| name |
VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1 |
Argus Command Center Web Portal Stable Version 2.1 |
| category |
Operating Systems |
Other Devices and Systems |
| scheme |
CA |
MY |
| status |
archived |
active |
| not_valid_after |
15.05.2017 |
23.06.2026 |
| not_valid_before |
15.10.2010 |
23.06.2021 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esx-v40-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esx-v40-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20–%20Security%20Target%20[ASE]-v1.14%202.pdf |
| manufacturer |
VMware Inc. |
Certis CISCO Security Pte Ltd (Certis) |
| manufacturer_web |
https://www.vmware.com |
https://www.certisgroup.com/ |
| security_level |
EAL4+, ALC_FLR.2 |
EAL2 |
| dgst |
9c60f1c7f9ea7348 |
c86ad5ef88d4cf8b |
| heuristics/cert_id |
383-4-145 |
ISCB-3-RPT-C115-CR-v1 |
| heuristics/cert_lab |
CANADA |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ALC_FLR.2, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
4.0 |
2.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20210630131348Z
- /Creator: Word
- /ModDate: D:20210630215915+08'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 205722
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
vmware-esx-v40-cert-eng.pdf |
ISCB-5-RPT-C115-CR-v1.pdf |
| pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-145-CR
- cert_lab: CANADA
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-3-RPT-C115-CR-v1: 35
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 3
- EAL4+: 1
|
|
| pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS.2: 1
- ALC_DEL.1: 1
|
| pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_ACC.1: 14
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 5
- FIA_SOS.1: 3
- FIA_SOS.2: 2
- FIA_UAU.1: 2
- FIA_UID.1: 7
- FMT:
- FMT_MSA.1: 7
- FMT_SMF.1: 3
- FMT_SMR.1: 3
- FTP:
- FTP_ITC.1: 17
- FTP_TRP.1: 2
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.CLOUD: 1
- A.CONNECTIVITY: 1
- A.DDOS: 1
- A.MALWARE: 1
- A.THIRDPARTY: 1
- A.TIMESTAMP: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_DEV: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 180-3: 1
- FIPS 186-2: 1
- FIPS 197: 1
- FIPS 46-3: 1
- ISO:
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1 Revision 3
- /CC date: July 2009
- /CEM Version: 3.1 Revision 3
- /CEM date: July 2009
- /CR_Date: 2 September 2010
- /CR_Version: 0.3
- /Client City: Palo Alto
- /Client Country: USA
- /Client Full Name: VMware, Inc.
- /Client Postal Code: 94304
- /Client Short Name: VMware
- /Client State: CA
- /Client Street: 3401 Hillview Ave.
- /Company:
- /CreationDate: D:20101027133109-04'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Developer Long Name: VMware, Inc.
- /Developer Short Name: VMware
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Level Text: 4 augmented
- /EAL Long: EAL 4 Augmented
- /EAL Short: EAL 4+
- /ER Document Date: 9 September 2009
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1651-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 0.1
- /ETPlan_date: 3 August 2010
- /ETProcRes_Date: September 2010
- /ETProcRes_Doc#: 1651-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 0.1
- /ETProc_Date: 13 August 2010
- /ETProc_Doc#: 1651-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: 0.2
- /ETReport_Date: 1 September 2010
- /ETReport_Doc#: 1651-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 1.4
- /EWP_Date: 5 July 2010
- /EWP_Doc#: 1651-000-D001
- /EWP_Title: Evaluation Work Plan for EAL 4+ Common Criteria Evaluation of VMware Incorporated ESX 4.0 and vCenter 4.0, Document No. 1651-000-D001, Version 1.3, 5 July 2010, Common Criteria Evaluation Number: 383-4-145
- /EWP_Version: 1.3
- /Eval number: 383-4-145
- /Eval_End_Date: 22 October 2010
- /Eval_Start_Date: 1 December 2009
- /Keywords:
- /LeadEvaluator: K. Braun
- /LeadEvaluatorInitials: KB
- /Manager:
- /ModDate: D:20101027133206-04'00'
- /Producer: Acrobat Distiller 9.2.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1651
- /ST_Date: 31 August 2010
- /ST_Title: VMware, Inc. VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1 Security Target
- /ST_Version: 1.2
- /SVC_Date: 5 August 2009
- /SVC_Doc#: 1610-000-D006
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 1.0
- /SVR_Date: 5 August 2009
- /SVR_Doc#: 1610-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Palo Alto
- /Security Classification: EWA-Canada & VMware Proprietary
- /SourceModified: D:20101027170032
- /Sponsor: VMware, Inc.
- /Sponsor City: Palo Alto
- /Sponsor Country: USA
- /Sponsor Postal Code: 94304
- /Sponsor State: CA
- /Sponsor Street: 3401 Hillview Ave.
- /Subject:
- /TOE: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
- /TOE Short-NoTM: ESX and vCenter Server 4.0 Update 1
- /TOE Version: 4.0 Update 1
- /TOE with version: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
- /TOE-NoTM: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: 1430796098
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: VMWare CPL post request ...rick
- /_ReviewingToolsShownOnce:
- pdf_file_size_bytes: 95655
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /CreationDate: D:20210629084408Z00'00'
- /Creator: Word
- /ModDate: D:20210629084408Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 800031
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
| pdf_data/st_filename |
vmware-esx-v40-sec-eng.pdf |
2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 4
- ASE:
- ASE_CCL.1: 3
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 5
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 21
- FDP_ACC.1.1: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_IFC.2: 7
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_UAU.1: 3
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 3
- FMT_MSA.3: 26
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC.1: 6
- FPT_ITC.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_STM.1: 3
|
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_SOS.2: 5
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.ACCESS: 7
- O.ADMIN: 6
- O.AUDIT: 6
- O.CONTINUITY: 4
- O.IDAUTH: 8
- O.SECURE: 4
- O.VLAN: 4
- O.VM: 4
- O.VSWITCH: 4
- OE:
- OE.IDAUTH: 7
- OE.SEP: 7
- OE.TIME: 5
- T:
- T.AVAILABILITY: 2
- T.COMINT: 2
- T.PRIVIL: 2
- T.VIRTUAL_NETWORK: 2
- T.VM: 2
|
- A:
- A.CLOUD: 3
- A.CONNECTIVITY: 4
- A.DDOS: 3
- A.MALWARE: 4
- A.THIRDPARTY: 3
- A.TIMESTAMP: 4
- A.TRUSTED_ADMIN: 4
- A.TRUSTED_DEV: 3
- O:
- O.SEC_ACCESS: 5
- O.SEC_AUTHENTICATE: 5
- O.SEC_COMMUNICATION: 5
- O.SEC_PASSWORD_GENER: 1
- O.SEC_PASSWORD_GENERATION: 3
- OE:
- OE.ADMINISTRATOR: 3
- OE.ANTI_DDOS: 3
- OE.ANTI_MALWARE: 3
- OE.DEVELOPER: 3
- OE.SAFE_CLOUD: 3
- OE.SAFE_CONNECTIVITY: 3
- OE.SYN_TIMESTAMP: 3
- OE.THIRDPARTY: 3
- T:
- T.BROKEN_AUTH: 4
- T.INTERCEPTION: 4
- T.UNAUTHORIZED_AC: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.WEAK_PASSWORD_: 1
- T.WEAK_PASSWORD_GENE: 1
- T.WEAK_PASSWORD_GENERATION: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 10
- physical tampering: 2
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope: 1
- environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and: 1
- infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s: 1
- inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the: 1
- out of scope: 5
- together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting: 1
|
| pdf_data/st_metadata |
|
- /Author: CLAIREHYC
- /CreationDate: D:20210701124256+08'00'
- /Creator: PDFCreator Free 4.2.0
- /Keywords:
- /ModDate: D:20210701124256+08'00'
- /Producer: GPL Ghostscript 9.52
- /Subject:
- /Title: 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
- pdf_file_size_bytes: 1022047
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |