name |
Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English), version 16.0.4025.1
|
SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1)
|
category |
Databases
|
Databases
|
not_valid_before |
2023-09-15
|
2017-02-15
|
not_valid_after |
2028-09-15
|
2022-02-15
|
scheme |
ES
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-34_ST.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_est.pdf
|
status |
active
|
archived
|
manufacturer |
Microsoft Corporation
|
Microsoft Corporation
|
manufacturer_web |
https://www.microsoft.com
|
https://www.microsoft.com
|
security_level |
EAL4+, ALC_FLR.3 |
ALC_FLR.2, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-34-INF-4109.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-34_Certificado.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_eimg.pdf
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088b_pdf.pdf', 'pp_ids': frozenset({'DBMS_PP'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
54e869aefe8144fad25236ed63492fd424b15bf178c744ce2e7576e878c62470
|
e06b4bf851a233995c42ea3442c808670fa41d0a9623dcc6edcb29d625e31239
|
state/cert/txt_hash |
2b1ae658b3144628a78531ebcb9d3842697d098191dcece0aac9980af2a6b7aa
|
d6f03332aaf99dee97c2c1bee96bfbe235b26ac32e9ddd3df2b047a8bda650ba
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
b5c2acdd03921d679434aadd9c5f911e2a786f5743f41521034f404a76a79dec
|
c01e18dbdad0c499dc46b42ce4d19384899797a509f8647ca809715d05dc16ec
|
state/report/txt_hash |
0f58439c526d7525c41a1eb8ba979a8e4ddbe915ed6db80451b8cee538c6a638
|
ea6efabb475d8107b300bf1572a0e13a8d393ace9dc5452dc1f81ba225faa42f
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
369090ea62f5096d74db0d1f12f7dfb0627fa25bbefb7f99994a691c13a5f24a
|
f0c8433c7f20b1ce5fd24304cff9661223f1afad4e63512f2605f1e794bb47cb
|
state/st/txt_hash |
55eb30cfdd56b65129ee8e4dfbcb1b382d75e95bcc074850536f1e940ab3f59e
|
366a3938d32ee8c03f1719b4490a4ee05c88db9451aabecfbb21752a48f9ce6d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
2022-34-INF-4109
|
JISEC-CC-CRP-C0537
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
cpe:2.3:a:microsoft:sql_server_2016:13.0.4001.0:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_TAT.1, ADV_TDS.3, ALC_DVS.1, ALC_CMC.4, ASE_CCL.1, AVA_VAN.3, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ATE_FUN.1, ALC_CMS.4, ATE_DPT.1, AGD_OPE.1, ALC_FLR.3, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ADV_IMP.1, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, ADV_FSP.4 |
ALC_FLR.2 |
heuristics/extracted_versions |
16.0.4025.1 |
13.0.4001.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
CVE-2024-37331, CVE-2024-37323, CVE-2024-35271, CVE-2024-35256, CVE-2024-37332, CVE-2024-37326, CVE-2024-37321, CVE-2024-37322, CVE-2024-37333, CVE-2024-38088, CVE-2024-35272, CVE-2024-37320, CVE-2024-37330, CVE-2024-21449, CVE-2024-37329, CVE-2024-37319, CVE-2024-38087, CVE-2024-37336, CVE-2024-37327, CVE-2024-37324, CVE-2024-37328, CVE-2024-37318 |
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
None
|
- cert_id:
C0537
- supplier:
Microsoft Corporation
- toe_overseas_name:
SQL Server 2016 Database Engine Enterprise Edition x64 (English)13.0.4001.0 (including Service Pack 1)
- expiration_date:
2022-03
- claim:
EAL2+ALC_FLR.2 PP
- certification_date:
2017-02
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0537_it5563.html
- toe_japan_name:
-----
- enhanced:
- product:
SQL Server 2016 Database Engine Enterprise Edition x64 (English)
- toe_version:
13.0.4001.0 (including Service Pack 1)
- product_type:
Database Management System (DBMS)
- certification_date:
2017-02-15
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.2
- protection_profile:
Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
- vendor:
Microsoft Corporation
- evaluation_facility:
TÜV Informationstechnik GmbH,
Evaluation Body for IT-Security
- report_link:
https://www.ipa.go.jp/en/security/c0537_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0537_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0537_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way.
TOE security functionality
This TOE provides the following security functionality:
-
The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE.
-
The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE.
-
The Security Audit function of the TOE produces log files about all security relevant events.
-
The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE.
-
The Identification and Authentication function of the TOE is able to identify and authenticate users.
-
The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
2022-34_Certificado.pdf
|
c0537_eimg.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar/ALC |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
- EAL 4:
1
- EAL 2:
1
- EAL4+:
1
- EAL4:
1
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification:
1
|
- TUV:
- TÜV Informationstechnik:
1
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor/Microsoft |
- Microsoft: 3
- Microsoft Corporation:
1
|
|
pdf_data/cert_keywords/vendor/Microsoft/Microsoft Corporation |
1
|
1
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
967936
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Title:
- /CreationDate:
- /Producer:
- /ModDate:
- /Trapped:
- /Creator:
- /Keywords:
- /Author:
- /Subject:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
415538
- pdf_is_encrypted:
True
- pdf_number_of_pages:
1
- /CreationDate:
D:20170316155916+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20170316160045+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
pdf_data/cert_metadata//CreationDate |
|
D:20170316155916+09'00'
|
pdf_data/cert_metadata//Creator |
|
Microsoft® Word 2010
|
pdf_data/cert_metadata//ModDate |
|
D:20170316160045+09'00'
|
pdf_data/cert_metadata//Producer |
|
Microsoft® Word 2010
|
pdf_data/cert_metadata/pdf_file_size_bytes |
967936
|
415538
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
True
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
1
|
pdf_data/report_filename |
2022-34-INF-4109.pdf
|
c0537_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0537-01:
1
- Certification No. C0537:
1
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.ACCESS_TSFDATA:
1
- T.ACCESS_TSFFUNC:
1
- T.IA_MASQUERADE:
1
- T.IA_USER:
1
- T.RESIDUAL_DATA:
1
- T.TSF_COMPROMISE:
1
- T.UNAUTHORIZED_:
1
- A:
- A.PHYSICAL:
1
- A.AUTHUSER:
1
- A.MANAGE:
1
- A.TRAINEDUSER:
1
- A.NO_GENERAL_:
1
- A.SUPPORT:
1
- A.CONNECT:
1
|
pdf_data/report_keywords/cc_claims/A |
|
- A.PHYSICAL:
1
- A.AUTHUSER:
1
- A.MANAGE:
1
- A.TRAINEDUSER:
1
- A.NO_GENERAL_:
1
- A.SUPPORT:
1
- A.CONNECT:
1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_IMP.1:
1
- AGD:
- ALC:
- ALC_FLR.3:
7
- ALC_CMC.4:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_FLR:
3
- ATE:
- ATE_COV.2:
1
- ATE_FUN.1:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.3:
7
- ALC_CMC.4:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_FLR:
3
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4:
8
- EAL4+:
4
- EAL 1:
1
- EAL 4:
2
- EAL 2:
1
- EAL2:
1
- ITSEC:
|
- EAL:
- EAL2:
4
- EAL2+:
2
- EAL2 augmented:
3
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL4: 8
- EAL4+: 4
- EAL 1: 1
- EAL 4: 2
- EAL 2: 1
- EAL2:
1
|
- EAL2:
4
- EAL2+: 2
- EAL2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
1
|
4
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
1
- FAU_GEN.2:
1
- FAU_SEL.1:
1
- FDP:
- FDP_ACC.1:
1
- FDP_ACF.1:
1
- FDP_RIP.1:
1
- FIA:
- FIA_ATD.1:
1
- FIA_UAU.1:
1
- FIA_UID.1:
1
- FIA_USB_EXT.2:
1
- FMT:
- FMT_MOF.1:
1
- FMT_MSA.1:
1
- FMT_MSA.3:
1
- FMT_MTD.1:
1
- FMT_REV.1:
2
- FMT_SMF.1:
1
- FMT_SMR.1:
1
- FPT:
- FTA:
- FTA_MCS.1:
1
- FTA_TAH_EXT.1:
1
- FTA_TSE.1:
1
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification:
4
|
- TUV:
- TÜV Informationstechnik:
4
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft |
19
|
5
|
pdf_data/report_keywords/vendor/Microsoft/Microsoft Corporation |
3
|
7
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
475077
- pdf_is_encrypted:
False
- pdf_number_of_pages:
15
- /Title:
- /CreationDate:
- /Producer:
- /ModDate:
- /Creator:
- /Trapped:
- /Keywords:
- /Author:
- /Subject:
- pdf_hyperlinks:
https://www.commoncriteriaportal.org/, https://www.microsoft.com/en-us/sql-server/data-security, https://www.catalog.update.microsoft.com/Search.aspx?q=sql%20server%202022, https://www.sogis.eu/, https://www.microsoft.com/licensing/servicecenter/default.aspx
|
- pdf_file_size_bytes:
240723
- pdf_is_encrypted:
True
- pdf_number_of_pages:
33
- /CreationDate:
D:20170316160424+09'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20170316160534+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
|
D:20170316160424+09'00'
|
pdf_data/report_metadata//Creator |
|
Microsoft® Word 2010
|
pdf_data/report_metadata//ModDate |
|
D:20170316160534+09'00'
|
pdf_data/report_metadata//Producer |
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
475077
|
240723
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.commoncriteriaportal.org/, https://www.microsoft.com/en-us/sql-server/data-security, https://www.catalog.update.microsoft.com/Search.aspx?q=sql%20server%202022, https://www.sogis.eu/, https://www.microsoft.com/licensing/servicecenter/default.aspx |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
True
|
pdf_data/report_metadata/pdf_number_of_pages |
15
|
33
|
pdf_data/st_filename |
2022-34_ST.pdf
|
c0537_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.PHYSICAL:
3
- A.AUTHUSER:
3
- A.MANAGE:
3
- A.TRAINEDUSER:
3
- A.NO_GENERAL_PURPOSE:
3
- A.SUPPORT:
4
- A.CONNECT:
4
|
- A.PHYSICAL:
3
- A.AUTHUSER:
3
- A.MANAGE:
3
- A.TRAINEDUSER:
3
- A.NO_GENERAL_PURPOSE:
3
- A.SUPPORT:
4
- A.CONNECT:
4
|
pdf_data/st_keywords/cc_claims/O |
- O.ACCESS_HISTORY:
9
- O.ADMIN_ROLE:
8
- O.AUDIT_GENERATION:
6
- O.DISCRETIONARY_ACCESS:
5
- O.MANAGE:
11
- O.MEDIATE:
8
- O.RESIDUAL_INFORMATION:
8
- O.TOE_ACCESS:
18
- O.AUDIT_GENERATIO: 1
- O.DISCRETIONARY_A: 1
- O.RESIDUAL_INFORM: 1
|
- O.ACCESS_HISTORY:
9
- O.ADMIN_ROLE:
8
- O.AUDIT_GENERATION:
6
- O.DISCRETIONARY_ACCESS:
5
- O.MANAGE:
11
- O.MEDIATE:
8
- O.RESIDUAL_INFORMATION:
8
- O.TOE_ACCESS:
18
- O.AUDIT_GENERATI: 1
- O.DISCRETIONARY_: 1
- O.RESIDUAL_INFOR: 1
|
pdf_data/st_keywords/cc_claims/O/O.ACCESS_HISTORY |
9
|
9
|
pdf_data/st_keywords/cc_claims/O/O.ADMIN_ROLE |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.AUDIT_GENERATION |
6
|
6
|
pdf_data/st_keywords/cc_claims/O/O.DISCRETIONARY_ACCESS |
5
|
5
|
pdf_data/st_keywords/cc_claims/O/O.MANAGE |
11
|
11
|
pdf_data/st_keywords/cc_claims/O/O.MEDIATE |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.RESIDUAL_INFORMATION |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.TOE_ACCESS |
18
|
18
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
12
|
12
|
pdf_data/st_keywords/cc_claims/OE/OE.INFO_PROTECT |
18
|
19
|
pdf_data/st_keywords/cc_claims/OE/OE.IT_REMOTE |
10
|
10
|
pdf_data/st_keywords/cc_claims/OE/OE.IT_TRUSTED_SYSTEM |
9
|
9
|
pdf_data/st_keywords/cc_claims/OE/OE.NO_GENERAL_ |
2
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.NO_GENERAL_PURPOSE |
6
|
6
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
8
|
8
|
pdf_data/st_keywords/cc_claims/T |
- T.ACCESS_TSFDATA:
3
- T.ACCESS_TSFFUNC:
3
- T.IA_MASQUERADE:
4
- T.IA_USER:
3
- T.RESIDUAL_DATA:
3
- T.TSF_COMPROMISE:
4
- T.UNAUTHORIZED_ACCESS:
4
|
- T.ACCESS_TSFDATA:
3
- T.ACCESS_TSFFUNC:
3
- T.IA_MASQUERADE:
4
- T.IA_USER:
3
- T.RESIDUAL_DATA:
3
- T.TSF_COMPROMISE:
4
- T.UNAUTHORIZED_ACCESS:
4
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.4:
1
- ADV_IMP.1:
1
- ADV_TDS.3:
1
- AGD:
- AGD_ADD:
2
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.3:
5
- ALC_CMC.4:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADD:
2
- AGD_OPE.1: 1
- AGD_PRE.1: 1
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_ADD |
2
|
3
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.3:
5
- ALC_CMC.4:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4+:
72
- EAL4:
1
- EAL 4:
2
- EAL4 augmented:
1
- EAL 4 augmented:
1
|
- EAL2+:
66
- EAL2:
1
- EAL 2:
3
- EAL2 augmented:
1
- EAL 2 augmented:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
9
- FAU_GEN.2:
6
- FAU_SEL.1:
7
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SEL.1.1:
1
|
- FAU_GEN.1:
9
- FAU_GEN.2:
6
- FAU_SEL.1:
7
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SEL.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_USB_EXT.2: 21
- FIA_USB.1:
5
- FIA_ATD.1:
15
- FIA_UAU.1:
7
- FIA_UID.1:
14
- FIA_ATD.1.1:
3
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB_EXT.2.1: 1
- FIA_USB_EXT.2.2: 1
- FIA_USB_EXT.2.3: 1
- FIA_USB_EXT.2.4: 1
|
- FIA_USB.1:
5
- FIA_ATD.1:
15
- FIA_UAU.1:
7
- FIA_UID.1:
14
- FIA_ATD.1.1:
3
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
12
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
17
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TRC.1:
6
- FPT_TRC.1.1:
1
- FPT_TRC.1.2:
1
- FPT_STM.1:
1
- FPT_ITT.1:
1
|
- FPT_TRC.1:
6
- FPT_TRC.1.1:
1
- FPT_TRC.1.2:
1
- FPT_STM.1:
1
- FPT_ITT.1:
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_TAH_EXT.1: 17
- FTA_TAH_EXT.1.1: 2
- FTA_TAH_EXT.1.2: 2
- FTA_MCS.1:
7
- FTA_TSE.1:
6
- FTA_MCS.1.1:
1
- FTA_MCS.1.2:
1
- FTA_TSE.1.1:
1
|
- FTA_MCS.1:
7
- FTA_TSE.1:
6
- FTA_MCS.1.1:
1
- FTA_MCS.1.2:
1
- FTA_TSE.1.1:
1
- FTA_TAH: 1
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_MCS.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_MCS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_MCS.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_TSE.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FTA/FTA_TSE.1.1 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft |
22
|
10
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft Corporation |
3
|
3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
651990
- pdf_is_encrypted:
False
- pdf_number_of_pages:
67
- /Producer:
PyPDF2
- pdf_hyperlinks:
https://www.microsoft.com/en-us/sql-server/data-security, https://www.catalog.update.microsoft.com/Search.aspx?q=sql%20server%202022, https://www.microsoft.com/licensing/servicecenter/default.aspx
|
- pdf_file_size_bytes:
1446524
- pdf_is_encrypted:
False
- pdf_number_of_pages:
65
- /Title: Security Target - SQL Server 2016
- /Author: SQL Team
- /Subject: Security Target
- /Keywords: CC, ST, Common Criteria, SQL, Security Target, DBMS, Database Management System
- /Creator: Microsoft® Word 2010
- /CreationDate: D:20161221140607+01'00'
- /ModDate: D:20161221140607+01'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
https://www.microsoft.com/licensing/servicecenter/default.aspx, https://www.microsoft.com/sqlserver/en/us/common-criteria.aspx
|
pdf_data/st_metadata//Producer |
PyPDF2
|
Microsoft® Word 2010
|
pdf_data/st_metadata/pdf_file_size_bytes |
651990
|
1446524
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
67
|
65
|
dgst |
a6cb1e02fed154bd
|
a43cc3e7f97cf843
|