This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Rubrik Cloud Data Management v8.1.0 Certificate Number: 2024/150 |
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) ANSSI-CC-2024/41 |
|
---|---|---|
name | Rubrik Cloud Data Management v8.1.0 | Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) |
category | Data Protection | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | AU | FR |
not_valid_after | 19.06.2029 | 08.01.2030 |
not_valid_before | 19.06.2024 | 08.01.2025 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_150_Rubrik%20Cloud%20Data%20Management%20v8.1.0_EFT-T039_os.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T039-CR-V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rubrik%20CDM%20EAL2%20ST%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf |
manufacturer | Rubrik Inc. | Apple Inc. |
manufacturer_web | https://www.rubrik.com/ | https://www.apple.com/ |
security_level | EAL2+, ALC_FLR.1 | EAL2+, ALC_FLR.3, ADV_FSP.3 |
dgst | 9cb4caf4b2e5b7ff | e5bae93bf2719158 |
heuristics/cert_id | Certificate Number: 2024/150 | ANSSI-CC-2024/41 |
heuristics/cpe_matches | cpe:2.3:a:rubrik:cloud_data_management:8.1.0:p2:*:*:*:*:*:*, cpe:2.3:a:rubrik:cloud_data_management:8.1.0:-:*:*:*:*:*:*, cpe:2.3:a:rubrik:cloud_data_management:8.1.0:p1:*:*:*:*:*:* | cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:* |
heuristics/related_cves | CVE-2024-36068 | CVE-2024-27826, CVE-2024-44274, CVE-2024-54494, CVE-2024-54534, CVE-2024-40774, CVE-2024-54513, CVE-2024-40809, CVE-2024-27832, CVE-2024-54522, CVE-2024-54560, CVE-2024-44278, CVE-2024-40813, CVE-2024-23251, CVE-2024-27884, CVE-2025-24251, CVE-2024-44269, CVE-2024-54510, CVE-2024-54538, CVE-2024-23282, CVE-2025-24159, CVE-2024-40793, CVE-2024-54486, CVE-2024-44290, CVE-2024-27801, CVE-2024-40779, CVE-2024-54530, CVE-2024-27838, CVE-2024-44183, CVE-2024-27810, CVE-2024-40812, CVE-2024-54478, CVE-2024-44192, CVE-2024-44169, CVE-2025-24158, CVE-2024-27806, CVE-2024-27828, CVE-2024-40776, CVE-2024-27805, CVE-2025-24129, CVE-2024-54499, CVE-2024-40780, CVE-2024-40805, CVE-2024-40788, CVE-2024-44144, CVE-2024-40818, CVE-2024-27863, CVE-2025-24117, CVE-2024-54512, CVE-2025-24160, CVE-2024-44296, CVE-2024-54523, CVE-2024-27880, CVE-2025-24163, CVE-2024-27811, CVE-2024-54467, CVE-2024-44185, CVE-2025-24086, CVE-2024-27830, CVE-2025-24124, CVE-2024-27840, CVE-2024-44240, CVE-2025-24123, CVE-2024-54505, CVE-2024-40782, CVE-2024-54479, CVE-2025-24107, CVE-2024-54535, CVE-2024-54526, CVE-2024-44225, CVE-2024-44302, CVE-2024-54527, CVE-2025-24149, CVE-2024-40806, CVE-2024-54497, CVE-2024-54518, CVE-2025-31203, CVE-2024-40777, CVE-2024-44215, CVE-2024-40784, CVE-2024-54468, CVE-2024-40835, CVE-2024-44254, CVE-2024-54525, CVE-2024-44187, CVE-2024-44176, CVE-2024-44233, CVE-2024-54514, CVE-2024-40799, CVE-2024-40795, CVE-2024-54501, CVE-2024-54543, CVE-2024-40857, CVE-2024-27815, CVE-2024-54551, CVE-2024-27804, CVE-2024-40822, CVE-2024-44171, CVE-2025-24162, CVE-2025-24085, CVE-2024-44170, CVE-2024-44282, CVE-2024-44155, CVE-2024-40789, CVE-2024-44285, CVE-2024-44212, CVE-2024-40787, CVE-2024-44194, CVE-2024-54517, CVE-2024-27816, CVE-2025-24137, CVE-2024-40815, CVE-2024-44244, CVE-2024-44255, CVE-2024-44273, CVE-2025-24126, CVE-2024-40850, CVE-2024-40829, CVE-2025-24131, CVE-2024-40836, CVE-2024-27851, CVE-2024-44234, CVE-2024-54500, CVE-2024-44191, CVE-2024-27808, CVE-2025-24161, CVE-2024-27823, CVE-2024-44198, CVE-2024-54508, CVE-2024-40785, CVE-2024-27820, CVE-2024-27856, CVE-2024-27834, CVE-2024-44232, CVE-2024-54541, CVE-2024-27800, CVE-2024-54502, CVE-2024-27821, CVE-2024-40824, CVE-2024-44239, CVE-2024-27814, CVE-2024-44297, CVE-2024-54542 |
heuristics/extracted_sars | ADV_ARC.1, ATE_COV.1, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ASE_SPD.1, ADV_TDS.1, ASE_OBJ.2, ASE_REQ.2, AVA_VAN.2, ATE_FUN.1, ASE_TSS.1, ATE_IND.2, ALC_CMC.2, ASE_CCL.1, ALC_FLR.1, ALC_CMS.2, ASE_ECD.1, ASE_INT.1, ADV_FSP.2 | ALC_FLR.3, ADV_ARC.1, ADV_FSP.3, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, AGD_PRE.1, ASE_SPD.1, ADV_TDS.1, ASE_OBJ.2, ASE_REQ.2, AVA_VAN.2, ATE_FUN.1, ASE_TSS.1, ATE_IND.2, ALC_CMC.2, ASE_CCL.1, ALC_CMS.2, ASE_ECD.1, ASE_INT.1 |
heuristics/extracted_versions | 8.1.0 | 10.4 |
pdf_data/cert_filename | AISEP_Certificate_2024_150_Rubrik Cloud Data Management v8.1.0_EFT-T039_os.pdf | Certificat-ANSSI-CC-2024_41fr.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | AISEP-CC-CR-2024-EFT-T039-CR-V1.0.pdf | ANSSI-CC-2024_41fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Rubrik CDM EAL2 ST v1.0.pdf | ANSSI-Cible-CC-2024_41en.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |