name |
BAE Systems Secure KVM Gen2 8560943-2 |
Cortex M35P r1p1 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
NL |
status |
active |
archived |
not_valid_after |
12.01.2028 |
13.02.2025 |
not_valid_before |
12.01.2023 |
13.02.2020 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-20-201210.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-201210-CR%20v1.1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[M35P-STL]%20arm_cortex_m35p_r1p1_security_target_lite_v1.1.pdf |
manufacturer |
BAE Systems Information and Electronic Systems, Inc. |
Arm Limited |
manufacturer_web |
https://www.baesystems.com |
https://www.arm.com |
security_level |
{} |
EAL6+, ASE_TSS.2, ALC_FLR.1 |
dgst |
9674e40d5815c857 |
b53ae4936ad0c24b |
heuristics/cert_id |
CCEVS-VR-11304-2023 |
NSCIB-CC-201210-CR |
heuristics/cert_lab |
US |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
8560943, 2 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
42cf355b24450489, 76f8f05a35d87f59, 814f66c77bc7f33b |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf |
{} |
pdf_data/cert_filename |
st_vid11304-ci.pdf |
CC-20-201210.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11304-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL6: 1
- EAL6 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230124105725-05'00'
- /ModDate: D:20230124105725-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180693
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20200213160301+01'00'
- /Creator: NL-ARN-SAL-C
- /ModDate: D:20200213160614+01'00'
- /Producer: KONICA MINOLTA bizhub C300i
- pdf_file_size_bytes: 169972
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid11304-vr.pdf |
Certification Report NSCIB-CC-201210-CR v1.1.pdf |
pdf_data/report_frontpage |
- NL:
- US:
- cert_id: CCEVS-VR-11304-2023
- cert_item: for BAE Systems Secure KVM Gen2 8560943-2
- cert_lab: US NIAP
|
- NL:
- cert_id: NSCIB-CC-201210-CR
- cert_item: Cortex M35P r1p1
- cert_lab: Brightsight
- developer: Arm Limited
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL4+: 2
- EAL6: 5
- EAL6 augmented: 3
- EAL6+: 3
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
- ADV:
- ALC:
- ASE:
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_APC_EXT.1: 1
- FDP_CDS_EXT.1: 1
- FDP_FIL_EXT: 1
- FDP_IPC_EXT.1: 2
- FDP_RIP: 1
- FDP_SPR_EXT: 1
- FDP_SWI_EXT.3: 1
- FTA:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- other:
- JIL: 3
- JIL-AAPS: 3
- JIL-COMP: 3
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- out of scope: 2
- using a USB connector. This device is not switched and does not use the KVM. The handgrip is out of scope and not part of the TOE. Host PC1 and Host PC2 output HDMI using the DisplayPort dual mode feature: 2
|
|
pdf_data/report_metadata |
- /CreationDate: D:20230124104758-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230124104758-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 392211
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0539, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0586, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0518, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0506, https://www.niap-ccevs.org/Product/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0620, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0514, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0593, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0584, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0686, http://www.niap-ccevs.org/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0507
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
|
pdf_data/st_filename |
st_vid11304-st.pdf |
[M35P-STL] arm_cortex_m35p_r1p1_security_target_lite_v1.1.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL6: 11
- EAL6 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.5: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 9
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR.1: 7
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 8
- ATE:
- ATE_COV: 1
- ATE_COV.3: 1
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_AFL_EXT.1: 1
- FDP_APC_EXT: 4
- FDP_APC_EXT.1: 14
- FDP_CDS_EXT.1: 9
- FDP_CDS_EXT.1.1: 2
- FDP_FIL_EXT: 9
- FDP_FIL_EXT.1: 3
- FDP_IPC_EXT.1: 10
- FDP_IPC_EXT.1.1: 1
- FDP_IPC_EXT.1.2: 1
- FDP_PDC_EXT: 28
- FDP_PDC_EXT.1: 7
- FDP_PDC_EXT.1.1: 1
- FDP_PDC_EXT.1.2: 1
- FDP_PDC_EXT.1.3: 1
- FDP_PDC_EXT.1.4: 1
- FDP_PDC_EXT.1.5: 1
- FDP_PDC_EXT.2: 4
- FDP_PDC_EXT.3: 4
- FDP_RIP: 8
- FDP_RIP.1: 1
- FDP_RIP_EXT.1: 7
- FDP_RIP_EXT.1.1: 1
- FDP_SPR_EXT: 9
- FDP_SPR_EXT.1: 1
- FDP_SWI_EXT.1: 7
- FDP_SWI_EXT.1.1: 1
- FDP_SWI_EXT.2: 9
- FDP_SWI_EXT.2.1: 1
- FDP_SWI_EXT.2.2: 1
- FDP_SWI_EXT.3: 8
- FDP_SWI_EXT.3.1: 1
- FDP_UDF_EXT: 14
- FDP_UDF_EXT.1: 2
- FPT:
- FPT_FLS_EXT.1: 7
- FPT_FLS_EXT.1.1: 1
- FPT_NTA_EXT.1: 7
- FPT_NTA_EXT.1.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 1
- FTA:
- FTA_CIN_EXT.1: 11
- FTA_CIN_EXT.1.1: 1
- FTA_CIN_EXT.1.2: 1
- FTA_CIN_EXT.1.3: 1
|
- FDP:
- FDP_ACC: 22
- FDP_ACC.1: 11
- FDP_ACC.2: 10
- FDP_ACF: 22
- FDP_ACF.1: 23
- FDP_IFC.1: 11
- FDP_ITT.1: 6
- FMT:
- FMT_MSA: 39
- FMT_MSA.1: 10
- FMT_MSA.3: 15
- FMT_SMF: 18
- FMT_SMF.1: 10
- FMT_SMR.1: 11
- FPT:
- FPT_FLS.1: 9
- FPT_ITT.1: 4
- FRU:
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.NO_SPECIAL_ANALOG_CAPABILITIES: 1
- OE.NO_WIRELESS_DEVICES: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 15
- malfunction: 2
- SCA:
- Leak-Inherent: 6
- Physical Probing: 2
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out: 1
- 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This: 1
- This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation: 1
- This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are: 1
- contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in: 1
- is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the: 1
- must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of: 1
- out of scope: 12
- to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but: 1
- to the development and production of the TOE. ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
- transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20230124105039-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230124105039-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 771042
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |