Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1)
JISEC-CC-CRP-C0537
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)
BSI-DSZ-CC-0811-2013
name SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1) Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)
not_valid_before 2017-02-15 2013-02-19
not_valid_after 2022-02-15 2019-09-01
scheme JP DE
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0811b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0811a_pdf.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_eimg.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf', 'pp_ids': frozenset({'DBMS_PP'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile Database Management Systems, Version 1.3', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_dbms_v1.3.pdf', 'pp_ids': frozenset({'PP_DBMS_V1.3'})})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash e06b4bf851a233995c42ea3442c808670fa41d0a9623dcc6edcb29d625e31239 None
state/cert/txt_hash d6f03332aaf99dee97c2c1bee96bfbe235b26ac32e9ddd3df2b047a8bda650ba None
state/report/pdf_hash c01e18dbdad0c499dc46b42ce4d19384899797a509f8647ca809715d05dc16ec d029caffc6dae99012d4e2c952f7b2296b7f4f75abf3fc0531741343b01f949c
state/report/txt_hash ea6efabb475d8107b300bf1572a0e13a8d393ace9dc5452dc1f81ba225faa42f ce96da6f997935856c8fc651c93e2245afef990aa6b30f6dd6cb6c8bbdc58754
state/st/pdf_hash f0c8433c7f20b1ce5fd24304cff9661223f1afad4e63512f2605f1e794bb47cb d63f2fcb56c8e6edb00611105b1554cf3960f9db9506432e86baea44e40da66e
state/st/txt_hash 366a3938d32ee8c03f1719b4490a4ee05c88db9451aabecfbb21752a48f9ce6d cae1143329d3850636c5d7ca05622471ea748e4102192d5fcdda50725e617f69
heuristics/cert_id JISEC-CC-CRP-C0537 BSI-DSZ-CC-0811-2013
heuristics/cert_lab None BSI
heuristics/cpe_matches cpe:2.3:a:microsoft:sql_server_2016:13.0.4001.0:*:*:*:*:*:*:* None
heuristics/extracted_versions 13.0.4001.0 11.0.3000.0
heuristics/related_cves CVE-2024-37331, CVE-2024-37323, CVE-2024-35271, CVE-2024-35256, CVE-2024-37332, CVE-2024-37326, CVE-2024-37321, CVE-2024-37322, CVE-2024-37333, CVE-2024-38088, CVE-2024-35272, CVE-2024-37320, CVE-2024-37330, CVE-2024-21449, CVE-2024-37329, CVE-2024-37319, CVE-2024-38087, CVE-2024-37336, CVE-2024-37327, CVE-2024-37324, CVE-2024-37328, CVE-2024-37318 None
heuristics/scheme_data
  • cert_id: C0537
  • supplier: Microsoft Corporation
  • toe_overseas_name: SQL Server 2016 Database Engine Enterprise Edition x64 (English)13.0.4001.0 (including Service Pack 1)
  • expiration_date: 2022-03
  • claim: EAL2+ALC_FLR.2 PP
  • certification_date: 2017-02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0537_it5563.html
  • toe_japan_name: -----
  • enhanced:
    • product: SQL Server 2016 Database Engine Enterprise Edition x64 (English)
    • toe_version: 13.0.4001.0 (including Service Pack 1)
    • product_type: Database Management System (DBMS)
    • certification_date: 2017-02-15
    • cc_version: 3.1 Release4
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • protection_profile: Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
    • vendor: Microsoft Corporation
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • report_link: https://www.ipa.go.jp/en/security/c0537_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0537_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0537_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
None
pdf_data/cert_filename c0537_eimg.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • Microsoft:
      • Microsoft Corporation: 1
  • eval_facility:
    • TUV:
      • TÜV Informationstechnik: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 415538
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20170316155916+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170316160045+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
None
pdf_data/report_filename c0537_erpt.pdf 0811a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0811-2013
    • cert_item: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1
    • developer: Microsoft Corporation
    • cert_lab: BSI
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0537-01: 1
    • Certification No. C0537: 1
  • DE:
    • BSI-DSZ-CC-0811-2013: 19
    • BSI-DSZ-CC-0811: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.ACCESS_TSFDATA: 1
    • T.ACCESS_TSFFUNC: 1
    • T.IA_MASQUERADE: 1
    • T.IA_USER: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
  • A:
    • A.PHYSICAL: 1
    • A.AUTHUSER: 1
    • A.MANAGE: 1
    • A.TRAINEDUSER: 1
    • A.NO_GENERAL_: 1
    • A.SUPPORT: 1
    • A.CONNECT: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_ADD: 1
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.2: 5
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.2: 4
  • ALC_FLR.2: 5
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_DVS.2: 1
  • ALC_FLR.1: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_FLR: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.2 4 5
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2+: 2
    • EAL2 augmented: 3
  • EAL:
    • EAL 4: 6
    • EAL1: 7
    • EAL4: 6
    • EAL4+: 2
    • EAL3: 4
    • EAL5: 6
    • EAL7: 4
    • EAL2: 3
    • EAL6: 3
    • EAL 4 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2+: 2
  • EAL2 augmented: 3
  • EAL 4: 6
  • EAL1: 7
  • EAL4: 6
  • EAL4+: 2
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL 4 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL2 4 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.3000.0 (confidential document) [8] Microsoft SQL ServerTM 2012 Books Online (BOL); File name: 1
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 17
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 32: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/report_keywords/vendor/Microsoft/Microsoft 5 23
pdf_data/report_keywords/vendor/Microsoft/Microsoft Corporation 7 8
pdf_data/report_metadata
  • pdf_file_size_bytes: 240723
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
  • /CreationDate: D:20170316160424+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170316160534+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 935036
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: Federal Office for Information Security
  • /CreationDate: D:20130306131843+01'00'
  • /Creator: Writer
  • /Keywords: "Microsoft SQL Server 2012 Database Engine Enterprise Edition x64, Version 11.0.3000.0"
  • /ModDate: D:20130307064603+01'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version 11.0.3000.0 (including Service Pack 1)
  • /Title: Certification Report BSI-DSZ-CC-0811-2013
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20170316160424+09'00' D:20130306131843+01'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 Writer
pdf_data/report_metadata//ModDate D:20170316160534+09'00' D:20130307064603+01'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 OpenOffice.org 3.2
pdf_data/report_metadata/pdf_file_size_bytes 240723 935036
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 33 36
pdf_data/st_filename c0537_est.pdf 0811b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0811: 1
pdf_data/st_keywords/cc_claims/A
  • A.PHYSICAL: 3
  • A.AUTHUSER: 3
  • A.MANAGE: 3
  • A.TRAINEDUSER: 3
  • A.NO_GENERAL_PURPOSE: 3
  • A.SUPPORT: 4
  • A.CONNECT: 4
  • A.NO_EVIL: 3
  • A.NO_GENERAL_PURPOSE: 3
  • A.PHYSICAL: 3
pdf_data/st_keywords/cc_claims/O
  • O.ACCESS_HISTORY: 9
  • O.ADMIN_ROLE: 8
  • O.AUDIT_GENERATION: 6
  • O.DISCRETIONARY_ACCESS: 5
  • O.MANAGE: 11
  • O.MEDIATE: 8
  • O.RESIDUAL_INFORMATION: 8
  • O.TOE_ACCESS: 18
  • O.AUDIT_GENERATI: 1
  • O.DISCRETIONARY_: 1
  • O.RESIDUAL_INFOR: 1
  • O.ACCESS_HISTORY: 5
  • O.ADMIN_GUIDANCE: 6
  • O.ADMIN_ROLE: 5
  • O.AUDIT_GENERATION: 3
  • O.CONFIGURATION_IDENTIFICATION: 1
  • O.DOCUMENTED_DESIGN: 4
  • O.INTERNAL_TOE_DOMAINS: 1
  • O.MANAGE: 7
  • O.MEDIATE: 4
  • O.PARTIAL_FUNCTIONAL_TEST: 2
  • O.PARTIAL_SELF_PROTECTION: 1
  • O.RESIDUAL_INFORMATION: 4
  • O.TOE_ACCESS: 6
  • O.VULNERABILITY_ANALYSIS: 2
  • O.CONFIGURATION_IDENTIFICATI: 1
  • O.CONFIGURATION_IDE: 2
  • O.CONFIGURATION_IDENTI: 2
  • O.DOCUMENTED_DESIG: 1
  • O.VULNERABILITY_ANA: 3
  • O.VULNERABILITY_ANALYSI: 3
  • O.PARTIAL_FUNCTIONA: 2
  • O.PARTIAL_FUNCTIONAL_T: 2
  • O.DOCUMENTED_: 1
  • O.RESIDUAL_INFORMAT: 2
  • O.PARTIAL_SELF_PROT: 1
  • O.PARTIAL_SELF_PROTECT: 1
  • O.INTERNAL_TOE_DOM: 1
  • O.INTERNAL_TOE_DOMAIN: 1
  • O.AUDIT_: 1
  • O.CONFIGURATION_I: 1
  • O.DOCUMENTED_DES: 1
  • O.INTERNAL_TOE_DO: 1
  • O.PARTIAL_FUNCTION: 1
  • O.PARTIAL_SELF_PR: 1
  • O.RESIDUAL_INFORM: 1
  • O.VULNERABILITY_: 1
pdf_data/st_keywords/cc_claims/O/O.ACCESS_HISTORY 9 5
pdf_data/st_keywords/cc_claims/O/O.ADMIN_ROLE 8 5
pdf_data/st_keywords/cc_claims/O/O.AUDIT_GENERATION 6 3
pdf_data/st_keywords/cc_claims/O/O.MANAGE 11 7
pdf_data/st_keywords/cc_claims/O/O.MEDIATE 8 4
pdf_data/st_keywords/cc_claims/O/O.RESIDUAL_INFORMATION 8 4
pdf_data/st_keywords/cc_claims/O/O.TOE_ACCESS 18 6
pdf_data/st_keywords/cc_claims/OE
  • OE.ADMIN: 12
  • OE.INFO_PROTECT: 19
  • OE.NO_GENERAL_: 2
  • OE.PHYSICAL: 8
  • OE.IT_REMOTE: 10
  • OE.IT_TRUSTED_SYSTEM: 9
  • OE.NO_GENERAL_PURPOSE: 6
  • OE.NO_EVIL: 4
  • OE.NO_GENERAL_: 2
  • OE.PHYSICAL: 4
  • OE.NO_GENERAL_PURPOSE: 1
pdf_data/st_keywords/cc_claims/OE/OE.NO_GENERAL_PURPOSE 6 1
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 8 4
pdf_data/st_keywords/cc_claims/T
  • T.ACCESS_TSFDATA: 3
  • T.ACCESS_TSFFUNC: 3
  • T.IA_MASQUERADE: 4
  • T.IA_USER: 3
  • T.RESIDUAL_DATA: 3
  • T.TSF_COMPROMISE: 4
  • T.UNAUTHORIZED_ACCESS: 4
  • T.ACCIDENTAL_ADMIN_ERROR: 2
  • T.MASQUERADE: 3
  • T.POOR_DESIGN: 3
  • T.POOR_IMPLEMENTATION: 3
  • T.POOR_TEST: 3
  • T.RESIDUAL_DATA: 3
  • T.TSF_COMPROMISE: 3
  • T.UNAUTHORIZED_ACCESS: 3
  • T.UNIDENTIFIED_ACTIONS: 3
  • T.ACCIDENTAL_ADMIN_: 1
pdf_data/st_keywords/cc_claims/T/T.TSF_COMPROMISE 4 3
pdf_data/st_keywords/cc_claims/T/T.UNAUTHORIZED_ACCESS 4 3
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_ADD: 3
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_FSP.4: 1
    • ADV_TDS.3: 2
    • ADV_ARC.1: 2
  • AGD:
    • AGD_ADD: 3
    • AGD_PRE.1: 2
    • AGD_PRE: 1
    • AGD_OPE.1: 4
  • ALC:
    • ALC_FLR.2: 6
    • ALC_DEL.1: 1
    • ALC_CMS.4: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 5
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADD: 3
  • AGD_ADD: 3
  • AGD_PRE.1: 2
  • AGD_PRE: 1
  • AGD_OPE.1: 4
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 4
  • ALC_FLR.2: 6
  • ALC_DEL.1: 1
  • ALC_CMS.4: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 4 6
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2+: 66
  • EAL2: 1
  • EAL 2: 3
  • EAL2 augmented: 1
  • EAL 2 augmented: 1
  • EAL4+: 58
  • EAL4: 1
  • EAL 4: 2
  • EAL2: 1
  • EAL4 augmented: 1
  • EAL 4 augmented: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 9
  • FAU_GEN.2: 6
  • FAU_SEL.1: 7
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SEL.1.1: 1
  • FAU_STG_EXP.5: 14
  • FAU_STG: 3
  • FAU_GEN: 11
  • FAU_SEL: 8
  • FAU_STG_EXP: 2
  • FAU_STG.3: 1
  • FAU_STG.1: 2
  • FAU_STG_EXP.5.1: 2
  • FAU_GEN.1: 2
  • FAU_SEL.1: 1
  • FAU_GEN.2: 1
  • FAU_STG.4: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 9 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 6 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SEL.1 7 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 15
  • FDP_ACF.1: 8
  • FDP_RIP.1: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 1
  • FDP_ACF: 9
  • FDP_ACC.1: 10
  • FDP_RIP.1: 5
  • FDP_ACC.1.1: 1
  • FDP_ACF.1: 4
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 15 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 8 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 6 5
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_USB.1: 5
  • FIA_ATD.1: 15
  • FIA_UAU.1: 7
  • FIA_UID.1: 14
  • FIA_ATD.1.1: 3
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_ATD.1: 10
  • FIA_UAU.2: 8
  • FIA_UAU.5: 8
  • FIA_UID.2: 12
  • FIA_ATD.1.1: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 15 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 3 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 14 11
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 6
  • FMT_MSA.1: 7
  • FMT_MSA.3: 8
  • FMT_MTD.1: 6
  • FMT_REV.1: 12
  • FMT_SMF.1: 11
  • FMT_SMR.1: 18
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_REV.1.1: 2
  • FMT_REV.1.2: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF.1: 6
  • FMT_MSA.1: 7
  • FMT_MTD.1: 7
  • FMT_REV.1: 14
  • FMT_SMF.1: 7
  • FMT_SMR.1: 13
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3: 4
  • FMT_MTD.1.1: 1
  • FMT_REV.1.1: 4
  • FMT_REV.1.2: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 8 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 6 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1 12 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1.1 2 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 11 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 18 13
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TRC.1: 6
  • FPT_TRC.1.1: 1
  • FPT_TRC.1.2: 1
  • FPT_STM.1: 1
  • FPT_ITT.1: 1
  • FPT_STM.1: 1
  • FPT_ITT.1: 1
  • FPT_TRC.1.1: 1
  • FPT_TRC.1.2: 1
pdf_data/st_keywords/cc_sfr/FTA
  • FTA_MCS.1: 7
  • FTA_TSE.1: 6
  • FTA_MCS.1.1: 1
  • FTA_MCS.1.2: 1
  • FTA_TSE.1.1: 1
  • FTA_TAH: 1
  • FTA_MCS.1: 5
  • FTA_TSE.1: 5
  • FTA_MCS.1.1: 1
  • FTA_MCS.1.2: 1
  • FTA_TSE.1.1: 1
pdf_data/st_keywords/cc_sfr/FTA/FTA_MCS.1 7 5
pdf_data/st_keywords/cc_sfr/FTA/FTA_TSE.1 6 5
pdf_data/st_keywords/vendor/Microsoft/Microsoft 10 11
pdf_data/st_keywords/vendor/Microsoft/Microsoft Corporation 3 2
pdf_data/st_metadata//Author SQL Team Roger French
pdf_data/st_metadata//CreationDate D:20161221140607+01'00' D:20130114171743+01'00'
pdf_data/st_metadata//ModDate D:20161221140607+01'00' D:20130114171743+01'00'
pdf_data/st_metadata//Title Security Target - SQL Server 2016 Security Target - SQL Server 2012 Team
pdf_data/st_metadata/pdf_file_size_bytes 1446524 1407252
pdf_data/st_metadata/pdf_number_of_pages 65 58
dgst a43cc3e7f97cf843 c068a098bbcc7e17