Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CA Technologies Top Secret r14 SP1 for z/OS
CCEVS-VR-VID-10415-2011
EMC® VNXe Operating Environment v2.0 with Unisphere™ running on VNXe Series hardware models VNXe3300 and VNXe3100
383-4-181
name CA Technologies Top Secret r14 SP1 for z/OS EMC® VNXe Operating Environment v2.0 with Unisphere™ running on VNXe Series hardware models VNXe3300 and VNXe3100
category Access Control Devices and Systems Other Devices and Systems
scheme US CA
not_valid_after 01.11.2014 15.05.2017
not_valid_before 04.04.2011 09.08.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10415-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v20-cert-eng.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10415-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v20-sec-eng.pdf
manufacturer CA Technologies EMC Corporation
manufacturer_web https://www.ca.com https://www.emc.com/
security_level ASE_TSS.2, ALC_FLR.1, EAL4+ EAL3+, ALC_FLR.2
dgst a4cba33549146a03 5971db1acc95e3a9
heuristics/cert_id CCEVS-VR-VID-10415-2011 383-4-181
heuristics/cert_lab US CANADA
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions - 2.0
heuristics/scheme_data
  • category: Enterprise Security Management
  • certification_date: 04.04.2011
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10415
  • product: CA Top Secret r14 SP1 for z/OS
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10415
  • vendor: CA Technologies
maintenance_updates
pdf_data/report_filename st_vid10415-vr.pdf emc-vnx-v20-cert-eng.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10415-2011
    • cert_item: CA Top Secret® r14 SP1 for z/OS
    • cert_lab: US NIAP
  • CA:
  • US:
  • CA:
    • cert_id: 383-4-181-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10415-2011: 1
  • CA:
    • 383-4-181: 1
    • 383-4-181-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 3
  • EAL:
    • EAL 3: 4
    • EAL 3 augmented: 1
    • EAL 3+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
  • ASE:
    • ASE_TSS.2: 2
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 2
  • EWA:
    • EWA-Canada: 3
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 8
pdf_data/report_keywords/tee_name
  • AMD:
    • PSP: 1
pdf_data/report_keywords/standard_id
  • X509:
    • x.509: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /CreationDate: D:20110614163258
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110614163258
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 445120
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1R3
  • /CC date: July 2009
  • /CEM Version: 3.1R3
  • /CEM date: July 2009
  • /CR_Date: TBD
  • /CR_Version: 1.0
  • /Client City: Hopkinton
  • /Client Country: USA
  • /Client Full Name: EMC Corporation
  • /Client Postal Code: 01748
  • /Client Short Name: EMC
  • /Client State: MA
  • /Client Street: 171 South Street
  • /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
  • /Company: Hewlett-Packard
  • /CreationDate: D:20110908103844-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer Long Name: EMC Corporation
  • /Developer Short Name: EMC
  • /EAL Level: 3+
  • /EAL Level Base: 3
  • /EAL Level Text: 3 augmented
  • /EAL Long: EAL 3 Augmented
  • /EAL Short: EAL 3+
  • /ER Document Date: 15 November 2010
  • /ER Version: Version 1.0
  • /ETPlan_Doc#: 1685-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 1.0
  • /ETPlan_date: 8 July 2011
  • /ETProcRes_Date: TBD
  • /ETProcRes_Doc#: 1685-000-D005
  • /ETProcRes_Title: Evaluation Test Results
  • /ETProcRes_Version: 0.1
  • /ETProc_Date: 8 July 2011
  • /ETProc_Doc#: 1685-000-D004
  • /ETProc_Title: Evaluation Test Procedures and Test Resulta
  • /ETProc_Version: 1.0
  • /ETReport_Date: 11 July 2011
  • /ETReport_Doc#: 1685-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 0.4
  • /EWP_Date: 15 December 2010
  • /EWP_Doc#: 1685-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.0
  • /Eval number: 383-4-181
  • /Eval_End_Date: 12 July 2011
  • /Eval_Start_Date: 2 August 2010
  • /Keywords:
  • /LeadEvaluator: Greg Lague
  • /LeadEvaluatorInitials: GL
  • /ModDate: D:20110908103917-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1685
  • /ST_Date: 23 June 2011
  • /ST_Title: EMC Corporation EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100 Security Target
  • /ST_Version: 0.6
  • /SVC_Date: TBD
  • /SVC_Doc#: 1685-000-D007
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 0.1
  • /SVR_Date: 8 July 2011
  • /SVR_Doc#: 1685-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 1.0
  • /SV_City: Hopkinton, MA
  • /Security Classification: EWA-Canada & EMC Proprietary
  • /SourceModified: D:20110908140517
  • /Sponsor: EMC
  • /Sponsor City: Hopkinton
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 01748
  • /Sponsor State: MA
  • /Sponsor Street: 171 South Street
  • /Subject:
  • /TOE: EMC® VNXe Operating Environment v2.0 with Unisphere™ running on VNXe Series hardware models VNXe3300 and VNXe3100
  • /TOE Short: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
  • /TOE Short with version: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
  • /TOE Short-NoTM: EMC VNXe Operating Environment v2.0
  • /TOE Version: v2.0
  • /TOE with version: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
  • /TOE-NoTM: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • pdf_file_size_bytes: 76805
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 12
pdf_data/st_filename st_vid10415-st.pdf emc-vnx-v20-sec-eng.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL4: 6
    • EAL4 augmented: 2
  • EAL:
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 14
    • ADV_FSP.4: 13
    • ADV_IMP.1: 9
    • ADV_TDS.3: 17
  • AGD:
    • AGD_OPE.1: 15
    • AGD_PRE.1: 11
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 17
    • ALC_CMS.4: 8
    • ALC_DEL.1: 10
    • ALC_DVS: 2
    • ALC_DVS.1: 7
    • ALC_FLR.1: 12
    • ALC_LCD.1: 8
    • ALC_TAT: 1
    • ALC_TAT.1: 9
  • ASE:
    • ASE_CCL.1: 13
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.2: 12
    • ASE_REQ.2: 15
    • ASE_SPD.1: 9
    • ASE_TSS.2: 12
  • ATE:
    • ATE_COV.2: 7
    • ATE_DPT.2: 8
    • ATE_FUN.1: 10
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.3: 9
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 10
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACC.2: 18
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_ACID.1: 1
    • FIA_ACID.2: 1
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 19
    • FIA_SOS.1.1: 3
    • FIA_SOS.2: 8
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.4: 12
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 12
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 39
    • FMT_MOF.1.1: 4
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 2
    • FDP_ACF: 16
    • FDP_ACF.1: 8
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 32
    • FMT_MSA.1: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 18
    • FMT_MTD.1: 3
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.B: 1
    • A.LOCATE: 3
    • A.NOEVIL: 3
    • A.PATCHES: 3
  • O:
    • O.ACCESS: 6
    • O.AUDIT: 5
    • O.AUTH: 4
    • O.MANAGE: 4
    • O.ROBUST_ADMIN_GUIDA: 2
    • O.ROBUST_ADMIN_GUIDANC: 1
    • O.ROBUST_ADMIN_GUIDANCE: 1
    • O.ROBUST_TOE_ACCESS: 4
  • OE:
    • OE.ADMIN: 5
    • OE.EAVESDROPPING: 2
    • OE.LOCATE: 3
    • OE.NOEVIL: 3
    • OE.SYSTIME: 3
  • T:
    • T.ACCESS: 4
    • T.ADMIN_ERROR: 4
    • T.AUDIT_COMPROMISE: 3
    • T.MASK: 6
  • A:
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.PROTECT: 2
    • A.TIMESTAMP: 2
  • O:
    • O.ADMIN: 23
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.PROTECT: 16
  • OE:
    • OE.PROPER_NAME_ASSIGNME: 2
    • OE.PROPER_NAME_ASSIGNMEN: 1
    • OE.SECURE_COMMUNICATIO: 6
    • OE.SECURE_COMMUNICATION: 1
    • OE.SECURE_SERVERS: 7
    • OE.TIME: 3
  • T:
    • T.DATA_CORRUPTION: 2
    • T.IMPROPER_CONFIG: 2
    • T.IMPROPER_SERVER: 2
    • T.MEDIATE_ACCESS: 2
    • T.UNAUTH: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 43
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/tee_name
  • AMD:
    • PSP: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2007-09-004: 1
  • PKCS:
    • PKCS #11: 2
    • PKCS #12: 1
  • X509:
    • X.509: 2
pdf_data/st_metadata
  • /CreationDate: D:20110614163608
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110614163608
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1192910
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 125
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different