name |
SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1)
|
Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3
|
category |
Databases
|
Databases
|
not_valid_before |
2017-02-15
|
2020-01-27
|
not_valid_after |
2022-02-15
|
2025-01-27
|
scheme |
JP
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1050b_pdf.pdf
|
status |
archived
|
active
|
manufacturer |
Microsoft Corporation
|
Microsoft Corporation
|
manufacturer_web |
https://www.microsoft.com
|
https://www.microsoft.com
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1050a_pdf.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_eimg.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1050c_pdf.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf', 'pp_ids': frozenset({'DBMS_PP'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': frozenset({'DBMS_PPV2.12'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
e06b4bf851a233995c42ea3442c808670fa41d0a9623dcc6edcb29d625e31239
|
4dd11df6b9ed16b02d786a7a62f722da88fffc96eccbf7de756deba0f4a5b5e3
|
state/cert/txt_hash |
d6f03332aaf99dee97c2c1bee96bfbe235b26ac32e9ddd3df2b047a8bda650ba
|
8bc8e08ae07e8cf68eb94df0122a8f0fb0bb03dfe889f07fbd7af50430846883
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
c01e18dbdad0c499dc46b42ce4d19384899797a509f8647ca809715d05dc16ec
|
3da3b3346def0bbcc654a8ed0b24259333cb1b4e36abba79a5c9574f308e605f
|
state/report/txt_hash |
ea6efabb475d8107b300bf1572a0e13a8d393ace9dc5452dc1f81ba225faa42f
|
684810ae87d9e3585c579fc33df39d9701c5099cf15fe831db708b732beff459
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f0c8433c7f20b1ce5fd24304cff9661223f1afad4e63512f2605f1e794bb47cb
|
d0a81c3634e1b7797a22236d684ac40af04b8a14daf602496a6c7c77d1e74cd0
|
state/st/txt_hash |
366a3938d32ee8c03f1719b4490a4ee05c88db9451aabecfbb21752a48f9ce6d
|
995bb610e3f37c155e09c301100cc5b0f0b7d7156b1cdec9b927ce565a387e82
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0537
|
BSI-DSZ-CC-1050-2020
|
heuristics/cert_lab |
None
|
BSI |
heuristics/cpe_matches |
cpe:2.3:a:microsoft:sql_server_2016:13.0.4001.0:*:*:*:*:*:*:* |
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_FLR.2 |
ALC_FLR.2 |
heuristics/extracted_versions |
13.0.4001.0 |
14.0.3223.3 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
CVE-2024-37331, CVE-2024-37323, CVE-2024-35271, CVE-2024-35256, CVE-2024-37332, CVE-2024-37326, CVE-2024-37321, CVE-2024-37322, CVE-2024-37333, CVE-2024-38088, CVE-2024-35272, CVE-2024-37320, CVE-2024-37330, CVE-2024-21449, CVE-2024-37329, CVE-2024-37319, CVE-2024-38087, CVE-2024-37336, CVE-2024-37327, CVE-2024-37324, CVE-2024-37328, CVE-2024-37318 |
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0537
- supplier: Microsoft Corporation
- toe_overseas_name: SQL Server 2016 Database Engine Enterprise Edition x64 (English)13.0.4001.0 (including Service Pack 1)
- expiration_date: 2022-03
- claim: EAL2+ALC_FLR.2 PP
- certification_date:
2017-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0537_it5563.html
- toe_japan_name: -----
- enhanced:
- product:
SQL Server 2016 Database Engine Enterprise Edition x64 (English)
- toe_version:
13.0.4001.0 (including Service Pack 1)
- product_type:
Database Management System (DBMS)
- certification_date:
2017-02-15
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
- vendor:
Microsoft Corporation
- evaluation_facility:
TÜV Informationstechnik GmbH,
Evaluation Body for IT-Security
- report_link:
https://www.ipa.go.jp/en/security/c0537_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0537_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0537_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way.
TOE security functionality
This TOE provides the following security functionality:
-
The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE.
-
The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE.
-
The Security Audit function of the TOE produces log files about all security relevant events.
-
The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE.
-
The Identification and Authentication function of the TOE is able to identify and authenticate users.
-
The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
|
- cert_id:
BSI-DSZ-CC-1050-2020
- product: Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3
- vendor: Microsoft Corporation
- certification_date:
27.01.2020
- category: Server applications
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Serveranwendungen_Datenbankserver/1050.html
- enhanced:
- product:
Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3
- applicant:
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL4,ALC_FLR.2
- protection_profile:
Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02, 23 March 2017, BSI-CC-PP-0088-V2-2017
- certification_date:
27.01.2020
- expiration_date:
26.01.2025
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050a_pdf.pdf?__blob=publicationFile&v=1
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050b_pdf.pdf?__blob=publicationFile&v=1
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050c_pdf.pdf?__blob=publicationFile&v=1
- description:
The Target of Evaluation (TOE) has the capability to limit TOE access to authorized users, enforce Discretionary Access Controls on objects under the control of the database management system based on user and/or role authorizations, and to provide user accountability via audit of users’ actions.
- subcategory: Database servers
|
heuristics/scheme_data/cert_id |
C0537
|
BSI-DSZ-CC-1050-2020
|
heuristics/scheme_data/certification_date |
2017-02
|
27.01.2020
|
heuristics/scheme_data/enhanced |
- product:
SQL Server 2016 Database Engine Enterprise Edition x64 (English)
- toe_version: 13.0.4001.0 (including Service Pack 1)
- product_type: Database Management System (DBMS)
- certification_date:
2017-02-15
- cc_version: 3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
- vendor: Microsoft Corporation
- evaluation_facility:
TÜV Informationstechnik GmbH,
Evaluation Body for IT-Security
- report_link:
https://www.ipa.go.jp/en/security/c0537_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0537_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0537_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way.
TOE security functionality
This TOE provides the following security functionality:
-
The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE.
-
The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE.
-
The Security Audit function of the TOE produces log files about all security relevant events.
-
The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE.
-
The Identification and Authentication function of the TOE is able to identify and authenticate users.
-
The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
|
- product:
Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3
- applicant: Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL4,ALC_FLR.2
- protection_profile:
Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02, 23 March 2017, BSI-CC-PP-0088-V2-2017
- certification_date:
27.01.2020
- expiration_date: 26.01.2025
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050a_pdf.pdf?__blob=publicationFile&v=1
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050b_pdf.pdf?__blob=publicationFile&v=1
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050c_pdf.pdf?__blob=publicationFile&v=1
- description:
The Target of Evaluation (TOE) has the capability to limit TOE access to authorized users, enforce Discretionary Access Controls on objects under the control of the database management system based on user and/or role authorizations, and to provide user accountability via audit of users’ actions.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented with ALC_FLR.2
|
EAL4,ALC_FLR.2
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0537_eimg.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050c_pdf.pdf?__blob=publicationFile&v=1
|
heuristics/scheme_data/enhanced/certification_date |
2017-02-15
|
27.01.2020
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way.
TOE security functionality
This TOE provides the following security functionality:
-
The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE.
-
The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE.
-
The Security Audit function of the TOE produces log files about all security relevant events.
-
The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE.
-
The Identification and Authentication function of the TOE is able to identify and authenticate users.
-
The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
|
The Target of Evaluation (TOE) has the capability to limit TOE access to authorized users, enforce Discretionary Access Controls on objects under the control of the database management system based on user and/or role authorizations, and to provide user accountability via audit of users’ actions.
|
heuristics/scheme_data/enhanced/evaluation_facility |
TÜV Informationstechnik GmbH,
Evaluation Body for IT-Security
|
TÜV Informationstechnik GmbH
|
heuristics/scheme_data/enhanced/product |
SQL Server 2016 Database Engine Enterprise Edition x64 (English)
|
Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3
|
heuristics/scheme_data/enhanced/protection_profile |
Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
|
Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02, 23 March 2017, BSI-CC-PP-0088-V2-2017
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0537_erpt.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050a_pdf.pdf?__blob=publicationFile&v=1
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0537_est.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1050b_pdf.pdf?__blob=publicationFile&v=1
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
c0537_eimg.pdf
|
1050c_pdf.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar/ALC |
|
|
pdf_data/cert_keywords/cc_sar/ALC/ALC_FLR.2 |
1
|
1
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
- EAL 4:
1
- EAL 2:
1
- EAL 4 augmented:
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
1
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor/Microsoft |
|
- Microsoft: 1
- Microsoft Corporation:
1
|
pdf_data/cert_keywords/vendor/Microsoft/Microsoft Corporation |
1
|
1
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
415538
- pdf_is_encrypted:
True
- pdf_number_of_pages:
1
- /CreationDate:
D:20170316155916+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20170316160045+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
301903
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20200131082713+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /ModDate:
D:20200131084759+01'00'
- /Producer:
LibreOffice 6.2
- /Subject: Zertifikat, Urkunde
- /Title: Certification Report BSI-DSZ-CC-1050-2020
- pdf_hyperlinks:
|
pdf_data/cert_metadata//CreationDate |
D:20170316155916+09'00'
|
D:20200131082713+01'00'
|
pdf_data/cert_metadata//Creator |
Microsoft® Word 2010
|
Writer
|
pdf_data/cert_metadata//ModDate |
D:20170316160045+09'00'
|
D:20200131084759+01'00'
|
pdf_data/cert_metadata//Producer |
Microsoft® Word 2010
|
LibreOffice 6.2
|
pdf_data/cert_metadata/pdf_file_size_bytes |
415538
|
301903
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
1
|
pdf_data/report_filename |
c0537_erpt.pdf
|
1050a_pdf.pdf
|
pdf_data/report_frontpage |
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1050-2020
- cert_item:
Microsoft SQL Server 2017 Database Engine Enterprise Edition x64 (English) Version 14.0.3223.3
- developer:
Microsoft Corporation
- cert_lab:
BSI
- ref_protection_profiles:
Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02, 23 March 2017, BSI-CC- PP-0088-V2-2017
- cc_version:
PP conformant Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0537-01:
1
- Certification No. C0537:
1
|
- DE:
- BSI-DSZ-CC-1050-2020:
13
- BSI-DSZ-CC-1050:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ACCESS_TSFDATA:
1
- T.ACCESS_TSFFUNC:
1
- T.IA_MASQUERADE:
1
- T.IA_USER:
1
- T.RESIDUAL_DATA:
1
- T.TSF_COMPROMISE:
1
- T.UNAUTHORIZED_:
1
- A:
- A.PHYSICAL:
1
- A.AUTHUSER:
1
- A.MANAGE:
1
- A.TRAINEDUSER:
1
- A.NO_GENERAL_:
1
- A.SUPPORT:
1
- A.CONNECT:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0088-V2-2017:
2
- BSI-CC-PP-0088-V2:
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.2 |
4
|
4
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2: 4
- EAL2+:
2
- EAL2 augmented: 3
|
- EAL 4: 5
- EAL 2: 2
- EAL 1: 1
- EAL 2+: 1
- EAL4+: 2
- EAL2+:
1
- EAL 4 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2+ |
2
|
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- ID: BSI-DSZ-CC-1050; SQL Server 2017 Database Engine Enterprise Edition x64 (English) 14.0.3223.3, (confidential document) [8] DBMS Working Group Technical Community Protection Profile for Database Management Systems:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik |
4
|
2
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- BSI:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft |
5
|
21
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft Corporation |
7
|
8
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
240723
- pdf_is_encrypted:
True
- pdf_number_of_pages:
33
- /CreationDate:
D:20170316160424+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20170316160534+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
644319
- pdf_is_encrypted:
False
- pdf_number_of_pages:
25
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20200131071756+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /ModDate:
D:20200204120341+01'00'
- /Producer:
LibreOffice 6.2
- /Subject: Zertifizierungsreport
- /Title: Certification Report BSI-DSZ-CC-1050-2020
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
pdf_data/report_metadata//CreationDate |
D:20170316160424+09'00'
|
D:20200131071756+01'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Writer
|
pdf_data/report_metadata//ModDate |
D:20170316160534+09'00'
|
D:20200204120341+01'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
LibreOffice 6.2
|
pdf_data/report_metadata/pdf_file_size_bytes |
240723
|
644319
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
33
|
25
|
pdf_data/st_filename |
c0537_est.pdf
|
1050b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.PHYSICAL:
3
- A.AUTHUSER:
3
- A.MANAGE:
3
- A.TRAINEDUSER:
3
- A.NO_GENERAL_PURPOSE:
3
- A.SUPPORT:
4
- A.CONNECT:
4
|
- A.PHYSICAL:
3
- A.AUTHUSER:
3
- A.MANAGE:
3
- A.TRAINEDUSER:
3
- A.NO_GENERAL_PURPOSE:
3
- A.SUPPORT:
4
- A.CONNECT:
4
|
pdf_data/st_keywords/cc_claims/O/O.ACCESS_HISTORY |
9
|
11
|
pdf_data/st_keywords/cc_claims/O/O.ADMIN_ROLE |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT_GENERATI |
1
|
1
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT_GENERATION |
6
|
6
|
pdf_data/st_keywords/cc_claims/O/O.DISCRETIONARY_ |
1
|
1
|
pdf_data/st_keywords/cc_claims/O/O.DISCRETIONARY_ACCESS |
5
|
5
|
pdf_data/st_keywords/cc_claims/O/O.MANAGE |
11
|
11
|
pdf_data/st_keywords/cc_claims/O/O.MEDIATE |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.RESIDUAL_INFOR |
1
|
1
|
pdf_data/st_keywords/cc_claims/O/O.RESIDUAL_INFORMATION |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.TOE_ACCESS |
18
|
18
|
pdf_data/st_keywords/cc_claims/OE |
- OE.ADMIN:
12
- OE.INFO_PROTECT:
19
- OE.NO_GENERAL_:
2
- OE.PHYSICAL:
8
- OE.IT_REMOTE:
10
- OE.IT_TRUSTED_SYSTEM:
9
- OE.NO_GENERAL_PURPOSE:
6
|
- OE.ADMIN:
12
- OE.INFO_PROTECT:
19
- OE.NO_GENERAL_:
2
- OE.PHYSICAL:
8
- OE.IT_REMOTE:
10
- OE.IT_TRUSTED_SYSTEM:
9
- OE.NO_GENERAL_PURPOSE:
6
|
pdf_data/st_keywords/cc_claims/T |
- T.ACCESS_TSFDATA:
3
- T.ACCESS_TSFFUNC:
3
- T.IA_MASQUERADE:
4
- T.IA_USER:
3
- T.RESIDUAL_DATA:
3
- T.TSF_COMPROMISE:
4
- T.UNAUTHORIZED_ACCESS:
4
|
- T.ACCESS_TSFDATA:
3
- T.ACCESS_TSFFUNC:
3
- T.IA_MASQUERADE:
4
- T.IA_USER:
3
- T.RESIDUAL_DATA:
3
- T.TSF_COMPROMISE:
4
- T.UNAUTHORIZED_ACCESS:
4
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL2+:
66
- EAL2:
1
- EAL 2:
3
- EAL2 augmented:
1
- EAL 2 augmented:
1
|
- EAL4+:
67
- EAL4:
2
- EAL 4:
2
- EAL4 augmented:
1
- EAL 4 augmented:
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
9
- FAU_GEN.2:
6
- FAU_SEL.1:
7
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SEL.1.1:
1
- FDP:
- FDP_ACC.1:
15
- FDP_ACF.1:
8
- FDP_RIP.1:
6
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1.1:
1
- FDP_IFC.1:
1
- FIA:
- FIA_USB.1:
5
- FIA_ATD.1:
15
- FIA_UAU.1:
7
- FIA_UID.1:
14
- FIA_ATD.1.1:
3
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FMT:
- FMT_MOF.1:
6
- FMT_MSA.1:
7
- FMT_MSA.3:
8
- FMT_MTD.1:
6
- FMT_REV.1:
12
- FMT_SMF.1:
11
- FMT_SMR.1:
18
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_REV.1.1:
2
- FMT_REV.1.2:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_TRC.1:
6
- FPT_TRC.1.1:
1
- FPT_TRC.1.2:
1
- FPT_STM.1:
1
- FPT_ITT.1:
1
- FTA:
- FTA_MCS.1:
7
- FTA_TSE.1:
6
- FTA_MCS.1.1:
1
- FTA_MCS.1.2:
1
- FTA_TSE.1.1:
1
- FTA_TAH:
1
|
- FAU:
- FAU_GEN.1:
9
- FAU_GEN.2:
6
- FAU_SEL.1:
7
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SEL.1.1:
1
- FDP:
- FDP_ACC.1:
15
- FDP_ACF.1:
8
- FDP_RIP.1:
6
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1.1:
1
- FDP_IFC.1:
1
- FIA:
- FIA_USB.1:
5
- FIA_ATD.1:
15
- FIA_UAU.1:
7
- FIA_UID.1:
14
- FIA_ATD.1.1:
3
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FMT:
- FMT_MOF.1:
6
- FMT_MSA.1:
7
- FMT_MSA.3:
8
- FMT_MTD.1:
6
- FMT_REV.1:
12
- FMT_SMF.1:
11
- FMT_SMR.1:
18
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_REV.1.1:
2
- FMT_REV.1.2:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_TRC.1:
6
- FPT_TRC.1.1:
1
- FPT_TRC.1.2:
1
- FPT_STM.1:
1
- FPT_ITT.1:
1
- FTA:
- FTA_MCS.1:
7
- FTA_TSE.1:
6
- FTA_MCS.1.1:
1
- FTA_MCS.1.2:
1
- FTA_TSE.1.1:
1
- FTA_TAH:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft |
10
|
12
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft Corporation |
3
|
3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
SQL Team
|
SQL Team
|
pdf_data/st_metadata//CreationDate |
D:20161221140607+01'00'
|
D:20200124140519+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Keywords |
CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System
|
CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System
|
pdf_data/st_metadata//ModDate |
D:20161221140607+01'00'
|
D:20200124140519+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Subject |
Security Target
|
Security Target
|
pdf_data/st_metadata//Title |
Security Target - SQL Server 2016
|
Security Target - SQL Server 2017
|
pdf_data/st_metadata/pdf_file_size_bytes |
1446524
|
837718
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
65
|
66
|
dgst |
a43cc3e7f97cf843
|
4b359a9de7790aef
|