Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BAE Systems Secure KVM Gen2 8560943-2
CCEVS-VR-11304-2023
Trend Micro Deep Security 20
561-LSS
name BAE Systems Secure KVM Gen2 8560943-2 Trend Micro Deep Security 20
category Other Devices and Systems Boundary Protection Devices and Systems
scheme US CA
not_valid_after 12.01.2028 31.05.2027
not_valid_before 12.01.2023 31.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20CT%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20CR%20v1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20ST%20v12.0.pdf
manufacturer BAE Systems Information and Electronic Systems, Inc. Trend Micro Inc.
manufacturer_web https://www.baesystems.com https://www.trendmicro.com
security_level {} EAL2+, ALC_FLR.1
dgst 9674e40d5815c857 0c1fb05671e601ac
heuristics/cert_id CCEVS-VR-11304-2023 561-LSS
heuristics/cert_lab US CANADA
heuristics/cpe_matches {} cpe:2.3:a:trendmicro:deep_security_agent:20.0:update224:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update213:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1822:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6313:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1559:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3288:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update190:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5761:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5512:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2419:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8137:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update158:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update690:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:-:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update198:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update167:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7303:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8268:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8438:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5995:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2593:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2921:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5810:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5394:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3771:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3445:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1681:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3964:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update208:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7119:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update183:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2395:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update877:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update173:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3165:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update223:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update182:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6690:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1876:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1337:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2740:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4726:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6860:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2009:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7476:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7719:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4185:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update180:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3530:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4416:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5137:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4959:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2204:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7943:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security:20.0:-:*:*:long_term_support:*:*:*
heuristics/related_cves {} CVE-2023-52337, CVE-2021-25252, CVE-2023-52338
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ALC_CMS.2, ALC_FLR.1, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1
heuristics/extracted_versions 8560943, 2 20
heuristics/scheme_data
  • certification_date: 31.05.2022
  • level: EAL 2+ (ALC_FLR.1)
  • product: Trend Micro Deep Security 20
  • vendor: Trend Micro Inc.
heuristics/protection_profiles 42cf355b24450489, 76f8f05a35d87f59, 814f66c77bc7f33b {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf {}
pdf_data/cert_filename st_vid11304-ci.pdf 561-LSS CT v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11304-2023: 1
  • CA:
    • 561-LSS: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • Lightship:
    • Lightship Security: 1
pdf_data/cert_metadata
  • /CreationDate: D:20230124105725-05'00'
  • /ModDate: D:20230124105725-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180693
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20220606065558-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1640320
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11304-vr.pdf 561-LSS CR v1.0.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-11304-2023
    • cert_item: for BAE Systems Secure KVM Gen2 8560943-2
    • cert_lab: US NIAP
  • CA:
  • US:
  • CA:
    • cert_id: 561-LSS
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11304-2023: 1
  • CA:
    • 561-LSS: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ALC:
    • ALC_FLR.1: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_APC_EXT.1: 1
    • FDP_CDS_EXT.1: 1
    • FDP_FIL_EXT: 1
    • FDP_IPC_EXT.1: 2
    • FDP_RIP: 1
    • FDP_SPR_EXT: 1
    • FDP_SWI_EXT.3: 1
  • FTA:
    • FTA_CIN_EXT.1: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 10
  • Lightship:
    • Lightship Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • using a USB connector. This device is not switched and does not use the KVM. The handgrip is out of scope and not part of the TOE. Host PC1 and Host PC2 output HDMI using the DisplayPort dual mode feature: 2
pdf_data/report_metadata
pdf_data/st_filename st_vid11304-st.pdf 561-LSS ST v12.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS: 2
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 3
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_AFL_EXT.1: 1
    • FDP_APC_EXT: 4
    • FDP_APC_EXT.1: 14
    • FDP_CDS_EXT.1: 9
    • FDP_CDS_EXT.1.1: 2
    • FDP_FIL_EXT: 9
    • FDP_FIL_EXT.1: 3
    • FDP_IPC_EXT.1: 10
    • FDP_IPC_EXT.1.1: 1
    • FDP_IPC_EXT.1.2: 1
    • FDP_PDC_EXT: 28
    • FDP_PDC_EXT.1: 7
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 4
    • FDP_PDC_EXT.3: 4
    • FDP_RIP: 8
    • FDP_RIP.1: 1
    • FDP_RIP_EXT.1: 7
    • FDP_RIP_EXT.1.1: 1
    • FDP_SPR_EXT: 9
    • FDP_SPR_EXT.1: 1
    • FDP_SWI_EXT.1: 7
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 9
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 8
    • FDP_SWI_EXT.3.1: 1
    • FDP_UDF_EXT: 14
    • FDP_UDF_EXT.1: 2
  • FPT:
    • FPT_FLS_EXT.1: 7
    • FPT_FLS_EXT.1.1: 1
    • FPT_NTA_EXT.1: 7
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 1
    • FTA_CIN_EXT.1.2: 1
    • FTA_CIN_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.1.3: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG.2: 15
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.4: 1
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FIA:
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_ITT.1.1: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 6
    • FPT_STM.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NOEVIL: 5
    • A.PROTCT: 3
    • A.TRUST: 4
  • O:
    • O.ACCESS: 12
    • O.APP_CONTROL: 7
    • O.AUDITS: 8
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_SORT: 6
    • O.EADMIN: 4
    • O.EXPORT: 3
    • O.IDANLZ: 5
    • O.IDAUTH: 19
    • O.IDSCAN: 7
    • O.IDSENS: 9
    • O.INTEGR: 7
    • O.OFLOWS: 6
    • O.PROTCT: 10
    • O.RESPON: 5
    • O.VIRUS: 8
  • OE:
    • OE.CREDEN: 5
    • OE.INSTAL: 5
    • OE.INTROP: 5
    • OE.PERSON: 5
    • OE.PHYCAL: 6
    • OE.TIME: 4
  • T:
    • T.COMDIS: 3
    • T.COMINT: 4
    • T.FACCNT: 3
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 4
    • T.IMPCON: 3
    • T.INADVE: 3
    • T.INFLUX: 4
    • T.LOSSOF: 4
    • T.MISACT: 4
    • T.MISUSE: 4
    • T.NOHALT: 3
    • T.PRIVIL: 4
    • T.SCNCFG: 4
    • T.SCNMLC: 3
    • T.SCNVUL: 4
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 3
  • STMicroelectronics:
    • STM: 1
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DSA:
      • DSA: 13
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
      • TLS 1.2: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-224: 2
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 3
  • SCA:
    • side channel: 2
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 198-1: 1
pdf_data/st_metadata
  • /CreationDate: D:20230124105039-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20230124105039-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 771042
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different