| name |
Trustwave SIEM Operations Edition Version 5.9.0 and Trustwave SIEM LP Software Version 1.2.1 |
MultiApp V5.0 Platform (configuration 1 : 5.0.1 version 2a et configuration 2 : 5.0.1 version 2b) (ANSSI-CC-2025/42) |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
CA |
FR |
| status |
archived |
active |
| not_valid_after |
19.04.2018 |
01.12.2030 |
| not_valid_before |
19.07.2012 |
01.12.2025 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-certificat.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-210%20CR%20v1.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-rapport.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Trustwave%20SIEM%20ST%20v112.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-cible.pdf |
| manufacturer |
Trustwave |
THALES DIS FRANCE SA |
| manufacturer_web |
https://www.trustwave.com |
https://www.thalesgroup.com/en/europe/france |
| security_level |
EAL3+, ALC_FLR.2 |
ALC_FLR.1, EAL6+ |
| dgst |
a11aec14069e0009 |
da810f38d3629ce7 |
| heuristics/cert_id |
383-4-210 |
ANSSI-CC-2025/42 |
| heuristics/cert_lab |
CANADA |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_FLR.2, ALC_LCD.1, ALC_DEL.1, ALC_DVS.1, ATE_FUN.1, ALC_CMS.3, ALC_CMC.3, AGD_PRE.1, ADV_TDS.2, ATE_COV.2, ATE_IND.2, AGD_OPE.1, AVA_VAN.2, ATE_DPT.1, ADV_FSP.3, ADV_ARC.1 |
ALC_TAT.3, ATE_DPT.3, ALC_CMS.5, ASE_SPD.1, ASE_CCL.1, ADV_IMP.2, ASE_REQ.2, AGD_PRE.1, AGD_OPE.1, ADV_SPM.1, ALC_LCD.1, ALC_DEL.1, ATE_FUN.2, ALC_FLR.1, ADV_FSP.5, ASE_ECD.1, ATE_IND.2, ADV_INT.3, ADV_ARC.1, ATE_COV.3, ASE_INT.1, ALC_DVS.2, AVA_VAN.5, ASE_OBJ.2, ALC_CMC.5, ASE_TSS.1, ADV_TDS.5 |
| heuristics/extracted_versions |
1.2.1, 5.9.0 |
5.0, 5.0.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2025/46 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V5-2024 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2025/46 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022, BSI-DSZ-CC-1107-V5-2024, BSI-DSZ-CC-1107-V4-2023 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V5-2024 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V5-2024 |
| heuristics/protection_profiles |
c35130f971f5e66f |
7f886b64878b68c1 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_ana_br_v1.3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf |
| pdf_data/cert_filename |
|
ANSSI-CC-2025-42-certificat.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20251126120544+01'00'
- /Creator: Acrobat PDFMaker 25 pour Word
- /ModDate: D:20251202070142-08'00'
- /Producer: PDFKit.NET 12.3.757.0 DMV10
- pdf_file_size_bytes: 302417
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
383-4-210 CR v1.0e.pdf |
ANSSI-CC-2025-42-rapport.pdf |
| pdf_data/report_frontpage |
- FR:
- CA:
- cert_id: 383-4-210-CR
- cert_lab: CANADA
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V5-2024: 1
- FR:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 2
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 4
- EAL 3 augmented: 2
- EAL 3+: 3
|
- EAL:
- EAL2: 2
- EAL6: 1
- EAL6+: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: User
- /CCEF: EWA-Canada
- /CR date: 19 July 2012
- /CR version: 1.0
- /Certificate date: 19 July 2012
- /CreationDate: D:20120719083558-04'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer name: Trustwave Holdings, Inc.
- /Document number: 383-4-210-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 3+ Common Criteria Evaluation of Trustwave SIEM LP Software Version 1.2.1 and SIEM Operations Edition Version 5.9.0, Document No. 1732-000-D002 Version 1.1, 4 July 2012
- /Evaluation completion date: 04 July 2012
- /ModDate: D:20120719083606-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /ST Title: Trustwave SIEM LP Software and SIEM Operations Edition Security Target
- /ST date: June 28, 2012
- /ST version: Version 1.12
- /SourceModified: D:20120719123359
- /Sponsor: Trustwave Holdings, Inc.
- /TOE Version: 5.0
- /TOE name and version: Trustwave SIEM Operations Edition Version 5.9.0 and Trustwave SIEM LP Software Version 1.2.1
- /TOE short name: Trustwave SIEM OE Version 5.9.0 and Trustwave SIEM LP Version 1.2.1
- /Title: EAL 3 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 66467
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
|
| pdf_data/st_filename |
Trustwave SIEM ST v112.pdf |
ANSSI-CC-2025-42-cible.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V5-2024: 1
- NL:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0099-V2-2020: 1
- BSI-PP- 0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL2 augmented: 1
- EAL3: 5
- EAL3 augmented: 4
- EAL3+: 2
|
- EAL:
- EAL 6+: 1
- EAL6: 31
- EAL6 augmented: 1
- EAL6+: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 7
- ALC_LCD.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 8
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 5
- ADV_IMP: 1
- ADV_IMP.1: 6
- ADV_IMP.2: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 7
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 7
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 6
- ATE_FUN.2: 1
- ATE_IND.2: 2
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 16
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAR.1: 12
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 10
- FAU_SAR.2.1: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 2
- FAU_STG.1: 1
- FAU_STG.2: 13
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 12
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MTD.1: 16
- FMT_MTD.1.1: 2
- FMT_SMF.1: 10
- FMT_SMF.1.1: 2
- FMT_SMR.1: 11
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 3
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 61
- FCS_CKM.1: 29
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 1
- FCS_CKM.4: 27
- FCS_CKM.4.1: 2
- FCS_CMK.4: 2
- FCS_COP: 66
- FCS_COP.1: 31
- FCS_COP.1.1: 5
- FCS_RNG: 26
- FCS_RNG.1: 14
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 44
- FDP_ACC.1: 20
- FDP_ACC.2: 6
- FDP_ACF: 39
- FDP_ACF.1: 25
- FDP_IFC: 24
- FDP_IFC.1: 14
- FDP_IFC.2: 2
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 11
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 2
- FDP_RIP: 97
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 8
- FDP_SDI.2: 4
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 23
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 1
- FIA_API.1: 2
- FIA_ATD: 12
- FIA_ATD.1: 3
- FIA_UAU: 64
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 42
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 38
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MSA: 96
- FMT_MSA.1: 13
- FMT_MSA.2: 2
- FMT_MSA.3: 21
- FMT_MTD: 57
- FMT_MTD.1: 13
- FMT_MTD.3: 1
- FMT_SMF: 78
- FMT_SMF.1: 29
- FMT_SMF.1.1: 2
- FMT_SMR: 88
- FMT_SMR.1: 38
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 47
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_RCV: 12
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 8
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 7
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.MGMTNETW: 2
- A.MGMTNETWORK: 2
- A.NOEVIL: 3
- A.NOTRST: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 12
- O.AUDITS: 4
- O.EADMIN: 6
- O.EXPORT: 4
- O.IDACTS: 7
- O.IDAUTH: 21
- O.INTEGR: 5
- O.OFLOWS: 6
- O.PROTCT: 8
- O.RESPON: 5
- OE:
- OE: 2
- OE.AUDIT_PRO: 1
- OE.AUDIT_PROTECTION: 1
- OE.AUDIT_SOR: 1
- OE.CREDEN: 5
- OE.INSTAL: 4
- OE.INTROP: 3
- OE.MGMTNET: 1
- OE.MGMTNETWORK: 2
- OE.PERSON: 5
- OE.PHYCAL: 6
- OE.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 3
- T.IMPCON: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.NOHALT: 3
- T.PRIVIL: 3
|
- A:
- A.CAP_FILE: 3
- A.DELETION: 3
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.APP_KEYS: 1
- D.CRYPTO: 5
- D.JCS_CODE: 6
- D.JCS_DATA: 8
- D.OS-: 1
- D.OS-UPDATE-CODE-ID: 3
- D.OS-UPDATE_ADDITIONALCODE: 5
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.ARRAY_VIEWS_CONFID: 7
- O.ARRAY_VIEWS_INTEG: 3
- O.CARD-MANAGEMENT: 1
- O.CARD_MANAGEMENT: 17
- O.CIPHER: 10
- O.CODE_CAP_FILE: 23
- O.CONFID-OS-UPDATE: 3
- O.DELETION: 4
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 9
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 7
- O.JAVAOBJECT: 68
- O.KEY-MNGT: 6
- O.LOAD: 11
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 4
- O.OPERATE: 15
- O.PIN-MNGT: 6
- O.PIN_MNGT: 4
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 2
- O.RNG: 10
- O.SCP: 31
- O.SECURE_AC_ACTIVATION: 4
- O.SECURE_LOAD_ACODE: 9
- O.SID: 13
- O.TDES: 1
- O.TOE_IDENTIFICATION: 6
- O.TRANSACTION: 6
- OE:
- OE.CAP_FILE: 5
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 1
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 10
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 2
- OE.SCP: 2
- OE.SECURE_ACODE_MANAGEMENT: 2
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 7
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 11
- OP.DELETE_APPLET: 6
- OP.DELETE_CAP_FILE: 4
- OP.DELETE_CAP_FILE_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 8
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.RNG: 3
- OSP.TOE_IDENTIFICATION: 3
- OSP.VERIFICATION: 3
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFID-OS-UPDATE_LOAD: 3
- T.DELETION: 3
- T.EXE-CODE: 6
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 3
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 6
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 6
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
|
| pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Thales:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 14
- Triple-DES: 3
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA2: 1
- SHA224: 1
- SHA3:
- SHA3: 2
- SHA3-384: 1
- SHA3-512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 6
- Key agreement: 2
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5.0: JCS Security Target ST Ref: 1
- Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5.0: JCS: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 4
- the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
|
| pdf_data/st_metadata |
- /Author: kbraun
- /CreationDate: D:20120704115903-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20120704115903-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /Title: Microsoft Word - Trustwave SIEM ST v112.doc
- pdf_file_size_bytes: 265273
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
- /Author: OHAYON Franck
- /CreationDate: D:20250916171850+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20250916171850+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: MultiApp V5.0: JCS Security Target LITE
- pdf_file_size_bytes: 3884938
- pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 141
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |