Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1)
JISEC-CC-CRP-C0537
Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2
2022-36-INF-4306
name SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1) Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2
scheme JP ES
status archived active
not_valid_after 15.02.2022 15.05.2029
not_valid_before 15.02.2017 15.05.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36-INF-4306.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_ST.pdf
security_level EAL2+, ALC_FLR.2 EAL2+, ALC_FLR.3
dgst a43cc3e7f97cf843 3995c890eb3f0843
heuristics/cert_id JISEC-CC-CRP-C0537 2022-36-INF-4306
heuristics/cpe_matches cpe:2.3:a:microsoft:sql_server_2016:13.0.4001.0:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2024-37329, CVE-2024-37331, CVE-2024-37326, CVE-2024-35272, CVE-2024-37336, CVE-2024-35256, CVE-2024-35271, CVE-2024-21449, CVE-2024-37321, CVE-2024-37324, CVE-2024-37323, CVE-2024-37332, CVE-2024-37328, CVE-2024-38087, CVE-2024-37319, CVE-2024-37322, CVE-2024-37320, CVE-2024-37327, CVE-2024-38088, CVE-2024-37330, CVE-2024-37333, CVE-2024-37318 {}
heuristics/extracted_sars ALC_FLR.2 ALC_CMC.2, ASE_INT.1, ATE_FUN.1, ATE_COV.1, ADV_TDS.1, ASE_TSS.1, ADV_FSP.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ADV_ARC.1, ALC_CMS.2, ALC_FLR.3, ALC_DEL.1, AGD_OPE.1, ASE_ECD.1, AVA_VAN.2
heuristics/extracted_versions 13.0.4001.0 16.0.4105.2
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0537
  • certification_date: 01.02.2017
  • claim: EAL2+ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0537_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: SQL Server 2016 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • protection_profile: Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
    • report_link: https://www.ipa.go.jp/en/security/c0537_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0537_est.pdf
    • toe_version: 13.0.4001.0 (including Service Pack 1)
    • vendor: Microsoft Corporation
  • expiration_date: 01.03.2022
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0537_it5563.html
  • toe_overseas_name: SQL Server 2016 Database Engine Enterprise Edition x64 (English)13.0.4001.0 (including Service Pack 1)
  • category: Database management systems
  • certification_date: 15.05.2024
  • enhanced:
  • manufacturer: Microsoft Corp.
  • product: Microsoft SQL Server 2022 on Linux Database Engine Enterprise Edition x64 (English) version 16.0.4105.2
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/898-microsoft-sql-server-2022-on-linux-database-engine-enterprise-edition-x64-english-version-16-0-4105-2
protection_profiles
pdf_data/cert_filename c0537_eimg.pdf 2022-36_Certificado.pdf
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL2: 1
    • EAL2+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/cert_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/cert_metadata
  • /CreationDate: D:20170316155916+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170316160045+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 415538
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 857353
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename c0537_erpt.pdf 2022-36-INF-4306.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0537-01: 1
    • Certification No. C0537: 1
  • ES:
    • 2022-36-INF-4306- v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 2
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 8
    • EAL2+: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_SPD.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SEL.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
    • FIA_USB_EXT.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_TAH_EXT.1: 1
    • FTA_TSE.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.AUTHUSER: 1
    • A.CONNECT: 1
    • A.MANAGE: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
    • A.SUPPORT: 1
    • A.TRAINEDUSER: 1
  • T:
    • T.ACCESS_TSFDATA: 1
    • T.ACCESS_TSFFUNC: 1
    • T.IA_MASQUERADE: 1
    • T.IA_USER: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
  • A:
    • A.U: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
    • Microsoft Corporation: 7
  • Microsoft:
    • Microsoft: 19
    • Microsoft Corporation: 3
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • DEKRA:
    • DEKRA Testing and Certification: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 6
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20170316160424+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170316160534+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 240723
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename c0537_est.pdf 2022-36_ST.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 66
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
    • EAL2+: 62
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_ADD: 3
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_ADD: 3
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.3: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 3
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 12
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 7
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 3
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 5
    • FIA_USB_EXT.2: 21
    • FIA_USB_EXT.2.1: 1
    • FIA_USB_EXT.2.2: 1
    • FIA_USB_EXT.2.3: 1
    • FIA_USB_EXT.2.4: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 13
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
  • FTA:
    • FTA_MCS.1: 7
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH_EXT.1: 17
    • FTA_TAH_EXT.1.1: 2
    • FTA_TAH_EXT.1.2: 2
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 4
    • A.MANAGE: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
    • A.SUPPORT: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.ACCESS_HISTORY: 9
    • O.ADMIN_ROLE: 8
    • O.AUDIT_GENERATI: 1
    • O.AUDIT_GENERATION: 6
    • O.DISCRETIONARY_: 1
    • O.DISCRETIONARY_ACCESS: 5
    • O.MANAGE: 11
    • O.MEDIATE: 8
    • O.RESIDUAL_INFOR: 1
    • O.RESIDUAL_INFORMATION: 8
    • O.TOE_ACCESS: 18
  • OE:
    • OE.ADMIN: 12
    • OE.INFO_PROTECT: 19
    • OE.IT_REMOTE: 10
    • OE.IT_TRUSTED_SYSTEM: 9
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 6
    • OE.PHYSICAL: 8
  • T:
    • T.ACCESS_TSFDATA: 3
    • T.ACCESS_TSFFUNC: 3
    • T.IA_MASQUERADE: 4
    • T.IA_USER: 3
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 4
    • T.UNAUTHORIZED_ACCESS: 4
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 4
    • A.MANAGE: 4
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 2
    • A.SUPPORT: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.ADMIN_ROLE: 9
    • O.AUDIT_GENERATION: 5
    • O.DISCRETIONARY_ACCES: 4
    • O.DISCRETIONARY_ACCESS: 3
    • O.MANAGE: 11
    • O.RESIDUAL_INFORMATION: 5
    • O.TOE_ACCESS: 17
  • OE:
    • OE.ADMIN: 8
    • OE.INFO_PROTECT: 15
    • OE.IT_TRUSTED_SYSTEM: 6
    • OE.NO_GENERAL_: 1
    • OE.NO_GENERAL_PURPOSE: 3
    • OE.PHYSICAL: 6
  • T:
    • T.ACCESS_TSFDATA: 4
    • T.ACCESS_TSFFUNC: 4
    • T.IA_USER: 5
    • T.RESIDUAL_DATA: 3
    • T.UNAUTHORIZED_ACCES: 1
    • T.UNAUTHORIZED_ACCESS: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 10
    • Microsoft Corporation: 3
  • Microsoft:
    • Microsoft: 22
    • Microsoft Corporation: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 7
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different