Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS 15.2(4)E
CCEVS-VR-10692-2015
Argus Command Center Web Portal Stable Version 2.1
ISCB-3-RPT-C115-CR-v1
name Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS 15.2(4)E Argus Command Center Web Portal Stable Version 2.1
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme US MY
status archived active
not_valid_after 11.03.2018 23.06.2026
not_valid_before 11.03.2016 23.06.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10692-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10692-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10692-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20–%20Security%20Target%20[ASE]-v1.14%202.pdf
manufacturer Cisco Systems, Inc. Certis CISCO Security Pte Ltd (Certis)
manufacturer_web https://www.cisco.com https://www.certisgroup.com/
security_level {} EAL2
dgst 9756cd53cb235b4e c86ad5ef88d4cf8b
heuristics/cert_id CCEVS-VR-10692-2015 ISCB-3-RPT-C115-CR-v1
heuristics/cert_lab US []
heuristics/extracted_sars ALC_CMS.1, ATE_IND.1, AGD_OPE.1, ALC_CMC.1, AGD_PRE.1, AVA_VAN.1, ALC_OPE.1, ADV_FSP.1 ATE_IND.2, ASE_REQ.2, ASE_CCL.1, ADV_TDS.1, ADV_FSP.2, AGD_PRE.1, ASE_SPD.1, ALC_CMS.2, ALC_CMC.2, ADV_ARC.1, AVA_VAN.2, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ASE_TSS.1, ASE_INT.1, ATE_COV.1, ASE_OBJ.2, ASE_ECD.1
heuristics/extracted_versions 15.2 2.1
heuristics/protection_profiles c7cf611c6bb1e4b0 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf {}
pdf_data/cert_filename st_vid10692-ci.pdf ISCB-5-CERT-C115-CERTIFICATE-v1.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10692-2016: 1
pdf_data/cert_keywords/vendor
  • Cisco:
    • Cisco: 1
    • Cisco Systems, Inc: 1
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_metadata
  • /CreationDate: D:20160317161152-04'00'
  • /ModDate: D:20160317161152-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 176973
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20210630131348Z
  • /Creator: Word
  • /ModDate: D:20210630215915+08'00'
  • /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
  • pdf_file_size_bytes: 205722
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10692-vr.pdf ISCB-5-RPT-C115-CR-v1.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-10692-2015
    • cert_item: Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134-1706 Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10692-2015: 1
  • MY:
    • ISCB-3-RPT-C115-CR-v1: 35
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL1: 1
  • EAL:
    • EAL 2: 3
    • EAL2: 6
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • ALC:
    • ALC_CMS.1: 1
    • ALC_OPE.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 1
  • FIA:
    • FIA_AFL.1: 2
    • FIA_ATD.1: 5
    • FIA_SOS.1: 3
    • FIA_SOS.2: 2
    • FIA_UAU.1: 2
    • FIA_UID.1: 7
  • FMT:
    • FMT_MSA.1: 7
    • FMT_SMF.1: 3
    • FMT_SMR.1: 3
  • FTP:
    • FTP_ITC.1: 17
    • FTP_TRP.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CLOUD: 1
    • A.CONNECTIVITY: 1
    • A.DDOS: 1
    • A.MALWARE: 1
    • A.THIRDPARTY: 1
    • A.TIMESTAMP: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_DEV: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 31
    • Cisco Systems, Inc: 4
  • Cisco:
    • Cisco: 5
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 11
  • SSH:
    • SSH: 2
    • SSHv2: 4
  • VPN:
    • VPN: 1
  • TLS:
    • TLS:
      • TLS 1.2: 1
      • TLSv1.2: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /CreationDate: D:20160317155653-04'00'
  • /ModDate: D:20160317155653-04'00'
  • pdf_file_size_bytes: 362801
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /CreationDate: D:20210629084408Z00'00'
  • /Creator: Word
  • /ModDate: D:20210629084408Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
  • pdf_file_size_bytes: 800031
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename st_vid10692-st.pdf 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 11
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 4
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 16
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
  • FIA:
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 1
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.2: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_SOS.2: 5
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.REGULAR_UPDATES: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.CLOUD: 3
    • A.CONNECTIVITY: 4
    • A.DDOS: 3
    • A.MALWARE: 4
    • A.THIRDPARTY: 3
    • A.TIMESTAMP: 4
    • A.TRUSTED_ADMIN: 4
    • A.TRUSTED_DEV: 3
  • O:
    • O.SEC_ACCESS: 5
    • O.SEC_AUTHENTICATE: 5
    • O.SEC_COMMUNICATION: 5
    • O.SEC_PASSWORD_GENER: 1
    • O.SEC_PASSWORD_GENERATION: 3
  • OE:
    • OE.ADMINISTRATOR: 3
    • OE.ANTI_DDOS: 3
    • OE.ANTI_MALWARE: 3
    • OE.DEVELOPER: 3
    • OE.SAFE_CLOUD: 3
    • OE.SAFE_CONNECTIVITY: 3
    • OE.SYN_TIMESTAMP: 3
    • OE.THIRDPARTY: 3
  • T:
    • T.BROKEN_AUTH: 4
    • T.INTERCEPTION: 4
    • T.UNAUTHORIZED_AC: 1
    • T.UNAUTHORIZED_ACCESS: 2
    • T.WEAK_PASSWORD_: 1
    • T.WEAK_PASSWORD_GENE: 1
    • T.WEAK_PASSWORD_GENERATION: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 44
    • Cisco Systems: 1
    • Cisco Systems, Inc: 3
  • Cisco:
    • Cisco: 7
  • Samsung:
    • Samsung: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
      • AES-: 1
      • AES128: 2
      • AES256: 2
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 3
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 11
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 5
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 38
    • IKEv1: 11
  • IPsec:
    • IPsec: 72
  • SSH:
    • SSH: 8
    • SSHv2: 12
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 20
  • TLS:
    • TLS:
      • TLS 1.2: 3
      • TLSv1.2: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
    • PRNG: 1
  • RNG:
    • RBG: 3
    • RNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • SPA: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS 140-2: 4
    • FIPS 186-2: 1
    • FIPS PUB 186-3: 2
    • FIPS PUB 186-4: 2
  • ISO:
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-56B: 1
    • SP 800-90: 3
    • SP 900-90A: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS12: 1
  • RFC:
    • RFC 2986: 1
    • RFC 3602: 1
    • RFC 4109: 1
    • RFC 4301: 1
    • RFC 4303: 1
    • RFC 4945: 1
    • RFC 5280: 3
    • RFC 5759: 1
    • RFC 6379: 1
  • X509:
    • X.509: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope: 1
    • environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and: 1
    • infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s: 1
    • inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the: 1
    • out of scope: 5
    • together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting: 1
pdf_data/st_metadata
  • /Author: CLAIREHYC
  • /CreationDate: D:20210701124256+08'00'
  • /Creator: PDFCreator Free 4.2.0
  • /Keywords:
  • /ModDate: D:20210701124256+08'00'
  • /Producer: GPL Ghostscript 9.52
  • /Subject:
  • /Title: 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
  • pdf_file_size_bytes: 1022047
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different