Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Rubrik Cloud Data Management v8.1.0
Certificate Number: 2024/150
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
ANSSI-CC-2024/41
name Rubrik Cloud Data Management v8.1.0 Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme AU FR
not_valid_after 19.06.2029 08.01.2030
not_valid_before 19.06.2024 08.01.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_150_Rubrik%20Cloud%20Data%20Management%20v8.1.0_EFT-T039_os.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T039-CR-V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rubrik%20CDM%20EAL2%20ST%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf
manufacturer Rubrik Inc. Apple Inc.
manufacturer_web https://www.rubrik.com/ https://www.apple.com/
security_level EAL2+, ALC_FLR.1 EAL2+, ALC_FLR.3, ADV_FSP.3
dgst 9cb4caf4b2e5b7ff e5bae93bf2719158
heuristics/cert_id Certificate Number: 2024/150 ANSSI-CC-2024/41
heuristics/cpe_matches cpe:2.3:a:rubrik:cloud_data_management:8.1.0:p2:*:*:*:*:*:*, cpe:2.3:a:rubrik:cloud_data_management:8.1.0:-:*:*:*:*:*:*, cpe:2.3:a:rubrik:cloud_data_management:8.1.0:p1:*:*:*:*:*:* cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:*
heuristics/related_cves CVE-2024-36068 CVE-2024-27826, CVE-2024-44274, CVE-2024-54494, CVE-2024-54534, CVE-2024-40774, CVE-2024-54513, CVE-2024-40809, CVE-2024-27832, CVE-2024-54522, CVE-2024-54560, CVE-2024-44278, CVE-2024-40813, CVE-2024-23251, CVE-2024-27884, CVE-2025-24251, CVE-2024-44269, CVE-2024-54510, CVE-2024-54538, CVE-2024-23282, CVE-2025-24159, CVE-2024-40793, CVE-2024-54486, CVE-2024-44290, CVE-2024-27801, CVE-2024-40779, CVE-2024-54530, CVE-2024-27838, CVE-2024-44183, CVE-2024-27810, CVE-2024-40812, CVE-2024-54478, CVE-2024-44192, CVE-2024-44169, CVE-2025-24158, CVE-2024-27806, CVE-2024-27828, CVE-2024-40776, CVE-2024-27805, CVE-2025-24129, CVE-2024-54499, CVE-2024-40780, CVE-2024-40805, CVE-2024-40788, CVE-2024-44144, CVE-2024-40818, CVE-2024-27863, CVE-2025-24117, CVE-2024-54512, CVE-2025-24160, CVE-2024-44296, CVE-2024-54523, CVE-2024-27880, CVE-2025-24163, CVE-2024-27811, CVE-2024-54467, CVE-2024-44185, CVE-2025-24086, CVE-2024-27830, CVE-2025-24124, CVE-2024-27840, CVE-2024-44240, CVE-2025-24123, CVE-2024-54505, CVE-2024-40782, CVE-2024-54479, CVE-2025-24107, CVE-2024-54535, CVE-2024-54526, CVE-2024-44225, CVE-2024-44302, CVE-2024-54527, CVE-2025-24149, CVE-2024-40806, CVE-2024-54497, CVE-2024-54518, CVE-2025-31203, CVE-2024-40777, CVE-2024-44215, CVE-2024-40784, CVE-2024-54468, CVE-2024-40835, CVE-2024-44254, CVE-2024-54525, CVE-2024-44187, CVE-2024-44176, CVE-2024-44233, CVE-2024-54514, CVE-2024-40799, CVE-2024-40795, CVE-2024-54501, CVE-2024-54543, CVE-2024-40857, CVE-2024-27815, CVE-2024-54551, CVE-2024-27804, CVE-2024-40822, CVE-2024-44171, CVE-2025-24162, CVE-2025-24085, CVE-2024-44170, CVE-2024-44282, CVE-2024-44155, CVE-2024-40789, CVE-2024-44285, CVE-2024-44212, CVE-2024-40787, CVE-2024-44194, CVE-2024-54517, CVE-2024-27816, CVE-2025-24137, CVE-2024-40815, CVE-2024-44244, CVE-2024-44255, CVE-2024-44273, CVE-2025-24126, CVE-2024-40850, CVE-2024-40829, CVE-2025-24131, CVE-2024-40836, CVE-2024-27851, CVE-2024-44234, CVE-2024-54500, CVE-2024-44191, CVE-2024-27808, CVE-2025-24161, CVE-2024-27823, CVE-2024-44198, CVE-2024-54508, CVE-2024-40785, CVE-2024-27820, CVE-2024-27856, CVE-2024-27834, CVE-2024-44232, CVE-2024-54541, CVE-2024-27800, CVE-2024-54502, CVE-2024-27821, CVE-2024-40824, CVE-2024-44239, CVE-2024-27814, CVE-2024-44297, CVE-2024-54542
heuristics/extracted_sars ADV_ARC.1, ATE_COV.1, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ASE_SPD.1, ADV_TDS.1, ASE_OBJ.2, ASE_REQ.2, AVA_VAN.2, ATE_FUN.1, ASE_TSS.1, ATE_IND.2, ALC_CMC.2, ASE_CCL.1, ALC_FLR.1, ALC_CMS.2, ASE_ECD.1, ASE_INT.1, ADV_FSP.2 ALC_FLR.3, ADV_ARC.1, ADV_FSP.3, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, AGD_PRE.1, ASE_SPD.1, ADV_TDS.1, ASE_OBJ.2, ASE_REQ.2, AVA_VAN.2, ATE_FUN.1, ASE_TSS.1, ATE_IND.2, ALC_CMC.2, ASE_CCL.1, ALC_CMS.2, ASE_ECD.1, ASE_INT.1
heuristics/extracted_versions 8.1.0 10.4
pdf_data/cert_filename AISEP_Certificate_2024_150_Rubrik Cloud Data Management v8.1.0_EFT-T039_os.pdf Certificat-ANSSI-CC-2024_41fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2024/150: 1
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_metadata
  • /CreationDate: D:20240902115239+10'00'
  • /ModDate: D:20240902115239+10'00'
  • pdf_file_size_bytes: 235409
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20250110100051+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20250110101612+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 144030
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename AISEP-CC-CR-2024-EFT-T039-CR-V1.0.pdf ANSSI-CC-2024_41fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL1: 1
    • EAL2: 5
    • EAL2 augmented: 2
    • EAL2+: 1
  • EAL:
    • EAL2: 3
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 3
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 6
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2022-11-001: 1
    • CCMB-2022-11-002: 1
    • CCMB-2022-11-003: 1
    • CCMB-2022-11-005: 1
    • CCMB-2022-11-006: 1
pdf_data/report_metadata
pdf_data/st_filename Rubrik CDM EAL2 ST v1.0.pdf ANSSI-Cible-CC-2024_41en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2+: 3
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 3
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR: 1
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 3
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXT: 1
    • FAU_GEN_EXT.1: 18
    • FAU_GEN_EXT.1.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 20
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 10
    • FDP_ACC.2: 6
    • FDP_ACF: 20
    • FDP_ACF.1: 16
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 10
    • FDP_IFC.1: 8
    • FDP_ITC.1: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 2
    • FDP_UIT: 10
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 4
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.DATA: 7
    • A.KEY: 3
    • A.PHYSICAL: 2
  • O:
    • O.ACCESS: 8
    • O.AUDIT: 9
    • O.CRYPTOGRAPHY: 9
    • O.MANAGE: 9
    • O.PROTECTION: 9
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 12
  • T:
    • T.ADMIN: 2
    • T.ATTACKER: 6
  • A:
    • A.CDCVM: 4
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.IPH-: 2
    • A.IPHONE_USER: 1
    • A.PERSO: 4
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 4
    • T.PHYSICAL: 2
    • T.RECOVER: 4
    • T.REPLAY: 2
    • T.SILENT: 3
    • T.SKIMMING: 3
    • T.USURP: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 8
  • TLS:
    • TLS:
      • TLS 1.2: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 198-1: 1
    • FIPS22: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
  • /Author: Corsec Security, Inc.
  • /CreationDate: D:20240516092510-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240516092510-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: Security Target
  • pdf_file_size_bytes: 782201
  • pdf_hyperlinks: http://www.rubrik.com/, mailto:[email protected], http://www.corsec.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /CreationDate: D:20241014150418Z
  • /Creator: Word
  • /ModDate: D:20241014160450+01'00'
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Watch_S9_watchOS10_SecurityTarget_v5.0.docx
  • pdf_file_size_bytes: 2646136
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different