Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Ziperase Drive Erasure Software v3.0.2
Certificate Number: 2024/153
Vertiv Secure KM (formerly as Emerson Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185)
CCEVS-VR-VID-10704-2016
name Ziperase Drive Erasure Software v3.0.2 Vertiv Secure KM (formerly as Emerson Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185)
category Data Protection Other Devices and Systems
scheme AU US
status active archived
not_valid_after 06.09.2029 24.03.2018
not_valid_before 06.09.2024 24.03.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_153_Ziperase%20Drive%20Erasure%20Software%20v3.0.2_EFT-T042_os.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10704-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T042-CR-V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10704-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Ziperase%20Drive%20Erasure%20Software%20v3.0.2%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10704-st.pdf
manufacturer Ziperase Vertiv
manufacturer_web https://ziperase.com https://www.vertivco.com
security_level EAL2 {}
dgst a70fb46e83111512 6cdd29773d4e2830
heuristics/cert_id Certificate Number: 2024/153 CCEVS-VR-VID-10704-2016
heuristics/cert_lab [] US
heuristics/extracted_sars ALC_CMS.2, ASE_TSS.1, ADV_TDS.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, AGD_OPE.1, ADV_ARC.1, AVA_VAN.2, ASE_REQ.2, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ADV_FSP.1, ALC_CMC.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1
heuristics/extracted_versions 3.0.2 -
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 24.03.2016
  • evaluation_facility: DXC.technology
  • expiration_date: 24.03.2019
  • id: CCEVS-VR-VID10704
  • product: Vertiv Secure KM (formerly known as Emerson Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10704
  • vendor: Vertiv IT Systems
heuristics/protection_profiles {} da2e45c9b3fbb700
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf
pdf_data/cert_filename AISEP_Certificate_2024_153_Ziperase Drive Erasure Software v3.0.2_EFT-T042_os.pdf st_vid10704-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2024/153: 1
  • US:
    • CCEVS-VR-VID10704-2016: 1
pdf_data/cert_metadata
  • /CreationDate: D:20250116000321+11'00'
  • /ModDate: D:20250116000321+11'00'
  • pdf_file_size_bytes: 232175
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20160325125938-04'00'
  • /ModDate: D:20160325130012-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 177465
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename AISEP-CC-CR-2024-EFT-T042-CR-V1.0.pdf st_vid10704-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10704-2016
    • cert_item: Emerson Secure KM (identified 2, 4, 8-Port models
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10704-2016: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL1: 1
    • EAL2: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_: 1
    • O.ANTI_TAMPERING_BACKUP_POWER: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTLY_: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATION: 1
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_: 2
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 3
      • SHA512: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
pdf_data/st_filename Ziperase Drive Erasure Software v3.0.2 Security Target v1.0.pdf st_vid10704-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 8
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP: 6
    • FDP_RIP.1: 1
  • FIA:
    • FIA_UID.1: 5
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMF.3: 1
    • FMT_SMR.1: 4
  • FPT:
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
    • FPT_TEE: 8
    • FPT_TEE.1: 5
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 67
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 73
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 11
    • FDP_RIP: 1
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.JURISDICTION: 4
  • O:
    • O.COMPLETE_ERASE: 3
    • O.COMPLETE_ERASURE: 4
    • O.CONFIG: 5
    • O.HOST_TESTING: 5
    • O.SECURE_ERASE: 4
    • O.SECURE_ERASURE: 2
  • OE:
    • OE.ENVIRONMENT: 4
    • OE.LEGIT_ERASURE: 4
    • OE.NETWORK: 4
    • OE.TOE_AUTHENTICITY: 4
    • OE.TOE_INTEGRITY: 1
    • OE.USER: 4
  • OSP:
    • OSP.ENVIRONMENT: 1
    • OSP.ERASURE_LIMITS: 1
    • OSP.TRUSTED_USER: 1
  • T:
    • T.ILLEGITIMATE_CONFIG: 2
    • T.INCOMPLETE_ERASURE: 4
    • T.INSECURE_ERASURE: 2
    • T.TOE_INTEGRITY: 2
    • T.UNAUTHENTIC_HOST: 3
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIE: 1
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 10
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 3
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 8
    • O.PERIPHERAL_PORTS_ISOLATION: 11
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 8
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 8
    • O.TAMPER_EVIDENT_LABEL: 9
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 8
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/st_keywords/eval_facility
  • Teron:
    • Teron Labs: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-512: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 14
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-4: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_metadata
  • /CreationDate: D:20240719001731+10'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240719001731+10'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 393496
  • pdf_hyperlinks: http://www.teronlabs.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different