name |
SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1)
|
Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2
|
category |
Databases
|
Databases
|
not_valid_before |
2017-02-15
|
2024-05-15
|
not_valid_after |
2022-02-15
|
2029-05-15
|
scheme |
JP
|
ES
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_ST.pdf
|
status |
archived
|
active
|
manufacturer |
Microsoft Corporation
|
Microsoft Corporation
|
manufacturer_web |
https://www.microsoft.com
|
https://www.microsoft.com
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36-INF-4306.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_eimg.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_Certificado.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf', 'pp_ids': frozenset({'DBMS_PP'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'collaborative Protection Profile (cPP) for Database Management Systems', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/[CPPDBMS13]%20cPP_DBMS_V1.3.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
e06b4bf851a233995c42ea3442c808670fa41d0a9623dcc6edcb29d625e31239
|
7d6ee87817da5efc5c367e1912cb0a42c04792403c9fffa1bc8475426bdeb9b7
|
state/cert/txt_hash |
d6f03332aaf99dee97c2c1bee96bfbe235b26ac32e9ddd3df2b047a8bda650ba
|
997b9646d9a32d0f15a88dd1b8bbc1717d7ca4213f37fc532f57aa9e00ff5ddf
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
c01e18dbdad0c499dc46b42ce4d19384899797a509f8647ca809715d05dc16ec
|
d7c1dfb698bda2ded4641166a448ed808877abb3ada35f21cc9da144a2580f8a
|
state/report/txt_hash |
ea6efabb475d8107b300bf1572a0e13a8d393ace9dc5452dc1f81ba225faa42f
|
33d2434921e10ffde1cb50f04f30f08c2cc5729f69618d4a75750074f5bbdd81
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f0c8433c7f20b1ce5fd24304cff9661223f1afad4e63512f2605f1e794bb47cb
|
eeac31d20681d63944b3d64c3258dc60cb00ee7e99415c70502ec8a27c3b15a7
|
state/st/txt_hash |
366a3938d32ee8c03f1719b4490a4ee05c88db9451aabecfbb21752a48f9ce6d
|
03068c22e51508233093b557e10c695fd9050521fa8752fba7c613c9faa9fd63
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0537
|
2022-36-INF-4306
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
cpe:2.3:a:microsoft:sql_server_2016:13.0.4001.0:*:*:*:*:*:*:* |
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_FLR.2 |
ADV_FSP.2, ALC_CMC.2, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, ALC_FLR.3, AVA_VAN.2 |
heuristics/extracted_versions |
13.0.4001.0 |
16.0.4105.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
CVE-2024-37331, CVE-2024-37323, CVE-2024-35271, CVE-2024-35256, CVE-2024-37332, CVE-2024-37326, CVE-2024-37321, CVE-2024-37322, CVE-2024-37333, CVE-2024-38088, CVE-2024-35272, CVE-2024-37320, CVE-2024-37330, CVE-2024-21449, CVE-2024-37329, CVE-2024-37319, CVE-2024-38087, CVE-2024-37336, CVE-2024-37327, CVE-2024-37324, CVE-2024-37328, CVE-2024-37318 |
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0537
- supplier:
Microsoft Corporation
- toe_overseas_name:
SQL Server 2016 Database Engine Enterprise Edition x64 (English)13.0.4001.0 (including Service Pack 1)
- expiration_date:
2022-03
- claim:
EAL2+ALC_FLR.2 PP
- certification_date:
2017-02
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0537_it5563.html
- toe_japan_name:
-----
- enhanced:
- product:
SQL Server 2016 Database Engine Enterprise Edition x64 (English)
- toe_version:
13.0.4001.0 (including Service Pack 1)
- product_type:
Database Management System (DBMS)
- certification_date:
2017-02-15
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
- vendor:
Microsoft Corporation
- evaluation_facility:
TÜV Informationstechnik GmbH,
Evaluation Body for IT-Security
- report_link:
https://www.ipa.go.jp/en/security/c0537_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0537_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0537_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way.
TOE security functionality
This TOE provides the following security functionality:
-
The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE.
-
The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE.
-
The Security Audit function of the TOE produces log files about all security relevant events.
-
The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE.
-
The Identification and Authentication function of the TOE is able to identify and authenticate users.
-
The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
c0537_eimg.pdf
|
2022-36_Certificado.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar/ALC |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
1
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor/Microsoft |
|
- Microsoft: 3
- Microsoft Corporation:
1
|
pdf_data/cert_keywords/vendor/Microsoft/Microsoft Corporation |
1
|
1
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
415538
- pdf_is_encrypted:
True
- pdf_number_of_pages:
1
- /CreationDate:
D:20170316155916+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20170316160045+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
857353
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Title:
- /CreationDate:
- /Producer:
- /ModDate:
- /Trapped:
- /Creator:
- /Keywords:
- /Author:
- /Subject:
- pdf_hyperlinks:
|
pdf_data/cert_metadata//CreationDate |
D:20170316155916+09'00'
|
|
pdf_data/cert_metadata//Creator |
Microsoft® Word 2010
|
|
pdf_data/cert_metadata//ModDate |
D:20170316160045+09'00'
|
|
pdf_data/cert_metadata//Producer |
Microsoft® Word 2010
|
|
pdf_data/cert_metadata/pdf_file_size_bytes |
415538
|
857353
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
2
|
pdf_data/report_filename |
c0537_erpt.pdf
|
2022-36-INF-4306.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0537-01:
1
- Certification No. C0537:
1
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ACCESS_TSFDATA:
1
- T.ACCESS_TSFFUNC:
1
- T.IA_MASQUERADE:
1
- T.IA_USER:
1
- T.RESIDUAL_DATA:
1
- T.TSF_COMPROMISE:
1
- T.UNAUTHORIZED_:
1
- A:
- A.PHYSICAL:
1
- A.AUTHUSER:
1
- A.MANAGE:
1
- A.TRAINEDUSER:
1
- A.NO_GENERAL_:
1
- A.SUPPORT:
1
- A.CONNECT:
1
|
|
pdf_data/report_keywords/cc_claims/A |
- A.PHYSICAL:
1
- A.AUTHUSER:
1
- A.MANAGE:
1
- A.TRAINEDUSER:
1
- A.NO_GENERAL_:
1
- A.SUPPORT:
1
- A.CONNECT:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
1
- ADV_TDS.1:
1
- AGD:
- ALC:
- ALC_FLR.3:
7
- ALC_CMC.2:
1
- ALC_DEL.1:
1
- ALC_FLR:
2
- ATE:
- ATE_COV.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_SPD.1:
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_FLR.3:
7
- ALC_CMC.2:
1
- ALC_DEL.1:
1
- ALC_FLR:
2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2:
4
- EAL2+:
2
- EAL2 augmented:
3
|
- EAL:
- EAL2:
8
- EAL2+:
4
- EAL 1:
1
- EAL 4:
2
- EAL 2:
1
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2:
4
- EAL2+:
2
- EAL2 augmented: 3
|
- EAL2:
8
- EAL2+:
4
- EAL 1: 1
- EAL 4: 2
- EAL 2: 1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
4
|
8
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2+ |
2
|
4
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1:
1
- FAU_GEN.2:
1
- FAU_SEL.1:
1
- FDP:
- FDP_ACC.1:
1
- FDP_ACF.1:
1
- FDP_RIP.1:
1
- FIA:
- FIA_ATD.1:
1
- FIA_UAU.2:
1
- FIA_UID.2:
1
- FIA_USB_EXT.2:
1
- FMT:
- FMT_MSA.1:
1
- FMT_MSA.3:
1
- FMT_MTD.1:
1
- FMT_REV.1:
2
- FMT_SMF.1:
1
- FMT_SMR.1:
1
- FTA:
- FTA_MCS.1:
1
- FTA_TAH_EXT.1:
1
- FTA_TSE.1:
1
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
4
|
- DEKRA:
- DEKRA Testing and Certification:
4
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft |
5
|
19
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft Corporation |
7
|
3
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
240723
- pdf_is_encrypted:
True
- pdf_number_of_pages:
33
- /CreationDate:
D:20170316160424+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20170316160534+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
401622
- pdf_is_encrypted:
False
- pdf_number_of_pages:
15
- /Title:
- /CreationDate:
- /Producer:
- /ModDate:
- /Creator:
- /Trapped:
- /Keywords:
- /Author:
- /Subject:
- pdf_hyperlinks:
https://www.sogis.eu/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//CreationDate |
D:20170316160424+09'00'
|
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
|
pdf_data/report_metadata//ModDate |
D:20170316160534+09'00'
|
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
240723
|
401622
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.sogis.eu/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
33
|
15
|
pdf_data/st_filename |
c0537_est.pdf
|
2022-36_ST.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A/A.AUTHUSER |
3
|
3
|
pdf_data/st_keywords/cc_claims/A/A.CONNECT |
4
|
4
|
pdf_data/st_keywords/cc_claims/A/A.MANAGE |
3
|
4
|
pdf_data/st_keywords/cc_claims/A/A.NO_GENERAL_PURPOSE |
3
|
3
|
pdf_data/st_keywords/cc_claims/A/A.PHYSICAL |
3
|
2
|
pdf_data/st_keywords/cc_claims/A/A.SUPPORT |
4
|
4
|
pdf_data/st_keywords/cc_claims/A/A.TRAINEDUSER |
3
|
3
|
pdf_data/st_keywords/cc_claims/O |
- O.ACCESS_HISTORY: 9
- O.ADMIN_ROLE:
8
- O.AUDIT_GENERATION:
6
- O.DISCRETIONARY_ACCESS:
5
- O.MANAGE:
11
- O.MEDIATE: 8
- O.RESIDUAL_INFORMATION:
8
- O.TOE_ACCESS:
18
- O.AUDIT_GENERATI: 1
- O.DISCRETIONARY_: 1
- O.RESIDUAL_INFOR: 1
|
- O.ADMIN_ROLE:
9
- O.AUDIT_GENERATION:
5
- O.DISCRETIONARY_ACCESS:
3
- O.MANAGE:
11
- O.RESIDUAL_INFORMATION:
5
- O.TOE_ACCESS:
17
- O.DISCRETIONARY_ACCES: 4
|
pdf_data/st_keywords/cc_claims/O/O.ADMIN_ROLE |
8
|
9
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT_GENERATION |
6
|
5
|
pdf_data/st_keywords/cc_claims/O/O.DISCRETIONARY_ACCESS |
5
|
3
|
pdf_data/st_keywords/cc_claims/O/O.MANAGE |
11
|
11
|
pdf_data/st_keywords/cc_claims/O/O.RESIDUAL_INFORMATION |
8
|
5
|
pdf_data/st_keywords/cc_claims/O/O.TOE_ACCESS |
18
|
17
|
pdf_data/st_keywords/cc_claims/OE |
- OE.ADMIN:
12
- OE.INFO_PROTECT:
19
- OE.NO_GENERAL_:
2
- OE.PHYSICAL:
8
- OE.IT_REMOTE: 10
- OE.IT_TRUSTED_SYSTEM:
9
- OE.NO_GENERAL_PURPOSE:
6
|
- OE.ADMIN:
8
- OE.INFO_PROTECT:
15
- OE.NO_GENERAL_:
1
- OE.PHYSICAL:
6
- OE.IT_TRUSTED_SYSTEM:
6
- OE.NO_GENERAL_PURPOSE:
3
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
12
|
8
|
pdf_data/st_keywords/cc_claims/OE/OE.INFO_PROTECT |
19
|
15
|
pdf_data/st_keywords/cc_claims/OE/OE.IT_TRUSTED_SYSTEM |
9
|
6
|
pdf_data/st_keywords/cc_claims/OE/OE.NO_GENERAL_ |
2
|
1
|
pdf_data/st_keywords/cc_claims/OE/OE.NO_GENERAL_PURPOSE |
6
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
8
|
6
|
pdf_data/st_keywords/cc_claims/T |
- T.ACCESS_TSFDATA:
3
- T.ACCESS_TSFFUNC:
3
- T.IA_MASQUERADE: 4
- T.IA_USER:
3
- T.RESIDUAL_DATA:
3
- T.TSF_COMPROMISE: 4
- T.UNAUTHORIZED_ACCESS:
4
|
- T.ACCESS_TSFDATA:
4
- T.ACCESS_TSFFUNC:
4
- T.IA_USER:
5
- T.RESIDUAL_DATA:
3
- T.UNAUTHORIZED_ACCESS:
4
- T.UNAUTHORIZED_ACCES: 1
|
pdf_data/st_keywords/cc_claims/T/T.ACCESS_TSFDATA |
3
|
4
|
pdf_data/st_keywords/cc_claims/T/T.ACCESS_TSFFUNC |
3
|
4
|
pdf_data/st_keywords/cc_claims/T/T.IA_USER |
3
|
5
|
pdf_data/st_keywords/cc_claims/T/T.RESIDUAL_DATA |
3
|
3
|
pdf_data/st_keywords/cc_claims/T/T.UNAUTHORIZED_ACCESS |
4
|
4
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_ADD:
3
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.3:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/AGD |
|
- AGD_ADD:
3
- AGD_OPE.1: 1
- AGD_PRE.1: 1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_ADD |
3
|
3
|
pdf_data/st_keywords/cc_sar/ALC |
|
- ALC_FLR.3:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL2+:
66
- EAL2:
1
- EAL 2: 3
- EAL2 augmented:
1
- EAL 2 augmented: 1
|
- EAL2+:
62
- EAL2:
4
- EAL2 augmented:
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 |
1
|
4
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 augmented |
1
|
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2+ |
66
|
62
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
9
- FAU_GEN.2:
6
- FAU_SEL.1:
7
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SEL.1.1:
1
|
- FAU_GEN.1:
9
- FAU_GEN.2:
6
- FAU_SEL.1:
7
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SEL.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
15
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_USB.1:
5
- FIA_ATD.1:
15
- FIA_UAU.1: 7
- FIA_UID.1:
14
- FIA_ATD.1.1:
3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
|
- FIA_USB_EXT.2: 21
- FIA_USB.1:
5
- FIA_ATD.1:
14
- FIA_UAU.2: 7
- FIA_UID.2: 11
- FIA_ATD.1.1:
3
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_USB_EXT.2.1: 1
- FIA_USB_EXT.2.2: 1
- FIA_USB_EXT.2.3: 1
- FIA_USB_EXT.2.4: 1
- FIA_UID.1:
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
15
|
14
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
14
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1: 6
- FMT_MSA.1:
7
- FMT_MSA.3:
8
- FMT_MTD.1:
6
- FMT_REV.1:
12
- FMT_SMF.1:
11
- FMT_SMR.1:
18
- FMT_MOF.1.1: 1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_REV.1.1:
2
- FMT_REV.1.2:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MSA.1:
8
- FMT_MSA.3:
8
- FMT_MTD.1:
9
- FMT_REV.1:
13
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_REV.1.1:
2
- FMT_REV.1.2:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
6
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1 |
12
|
13
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
18
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TRC.1: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_STM.1:
1
- FPT_ITT.1: 1
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_MCS.1:
7
- FTA_TSE.1:
6
- FTA_MCS.1.1:
1
- FTA_MCS.1.2:
1
- FTA_TSE.1.1:
1
- FTA_TAH: 1
|
- FTA_TAH_EXT.1: 17
- FTA_TAH_EXT.1.1: 2
- FTA_TAH_EXT.1.2: 2
- FTA_MCS.1:
7
- FTA_TSE.1:
6
- FTA_MCS.1.1:
1
- FTA_MCS.1.2:
1
- FTA_TSE.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_MCS.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_MCS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_MCS.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_TSE.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_TSE.1.1 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft |
10
|
22
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft Corporation |
3
|
3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1446524
- pdf_is_encrypted:
False
- pdf_number_of_pages:
65
- /Title:
Security Target - SQL Server 2016
- /Author:
SQL Team
- /Subject:
Security Target
- /Keywords:
CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20161221140607+01'00'
- /ModDate:
D:20161221140607+01'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
https://www.microsoft.com/licensing/servicecenter/default.aspx, https://www.microsoft.com/sqlserver/en/us/common-criteria.aspx
|
- pdf_file_size_bytes:
561416
- pdf_is_encrypted:
False
- pdf_number_of_pages:
61
- /Title:
- /CreationDate:
- /Producer:
- /ModDate:
- /Creator:
- /Trapped:
- /Keywords:
- /Author:
- /Subject:
- pdf_hyperlinks:
https://www.microsoft.com/en-us/sql-server/data-security, https://www.catalog.update.microsoft.com/Search.aspx?q=sql%20server%202022, https://www.microsoft.com/licensing/servicecenter/default.aspx
|
pdf_data/st_metadata//Author |
SQL Team
|
|
pdf_data/st_metadata//CreationDate |
D:20161221140607+01'00'
|
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
|
pdf_data/st_metadata//Keywords |
CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System
|
|
pdf_data/st_metadata//ModDate |
D:20161221140607+01'00'
|
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
|
pdf_data/st_metadata//Subject |
Security Target
|
|
pdf_data/st_metadata//Title |
Security Target - SQL Server 2016
|
|
pdf_data/st_metadata/pdf_file_size_bytes |
1446524
|
561416
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
65
|
61
|
dgst |
a43cc3e7f97cf843
|
3995c890eb3f0843
|