGRITY: 8
- OE.TOE_TRANSPORTATION: 3
- OE.TRUSTED_ADMIN: 5
- OE.TRUSTED_NETWORK: 2
- OE.TRUSTED_NETWORKS: 1
- R:
- R.ADMINISTRATOR: 13
- R.OPERATOR: 6
- R.SGC: 8
- R.SGL: 1
- T:
- T.ADMIN_ERROR: 3
- T.RESIDUAL_DATA: 3
- T.TIME_BASE: 3
- T.TSF_FAILURE: 3
- T.UNAUTHORISED_ACCESS: 3
- T.UNAUTHORISED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 3
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 42
- Microsoft Corporation: 2
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 2
- SHA512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 1
- Key exchange: 2
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 65
- IKEv1: 6
- IKEv2: 24
- IPsec:
- SSH:
- TLS:
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- RFC:
- RFC 1725: 1
- RFC 1730: 1
- RFC 2821: 11
- RFC 2822: 7
- RFC1725: 1
- RFC1730: 1
|
- FIPS:
- FIPS 180-3: 4
- FIPS 186-4: 1
- FIPS 197: 4
- FIPS 198-1: 2
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- SP 800-107: 1
- RFC:
- RFC 1042: 1
- RFC 1213: 1
- RFC 2408: 1
- RFC 2409: 1
- RFC 3566: 3
- RFC 3602: 3
- RFC 4106: 2
- RFC 4109: 1
- RFC 4303: 2
- RFC 4868: 3
- RFC 5639: 1
- RFC 5903: 1
- RFC 5996: 3
- RFC 894: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- it should be noted that the way these external lists are compiled and transferred to the TOE are out of scope of the evaluation. Security Target Page 14/83 2.3.4 Important functionality of the environment The: 1
- out of scope: 1
|
- OutOfScope:
- Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral: 1
- out of scope: 1
|
| pdf_data/st_metadata |
|
- /Author: T0065286
- /CreationDate: D:20150320191108+01'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20150320191108+01'00'
- /Producer: Microsoft® Word 2010
- /Title: SECURITY TARGET OF MISTRAL IP ENCRYPTION DEVICE
- pdf_file_size_bytes: 1430690
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 115
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |