name |
Symfoware Server Enterprise Extended Edition 7.0.2 |
EMC® Greenplum® 4.2 |
category |
Databases |
Databases |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
15.05.2017 |
not_valid_before |
31.10.2006 |
12.04.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0061_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-greenplum-v42-cert-eng.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-greenplum-v42-sec-eng.pdf |
manufacturer |
Fujitsu Limited |
EMC Corporation |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.emc.com/ |
security_level |
EAL1 |
EAL2+, ALC_FLR.2 |
dgst |
99f7dcbd9b823ee5 |
92a9c18ad5532d42 |
heuristics/cert_id |
JISEC-CC-CRP-C0061 |
383-4-196 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
7.0.2 |
4.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0144
- certification_date: 01.01.2008
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Symfoware Server is Fujitsu's relational database management system designed for enterprise business. Symfoware Server processes huge data speedily during user's working and also user can use it effectively for their own business style. Using SQL language, user is able to define the data structure, and access to the structured data. Symfoware Server offers the security functions of the user control, the resource control, and the audit log, etc. to protect the data base from malicious access in addition to the function for such a data base access. Symfoware Server runs on Red Hat Enterprise Linux 5(for Intel Itanium).
- evaluation_facility: Information Technology Security Center
- product: Symfoware Server Enterprise Extended Edition
- product_type: IT Product (Database)
- toe_version: 9.0.1
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0144_it7181.html
- toe_japan_name: Symfoware Server Enterprise Extended Edition 9.0.1
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
61018742063aaca9 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0061_ecvr.pdf |
emc-greenplum-v42-cert-eng.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-196-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0061: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 4
- EAL 2 augmented: 2
- EAL 2+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061102205911+09'00'
- /ModDate: D:20061102205911+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 11633
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: User
- /CCEF: EWA-Canada
- /CR date: 12 April 2012
- /CR version: 1.0
- /Certificate date: 12 April 2012
- /Company: Microsoft
- /CreationDate: D:20120413084524-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer name: EMC Corporation
- /Document number: 383-4-196-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of EMC Corporation EMC® Greenplum® 4.2 Document No. 1716-000-D002 Version 1.3, 26 March 2012
- /Evaluation completion date: 26 March 2012
- /ModDate: D:20120430111256-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ST Title: EMC Corporation EMC® Greenplum® 4.2 Security Target
- /ST date: 22 March 2012
- /ST version: 0.9
- /SourceModified: D:20120413124455
- /Sponsor: EMC
- /TOE Version: 4.2.0
- /TOE name and version: EMC® Greenplum® 4.2
- /TOE short name: Greenplum 4.2
- /Title: EAL 2 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 76221
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
|
emc-greenplum-v42-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL2: 2
- EAL2 augmented: 1
- EAL2+: 3
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.2: 2
- ADV_TDS: 2
- ADV_TDS.1: 3
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 5
- AGD_PRE: 3
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 12
- FAU_GEN.1: 10
- FAU_GEN.2: 2
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_SEL: 7
- FAU_SEL.1.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_UID.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 7
- FDP_ACF.1: 6
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 19
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 14
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_REV.1: 15
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_STM.1: 2
- FPT_TRC: 2
- FPT_TRC.1: 1
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FRU:
- FRU_FLT.1: 8
- FRU_FLT.1.1: 1
- FRU_RSA.1: 8
- FRU_RSA.1.1: 1
- FTA:
- FTA_MCS.1: 10
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TAH: 1
- FTA_TAH.1: 1
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.DOMAIN_SEPARATION: 2
- A.NO_BYPASS: 2
- A.NO_EVIL: 2
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 2
- A.RESTRICT_OS_ACCESS: 2
- A.ROBUST_ENVIRONMENT: 2
- A.SECURE_COMMS: 2
- A.TIME_STAMPS: 2
- O:
- O.ACCESS_HISTORY: 4
- O.ADMIN_GUIDANCE: 6
- O.ADMIN_ROLE: 4
- O.AUDIT_GENERATION: 8
- O.AUDIT_REVIEW: 4
- O.AUDIT_STORAGE: 5
- O.CONFIGURATION_IDENTIFI: 2
- O.CONFIGURATION_IDENTIFIC: 2
- O.DOCUMENTED_DESIGN: 6
- O.FAIL_SECURE: 5
- O.INTERNAL_TOE_DOMAINS: 5
- O.MANAGE: 9
- O.MEDIATE: 5
- O.PARTIAL_FUNCTIONAL_TES: 4
- O.PARTIAL_FUNCTIONAL_TEST: 2
- O.PARTIAL_SELF_PROTECTIO: 2
- O.PARTIAL_SELF_PROTECTION: 2
- O.QUOTAS: 4
- O.RESIDUAL_INFORMATION: 6
- O.TOE_ACCESS: 11
- O.VULNERABILITY_ANALYSIS: 8
- OE:
- OE.DOMAIN_SEPARATION: 3
- OE.NO_BYPASS: 3
- OE.NO_GENERAL_PURPOSE: 2
- OE.RESTRICT_OS_ACCESS: 3
- OE.ROBUST_ENVIRONMENT: 3
- OE.SECURE_COMMS: 4
- OE.TIME_STAMPS: 5
- OE.TRUST_IT: 3
- T:
- T.ACCIDENTAL_ADMIN_ERROR: 2
- T.ACCOUNTABILITY: 2
- T.AUDIT_COMPROMISE: 2
- T.CRITICAL_FAILURE: 2
- T.MASQUERADE: 2
- T.POOR_DESIGN: 2
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 2
- T.RESIDUAL_DATA: 2
- T.TSF_COMPROMISE: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAVAILABILITY: 2
- T.UNIDENTIFIED_ACTIONS: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Greg Milliken
- /CreationDate: D:20120322105240-04'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120416131946-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: EMC® Greenplum® 4.2
- /Title: Security Target
- pdf_file_size_bytes: 1106056
- pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.emc.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 70
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |