Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
KONICA MINOLTA AccurioPress C14000/C12000 with UK-112/PF-713GM0-20
JISEC-CC-CRP-C0715-01-2021
Red Hat Enterprise Linux 8.2
CCEVS-VR-11202-2022
name KONICA MINOLTA AccurioPress C14000/C12000 with UK-112/PF-713GM0-20 Red Hat Enterprise Linux 8.2
category Multi-Function Devices Operating Systems
scheme JP US
status active archived
not_valid_after 24.03.2026 09.03.2024
not_valid_before 24.03.2021 09.03.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0715_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11202-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0715_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11202-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0715_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11202-st.pdf
manufacturer KONICA MINOLTA, INC. Red Hat, Inc.
manufacturer_web https://www.konicaminolta.com/index.html https://www.redhat.com
dgst a0f702c5cb0a6303 a5171efab0a32451
heuristics/cert_id JISEC-CC-CRP-C0715-01-2021 CCEVS-VR-11202-2022
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2022-2601, CVE-2019-7222, CVE-2019-2757, CVE-2019-2644, CVE-2019-2819, CVE-2023-46846, CVE-2019-10192, CVE-2018-20662, CVE-2019-11884, CVE-2019-0757, CVE-2019-3816, CVE-2019-9903, CVE-2019-2834, CVE-2019-2617, CVE-2019-2596, CVE-2020-27749, CVE-2019-2830, CVE-2019-2636, CVE-2019-2810, CVE-2019-2626, CVE-2019-9791, CVE-2019-2808, CVE-2019-2739, CVE-2019-2587, CVE-2023-5869, CVE-2020-14372, CVE-2019-2539, CVE-2019-2436, CVE-2019-2814, CVE-2021-3672, CVE-2020-14311, CVE-2019-2785, CVE-2020-25717, CVE-2024-1488, CVE-2019-2740, CVE-2019-2803, CVE-2019-2592, CVE-2019-17024, CVE-2019-6109, CVE-2019-2796, CVE-2019-2620, CVE-2019-2774, CVE-2024-0229, CVE-2018-18897, CVE-2022-0847, CVE-2019-3459, CVE-2019-3460, CVE-2019-2634, CVE-2019-2510, CVE-2019-2691, CVE-2019-2780, CVE-2018-10392, CVE-2019-10126, CVE-2019-2684, CVE-2020-25719, CVE-2021-4034, CVE-2019-2628, CVE-2019-1010238, CVE-2019-9755, CVE-2021-3621, CVE-2020-27779, CVE-2019-2797, CVE-2021-3570, CVE-2020-14310, CVE-2020-6851, CVE-2019-2481, CVE-2019-2784, CVE-2019-2581, CVE-2019-9506, CVE-2019-2602, CVE-2019-2879, CVE-2023-5455, CVE-2019-2589, CVE-2019-7548, CVE-2019-2535, CVE-2019-2635, CVE-2019-14287, CVE-2019-2624, CVE-2020-14355, CVE-2021-20225, CVE-2019-2805, CVE-2016-2124, CVE-2018-12121, CVE-2020-25632, CVE-2019-11833, CVE-2019-16884, CVE-2022-0435, CVE-2019-2685, CVE-2019-5010, CVE-2019-2536, CVE-2022-0492, CVE-2020-1045, CVE-2019-2681, CVE-2019-6111, CVE-2023-3972, CVE-2018-20685, CVE-2019-15604, CVE-2019-2533, CVE-2019-2683, CVE-2019-2534, CVE-2020-25647, CVE-2024-3183, CVE-2019-2801, CVE-2019-2530, CVE-2019-2623, CVE-2023-3899, CVE-2021-3656, CVE-2019-11135, CVE-2021-3697, CVE-2019-2537, CVE-2023-5868, CVE-2019-2529, CVE-2019-2420, CVE-2019-2695, CVE-2019-2503, CVE-2021-3696, CVE-2019-2795, CVE-2019-10193, CVE-2021-20233, CVE-2019-6454, CVE-2019-12527, CVE-2019-2606, CVE-2018-18506, CVE-2022-4254, CVE-2019-2607, CVE-2023-5870, CVE-2021-44142, CVE-2019-2689, CVE-2019-9810, CVE-2019-2694, CVE-2022-0330, CVE-2019-2531, CVE-2021-3609, CVE-2019-2778, CVE-2019-15718, CVE-2019-2789, CVE-2019-2800, CVE-2019-9788, CVE-2019-0211, CVE-2019-2812, CVE-2019-11356, CVE-2019-7164, CVE-2019-2455, CVE-2019-0160, CVE-2019-7150, CVE-2023-46847, CVE-2019-2752, CVE-2019-3887, CVE-2019-9959, CVE-2019-9948, CVE-2019-13734, CVE-2019-2688, CVE-2019-2811, CVE-2019-15605, CVE-2019-9792, CVE-2019-2738, CVE-2019-2630, CVE-2021-40438, CVE-2019-7664, CVE-2019-9636, CVE-2019-2532, CVE-2019-2584, CVE-2018-16878, CVE-2019-0820, CVE-2021-3695, CVE-2019-2627, CVE-2019-11043, CVE-2018-10393, CVE-2019-2593, CVE-2019-6470, CVE-2019-13313, CVE-2019-2798, CVE-2019-2434, CVE-2019-2580, CVE-2019-2614, CVE-2019-2687, CVE-2019-11459, CVE-2019-14814, CVE-2019-2826, CVE-2019-2802, CVE-2019-2686, CVE-2019-7310, CVE-2018-16877, CVE-2019-2693, CVE-2020-9490, CVE-2019-2631, CVE-2019-2755, CVE-2019-14816, CVE-2019-7665, CVE-2023-0494, CVE-2018-20650, CVE-2019-12817, CVE-2019-14815, CVE-2019-2698, CVE-2019-13272, CVE-2019-2625, CVE-2019-2815, CVE-2019-12450, CVE-2019-2585
heuristics/extracted_sars AGD_PRE.1, ATE_IND.1, ASE_ECD.1, ASE_OBJ.1, AVA_VAN.1, ASE_INT.1, ALC_CMS.1, AGD_OPE.1, ASE_CCL.1, ASE_SPD.1, ALC_CMC.1, ASE_REQ.1, ADV_FSP.1, ASE_TSS.1 ATE_IND.1, AVA_VAN.1, AGD_PRE.1, ASE_ECD.1, ASE_INT.1, ALC_CMS.1, ALC_TSU_EXT.1, ASE_CCL.1, AGD_OPE.1, ASE_REQ.2, ALC_CMC.1, ASE_OBJ.2, ADV_FSP.1, ASE_TSS.1
heuristics/extracted_versions 20, 112 8.2
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0715
  • certification_date: 01.03.2021
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0715
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001bp0-att/c0715_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Product (MFP) that has the functions, such as copy, scan and Document storage and retrieval. The TOE provides the security functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and authentication function Access control function Storage encryption function Trusted communications function Security management function Audit function Software update verification function Self-testing function
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: KONICA MINOLTA AccurioPress C14000/C12000 with UK-112/PF-713
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001bp0-att/c0715_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000001bp0-att/c0715_est.pdf
    • toe_version: GM0-20
    • vendor: KONICA MINOLTA, INC.
  • expiration_date:
  • supplier: KONICA MINOLTA, INC.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0715_it0770.html
  • toe_japan_name: KONICA MINOLTA AccurioPress C14000 / C12000 with UK-112 / PF-713GM0-20
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles b2cfec7a92fa2940 236bced46aeb26ba, e34797b67a3163c5
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf
pdf_data/cert_filename c0715_eimg.pdf st_vid11202-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0715-01-2021: 1
  • US:
    • CCEVS-VR-VID11202-2022: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210602111131+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210602115738+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 84683
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20220311142731-05'00'
  • /ModDate: D:20220311142731-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180967
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0715_erpt.pdf st_vid11202-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-11202-2022
    • cert_item: for the Red Hat Enterprise Linux 8.2
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0715-01-2021: 1
  • US:
    • CCEVS-VR-11202-2022: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
  • FTP:
    • FTP_TRP.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.2: 2
    • FCS_COP.1: 5
    • FCS_RBG_EXT.1: 1
    • FCS_SSHC_EXT.1: 5
    • FCS_SSHS_EXT.1: 1
    • FCS_TLSC_EXT.1: 4
  • FPT:
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 5
  • RSA:
    • RSA 2048: 1
    • RSA 4096: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 38
    • SSHv2: 5
  • TLS:
    • TLS:
      • TLS: 14
      • TLSv1.2: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 16
    • P-521: 12
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2022-0847: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20210720114803+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210720115419+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 417028
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
pdf_data/st_filename c0715_est.pdf st_vid11202-st.pdf
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 13
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 37
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 31
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 114
    • FCS_COP.1.1: 7
    • FCS_KDF_EXT: 3
    • FCS_KDF_EXT.1: 13
    • FCS_KDF_EXT.1.1: 4
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 6
    • FCS_KYC_EXT.1.1: 3
    • FCS_PCC_EXT: 3
    • FCS_PCC_EXT.1: 7
    • FCS_PCC_EXT.1.1: 2
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 38
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SMC_EXT.1: 7
    • FCS_SNI_EXT: 3
    • FCS_SNI_EXT.1: 5
    • FCS_SNI_EXT.1.1: 3
    • FCS_SNI_EXT.1.2: 2
    • FCS_SNI_EXT.1.3: 2
    • FCS_SSH_EXT.1: 4
    • FCS_TLS_EXT.1: 4
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 2
    • FDP_DSK_EXT.1: 7
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 10
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 2
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 4
    • FPT_KYP_EXT.1.1: 2
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 7
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 25
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 8
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHS_EXT.1: 5
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSH_EXT.1: 4
    • FCS_SSH_EXT.1.1: 1
    • FCS_STO_EXT.1: 3
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 3
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT.1: 3
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT.1: 3
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT.1: 3
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 7
    • D.USER: 7
  • O:
    • O.ACCESS_CONTROL: 7
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 10
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 2
    • O.STORAGE_ENCRYPTION: 7
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTE: 1
    • OE.PHYSICAL_PROTE: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_A: 1
    • T.UNAUTHORIZED_U: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 3
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 26
      • AES-: 1
      • AES-256: 4
  • constructions:
    • MAC:
      • HMAC: 13
      • HMAC-SHA-256: 6
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 4
  • AES_competition:
    • AES:
      • AES: 10
      • AES-128: 1
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 3
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 7
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • Diffie-Hellman: 7
  • RSA:
    • RSA 2048: 5
    • RSA 4096: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 2
      • SHA-256: 18
      • SHA-384: 10
      • SHA-512: 14
      • SHA384: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 8
      • SHA-384: 6
      • SHA-512: 7
      • SHA2: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 5
    • IKEv1: 20
    • IKEv2: 9
  • IPsec:
    • IPsec: 64
  • SSH:
    • SSH: 6
  • TLS:
    • TLS:
      • TLS: 6
  • SSH:
    • SSH: 93
    • SSHv2: 5
  • TLS:
    • TLS:
      • TLS: 33
      • TLS 1.2: 1
      • TLSv1.2: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 10
    • RNG: 6
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 22
  • CTR:
    • CTR: 7
  • GCM:
    • GCM: 10
  • XTS:
    • XTS: 4
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 2
    • P-521: 2
  • NIST:
    • P-256: 36
    • P-384: 36
    • P-521: 22
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 8
    • FIPS PUB 197: 3
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 10116: 14
    • ISO/IEC 10118: 4
    • ISO/IEC 10118-: 2
    • ISO/IEC 18031:2011: 5
    • ISO/IEC 18033-3: 1
    • ISO/IEC 19772: 8
  • NIST:
    • NIST SP 800-108: 3
    • NIST SP 800-132: 6
    • NIST SP 800-38A: 3
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-90A: 7
  • RFC:
    • RFC 3602: 10
    • RFC 4106: 6
    • RFC 4109: 3
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4304: 5
    • RFC 4868: 7
    • RFC 5282: 3
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 3
    • FIPS 197: 1
    • FIPS 198-1: 1
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 800-56A: 2
  • RFC:
    • RFC 3526: 1
    • RFC 4251: 1
    • RFC 4253: 2
    • RFC 5246: 5
    • RFC 5280: 4
    • RFC 5288: 4
    • RFC 5289: 12
    • RFC 5759: 1
    • RFC 6125: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20210719150234+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210719150234+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 1013678
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different