Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1)
JISEC-CC-CRP-C0537
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60
JISEC-CC-CRP-C0371
name SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1) Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60
not_valid_before 2017-02-15 2012-09-06
not_valid_after 2022-02-15 2017-10-12
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_est.pdf
security_level ALC_FLR.2, EAL2+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_erpt.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_eimg.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf', 'pp_ids': frozenset({'DBMS_PP'})})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash e06b4bf851a233995c42ea3442c808670fa41d0a9623dcc6edcb29d625e31239 None
state/cert/txt_hash d6f03332aaf99dee97c2c1bee96bfbe235b26ac32e9ddd3df2b047a8bda650ba None
state/report/pdf_hash c01e18dbdad0c499dc46b42ce4d19384899797a509f8647ca809715d05dc16ec f2f2a6b69599a0cb8ac099277072b73e17007e3cf32b898cc0dd800c76a3315f
state/report/txt_hash ea6efabb475d8107b300bf1572a0e13a8d393ace9dc5452dc1f81ba225faa42f ebc549efe55ff397697774dd320108ad1674e590d48b3888cb5cd082c1277140
state/st/pdf_hash f0c8433c7f20b1ce5fd24304cff9661223f1afad4e63512f2605f1e794bb47cb b1e3a6e25b09aae6b415fd246959fe9797504f6a3b072fb104883103c8bba4fa
state/st/txt_hash 366a3938d32ee8c03f1719b4490a4ee05c88db9451aabecfbb21752a48f9ce6d 91f2a7092c2a0bcaf09d1af07b30df69eaefebc2f0e630dd0cd94f33c2a55c9c
heuristics/cert_id JISEC-CC-CRP-C0537 JISEC-CC-CRP-C0371
heuristics/cpe_matches cpe:2.3:a:microsoft:sql_server_2016:13.0.4001.0:*:*:*:*:*:*:* None
heuristics/extracted_sars ALC_FLR.2 None
heuristics/extracted_versions 13.0.4001.0 11.0.2100.60
heuristics/related_cves CVE-2024-37331, CVE-2024-37323, CVE-2024-35271, CVE-2024-35256, CVE-2024-37332, CVE-2024-37326, CVE-2024-37321, CVE-2024-37322, CVE-2024-37333, CVE-2024-38088, CVE-2024-35272, CVE-2024-37320, CVE-2024-37330, CVE-2024-21449, CVE-2024-37329, CVE-2024-37319, CVE-2024-38087, CVE-2024-37336, CVE-2024-37327, CVE-2024-37324, CVE-2024-37328, CVE-2024-37318 None
heuristics/scheme_data/cert_id C0537 C0371
heuristics/scheme_data/certification_date 2017-02 2012-09
heuristics/scheme_data/claim EAL2+ALC_FLR.2 PP EAL2
heuristics/scheme_data/enhanced
  • product: SQL Server 2016 Database Engine Enterprise Edition x64 (English)
  • toe_version: 13.0.4001.0 (including Service Pack 1)
  • product_type: Database Management System (DBMS)
  • certification_date: 2017-02-15
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.2
  • protection_profile: Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
  • vendor: Microsoft Corporation
  • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
  • report_link: https://www.ipa.go.jp/en/security/c0537_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0537_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0537_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
  • product: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English)
  • toe_version: 11.0.2100.60
  • product_type: Database Management System (DBMS)
  • certification_date: 2012-09-06
  • assurance_level: EAL2
  • vendor: Microsoft Corporation
  • evaluation_facility: TワV Informationstechnik GmbH, Evaluation Body for IT-Security
  • report_link: https://www.ipa.go.jp/en/security/c0371_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0371_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0371_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2012. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functions This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user and metadata stored in the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users.
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented with ALC_FLR.2 EAL2
heuristics/scheme_data/enhanced/cert_link https://www.ipa.go.jp/en/security/c0537_eimg.pdf https://www.ipa.go.jp/en/security/c0371_eimg.pdf
heuristics/scheme_data/enhanced/certification_date 2017-02-15 2012-09-06
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions. PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2012. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functions This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user and metadata stored in the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users.
heuristics/scheme_data/enhanced/evaluation_facility TÜV Informationstechnik GmbH, Evaluation Body for IT-Security TワV Informationstechnik GmbH, Evaluation Body for IT-Security
heuristics/scheme_data/enhanced/product SQL Server 2016 Database Engine Enterprise Edition x64 (English) Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0537_erpt.pdf https://www.ipa.go.jp/en/security/c0371_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0537_est.pdf https://www.ipa.go.jp/en/security/c0371_est.pdf
heuristics/scheme_data/enhanced/toe_version 13.0.4001.0 (including Service Pack 1) 11.0.2100.60
heuristics/scheme_data/expiration_date 2022-03 2017-10
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0537_it5563.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0371_it1383.html
heuristics/scheme_data/toe_overseas_name SQL Server 2016 Database Engine Enterprise Edition x64 (English)13.0.4001.0 (including Service Pack 1) Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.2100.60
pdf_data/cert_filename c0537_eimg.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • Microsoft:
      • Microsoft Corporation: 1
  • eval_facility:
    • TUV:
      • TÜV Informationstechnik: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 415538
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20170316155916+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170316160045+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
None
pdf_data/report_filename c0537_erpt.pdf c0371_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0537-01: 1
  • Certification No. C0537: 1
  • CRP-C0371-01: 1
  • Certification No. C0371: 1
pdf_data/report_keywords/cc_claims/A
  • A.PHYSICAL: 1
  • A.AUTHUSER: 1
  • A.MANAGE: 1
  • A.TRAINEDUSER: 1
  • A.NO_GENERAL_: 1
  • A.SUPPORT: 1
  • A.CONNECT: 1
  • A.NO_EVIL: 1
  • A.NO_GENERAL_: 1
  • A.PHYSICAL: 1
pdf_data/report_keywords/cc_claims/T
  • T.ACCESS_TSFDATA: 1
  • T.ACCESS_TSFFUNC: 1
  • T.IA_MASQUERADE: 1
  • T.IA_USER: 1
  • T.RESIDUAL_DATA: 1
  • T.TSF_COMPROMISE: 1
  • T.UNAUTHORIZED_: 1
  • T.MASQUERADE: 1
  • T.UNAUTHORIZED_: 1
  • T.TSF_COMPROMISE: 1
  • T.UNIDENTIFIED_: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2+: 2
  • EAL2 augmented: 3
  • EAL2: 6
pdf_data/report_keywords/cc_security_level/EAL/EAL2 4 6
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 3
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
pdf_data/report_keywords/vendor/Microsoft/Microsoft 5 17
pdf_data/report_metadata//CreationDate D:20170316160424+09'00' D:20130527154721+09'00'
pdf_data/report_metadata//ModDate D:20170316160534+09'00' D:20130527154854+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 240723 225890
pdf_data/report_metadata/pdf_number_of_pages 33 29
pdf_data/st_filename c0537_est.pdf c0371_est.pdf
pdf_data/st_keywords/cc_claims/A
  • A.PHYSICAL: 3
  • A.AUTHUSER: 3
  • A.MANAGE: 3
  • A.TRAINEDUSER: 3
  • A.NO_GENERAL_PURPOSE: 3
  • A.SUPPORT: 4
  • A.CONNECT: 4
  • A.NO_EVIL: 3
  • A.NO_GENERAL_PURPOSE: 3
  • A.PHYSICAL: 3
pdf_data/st_keywords/cc_claims/O
  • O.ACCESS_HISTORY: 9
  • O.ADMIN_ROLE: 8
  • O.AUDIT_GENERATION: 6
  • O.DISCRETIONARY_ACCESS: 5
  • O.MANAGE: 11
  • O.MEDIATE: 8
  • O.RESIDUAL_INFORMATION: 8
  • O.TOE_ACCESS: 18
  • O.AUDIT_GENERATI: 1
  • O.DISCRETIONARY_: 1
  • O.RESIDUAL_INFOR: 1
  • O.ADMIN_ROLE: 5
  • O.AUDIT_GENERATION: 6
  • O.MANAGE: 7
  • O.MEDIATE: 4
pdf_data/st_keywords/cc_claims/O/O.ADMIN_ROLE 8 5
pdf_data/st_keywords/cc_claims/O/O.MANAGE 11 7
pdf_data/st_keywords/cc_claims/O/O.MEDIATE 8 4
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 12
  • OE.INFO_PROTECT: 19
  • OE.NO_GENERAL_: 2
  • OE.PHYSICAL: 8
  • OE.IT_REMOTE: 10
  • OE.IT_TRUSTED_SYSTEM: 9
  • OE.NO_GENERAL_PURPOSE: 6
  • OE.NO_EVIL: 4
  • OE.NO_GENERAL_: 3
  • OE.PHYSICAL: 4
  • OE.NO_GENERAL_PURPOSE: 1
pdf_data/st_keywords/cc_claims/OE/OE.NO_GENERAL_ 2 3
pdf_data/st_keywords/cc_claims/OE/OE.NO_GENERAL_PURPOSE 6 1
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 8 4
pdf_data/st_keywords/cc_claims/T
  • T.ACCESS_TSFDATA: 3
  • T.ACCESS_TSFFUNC: 3
  • T.IA_MASQUERADE: 4
  • T.IA_USER: 3
  • T.RESIDUAL_DATA: 3
  • T.TSF_COMPROMISE: 4
  • T.UNAUTHORIZED_ACCESS: 4
  • T.MASQUERADE: 3
  • T.TSF_COMPROMISE: 3
  • T.UNAUTHORIZED_ACCESS: 2
  • T.UNIDENTIFIED_ACTIONS: 3
  • T.UNAUTHORIZED_: 1
pdf_data/st_keywords/cc_claims/T/T.TSF_COMPROMISE 4 3
pdf_data/st_keywords/cc_claims/T/T.UNAUTHORIZED_ACCESS 4 2
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_ADD: 3
  • ALC:
    • ALC_FLR.2: 4
  • AGD:
    • AGD_ADD: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2+: 66
  • EAL2: 1
  • EAL 2: 3
  • EAL2 augmented: 1
  • EAL 2 augmented: 1
  • EAL2: 84
  • EAL 2: 4
pdf_data/st_keywords/cc_security_level/EAL/EAL 2 3 4
pdf_data/st_keywords/cc_security_level/EAL/EAL2 1 84
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.2: 6
    • FAU_SEL.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACF.1: 8
    • FDP_RIP.1: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_USB.1: 5
    • FIA_ATD.1: 15
    • FIA_UAU.1: 7
    • FIA_UID.1: 14
    • FIA_ATD.1.1: 3
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MSA.1: 7
    • FMT_MSA.3: 8
    • FMT_MTD.1: 6
    • FMT_REV.1: 12
    • FMT_SMF.1: 11
    • FMT_SMR.1: 18
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_STM.1: 1
    • FPT_ITT.1: 1
  • FTA:
    • FTA_MCS.1: 7
    • FTA_TSE.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TSE.1.1: 1
    • FTA_TAH: 1
  • FAU:
    • FAU_STG_EXP.5: 14
    • FAU_STG: 3
    • FAU_STG_EXP: 2
    • FAU_GEN: 1
    • FAU_STG.3: 1
    • FAU_STG.1: 2
    • FAU_STG_EXP.5.1: 2
    • FAU_GEN.1: 6
    • FAU_GEN.2: 6
    • FAU_SEL.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG.4: 1
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACF.1: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_UAU.2: 7
    • FIA_UAU.5: 7
    • FIA_UID.2: 10
    • FIA_ATD.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 8
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MSA.1: 6
    • FMT_MSA.3: 9
    • FMT_MTD.1: 7
    • FMT_REV.1: 14
    • FMT_SMF.1: 7
    • FMT_SMR.1: 13
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 9
  • FAU_GEN.2: 6
  • FAU_SEL.1: 7
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SEL.1.1: 1
  • FAU_STG_EXP.5: 14
  • FAU_STG: 3
  • FAU_STG_EXP: 2
  • FAU_GEN: 1
  • FAU_STG.3: 1
  • FAU_STG.1: 2
  • FAU_STG_EXP.5.1: 2
  • FAU_GEN.1: 6
  • FAU_GEN.2: 6
  • FAU_SEL.1: 6
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SEL.1.1: 1
  • FAU_STG.4: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 9 6
pdf_data/st_keywords/cc_sfr/FAU/FAU_SEL.1 7 6
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 15
  • FDP_ACF.1: 8
  • FDP_RIP.1: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 1
  • FDP_ACC.1: 9
  • FDP_ACF.1: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 15 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 8 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_USB.1: 5
  • FIA_ATD.1: 15
  • FIA_UAU.1: 7
  • FIA_UID.1: 14
  • FIA_ATD.1.1: 3
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_ATD.1: 9
  • FIA_UAU.2: 7
  • FIA_UAU.5: 7
  • FIA_UID.2: 10
  • FIA_ATD.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 15 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 3 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 14 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 7 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 8 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 6 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1 12 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 11 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 18 13
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TRC.1: 6
  • FPT_TRC.1.1: 1
  • FPT_TRC.1.2: 1
  • FPT_STM.1: 1
  • FPT_ITT.1: 1
  • FPT_STM.1: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/vendor/Microsoft/Microsoft 10 54
pdf_data/st_keywords/vendor/Microsoft/Microsoft Corporation 3 2
pdf_data/st_metadata//Author SQL Team Microsoft Corp.
pdf_data/st_metadata//CreationDate D:20161221140607+01'00' D:20120808120637+02'00'
pdf_data/st_metadata//Keywords CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System CC, ST, Common Criteria, SQL, Security Target
pdf_data/st_metadata//ModDate D:20161221140607+01'00' D:20120808120637+02'00'
pdf_data/st_metadata//Title Security Target - SQL Server 2016 Microsoft SQL Server 2012 Database EngineCommon Criteria Evaluation (EAL2)
pdf_data/st_metadata/pdf_file_size_bytes 1446524 628935
pdf_data/st_metadata/pdf_number_of_pages 65 42
dgst a43cc3e7f97cf843 bccee9cca27bae56