name |
NetIQ Secure Configuration Manager Version 5.6 and Solaris executable of the NetIQ Security Agent for Unix Version 5.6 |
Canon MFP Security Chip Version: 2.00 |
category |
Key Management Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
20.07.2012 |
30.06.2014 |
not_valid_before |
31.03.2008 |
17.06.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10114-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0215_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10114-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0215_est.pdf |
manufacturer |
NetIQ, Incorporated |
Canon Inc. |
manufacturer_web |
https://www.netiq.com/ |
https://www.canon.com/ |
security_level |
EAL2 |
EAL3 |
dgst |
97dbf89d905a31d2 |
f62e92eccdc04aa0 |
heuristics/cert_id |
CCEVS-VR-VID-10114-2008 |
JISEC-CC-CRP-C0215 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
5.6 |
2.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Enterprise Security Management
- certification_date: 31.03.2008
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date:
- id: CCEVS-VR-VID10114
- product: NetIQ Secure Configuration Manager Version 5.6 and Solaris executable of the NetIQ Security Agent for Unix Version 5.6
- scheme: US
- url: https://www.niap-ccevs.org/product/10114
- vendor: NetIQ Corporation
|
- cert_id: JISEC-CC-CRP-C0215
- certification_date: 01.06.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0215_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Canon MFP Security Chip and will be provided to end users as part of a HDD data encryption kit. The TOE allows protecting hard drives in Canon MFPs and printers from disclosure of confidential information due to theft, without sacrificing the extensibility, versatility, convenience and performance of Canon MFPs and printers. The TOE provides the following functions for protecting hard drives: - Hard drive data encryption - Cryptographic key management - Device identification and authentication TOE security functions Same as above.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Canon MFP Security Chip
- product_type: IT product(cryptographic security chip)
- report_link: https://www.ipa.go.jp/en/security/c0215_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0215_est.pdf
- toe_version: 2.00
- vendor: Canon Inc.
- expiration_date: 01.06.2014
- revalidations: [frozendict({'date': '2011-03', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0215_it8217_02.html'})]
- supplier: Canon Inc.
- toe_japan_name: Canon MFP Security Chip 2.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0215_it8217.html
- toe_overseas_name: Canon MFP Security Chip 2.01
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10114-vr.pdf |
c0215_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10114-2008
- cert_item: NetIQ Corporation NetIQ Secure Configuration Manager Version 5.6 and Solaris executable of the NetIQ Security Agent for Unix Version 5.6
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10114-2008: 1
|
- JP:
- CRP-C0215-01: 1
- Certification No. C0215: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 12
- EAL 4: 1
- EAL2: 9
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_RCR: 1
- AGD:
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.2: 1
- FAU_GEN_EXP.1: 1
- FAU_SAR: 1
- FAU_SAR.2: 2
- FAU_SAR.3: 1
- FCS:
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 8
- FIA_SOS.1: 3
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF_EXP.1: 2
- FMT_MTD_EXP: 24
- FMT_SMF.1: 19
- FPT:
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_ITT.1: 2
- FPT_SEP_EXP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.HDD_ACCESS: 1
- T.WRONG_BOARD: 4
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-0001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- FIPS:
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20080417131608-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20080417132250-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080417171515
- /Subject: CCEVS Validation Report - Cisco Routers EAL3
- /Title: VID6014-VR-0001 DRAFT
- pdf_file_size_bytes: 372827
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
- /CreationDate: D:20120509161007+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120509161037+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 766108
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
st_vid10114-st.pdf |
c0215_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 9
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 15
- ADV_RCR.1: 8
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 15
- AGD_USR.1: 13
- ATE:
- ATE_COV.1: 8
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_SOF.1: 10
- AVA_VLA.1: 14
|
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 4
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 4
- ADV_HLD.2: 4
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 4
- AGD_USR.1: 4
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 4
- ATE_FUN.1: 4
- ATE_IND.2: 4
- AVA:
- AVA_MSU.1: 4
- AVA_SOF: 1
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 1
- FAU_GEN.1: 2
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_GEN_EXP.1: 14
- FAU_GEN_EXP.1.1: 1
- FAU_GEN_EXP.1.2: 1
- FAU_SAR: 12
- FAU_SAR.1: 5
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_COP: 39
- FCS_COP.1: 6
- FCS_MSA.2: 1
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 2
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 11
- FIA_SOS.1.1: 1
- FIA_UAU: 12
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 2
- FIA_UID: 14
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF_EXP.1: 11
- FMT_MOF_EXP.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 13
- FMT_MSA.2.1: 1
- FMT_MTD: 1
- FMT_MTD_EXP: 37
- FMT_MTD_EXP.1: 5
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC.1: 8
- FPT_ITC.1.1: 1
- FPT_ITI.1: 8
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_RVM.1: 6
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 6
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_SEP_EXP.1: 11
- FPT_SEP_EXP.1.1: 1
- FPT_SEP_EXP.1.2: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FTP:
|
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 6
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FIA:
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 15
- FIA_UAU.4: 14
- FIA_UAU.4.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 16
- FMT:
- FPT:
- FPT_RMV.1: 1
- FPT_RVM.1: 18
- FPT_RVM.1.1: 1
- FPT_SEP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CS_ACCTS: 5
- A.DEDICATED: 3
- A.INTERNET: 4
- A.ITPHYS: 4
- A.NOEVIL: 3
- A.PHYS_SEC: 3
- A.SEC_UPDATES: 4
- O:
- O.AUD_GEN: 7
- O.AUD_PROT: 4
- O.AUD_REVIEW: 6
- O.CNT_PROT: 4
- O.CRYPTO: 7
- O.MANAGE: 4
- O.PART_SELF_PROT: 8
- O.SECURE_CHK: 7
- O.SECURE_COMM: 5
- O.TOE_ACCESS: 5
- OE:
- OE.AUD_: 1
- OE.AUD_STORAGE: 4
- OE.CS_ACCTS: 4
- OE.DEDICATED: 3
- OE.DOMAIN_SEP: 6
- OE.INTERNET: 3
- OE.ITPHYS: 3
- OE.NOEVIL: 3
- OE.NO_BYPASS: 7
- OE.PHYS_SEC: 3
- OE.RESIDUAL: 6
- OE.SEC_UPDATES: 3
- OE.TIME_STAMPS: 6
- OE.TSF_DATA_PROT: 7
- T:
- T.ACCOUN: 4
- T.AUD_COMP: 2
- T.BAD_UPDATE: 4
- T.CNT_COMP: 2
- T.MASQUERADE: 4
- T.NO_POL_COMP: 2
- T.RESIDUAL: 4
- T.TSF_COMP: 2
- T.UNIDENT_ACTION: 4
- T.VULN: 2
|
- O:
- O.BOARD_AUTH: 7
- O.CRYPTO: 8
- OE:
- T:
- T.HDD_ACCESS: 3
- T.WRONG_BOARD: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- RFC:
- RFC 1321: 2
- RFC 2246: 2
- RFC 2409: 2
- RFC 4306: 2
- RFC2406: 1
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- FIPS 186-2: 1
- FIPS PUB 197: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: dpf19441
- /CreationDate: D:20080417123221-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20080418081050-04'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - 05-534-R-0067 V1.4 NetIQ EAL2 Security Target.doc
- pdf_file_size_bytes: 332925
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /Author: Canon Inc.
- /CreationDate: D:20120424203211+09'00'
- /Creator: PScript5.dll Version 5.2
- /Keywords:
- /ModDate: D:20120424203211+09'00'
- /Producer: Adobe LiveCycle PDFG 7.2
- /Subject: Security Chip for Canon MFPs/Printers
- /Title: Canon MFP Security Chip Security Target
- pdf_file_size_bytes: 326854
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |