Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Palo Alto Networks WF-500 with WildFire 9.0
CCEVS-VR-VID-11024-2019
Youwipe Erasure Tool 4 with WipeCenter 4
NSCIB-CC-0114526-CR
name Palo Alto Networks WF-500 with WildFire 9.0 Youwipe Erasure Tool 4 with WipeCenter 4
category Network and Network-Related Devices and Systems Data Protection
scheme US NL
status archived active
not_valid_after 20.07.2022 12.08.2025
not_valid_before 20.07.2020 12.08.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11024-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificate%200114526.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11024-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0114526-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11024-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/YouWipe_Common_Criteria_EAL3_ST_V6.0.pdf
manufacturer Palo Alto Networks, Inc. AllWipe Oy Ltd.
manufacturer_web https://www.paloaltonetworks.com/ https://www.youwipe.com
security_level {} EAL3+, ALC_FLR.1
dgst a81e3f016f5ea5e4 3c9501fa938f3556
heuristics/cert_id CCEVS-VR-VID-11024-2019 NSCIB-CC-0114526-CR
heuristics/cert_lab US
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 9.0 4
heuristics/scheme_data
  • category: Network Device
  • certification_date: 20.07.2020
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 20.07.2022
  • id: CCEVS-VR-VID11081
  • product: Palo Alto Networks WF-500 with WildFire 9.0
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11081
  • vendor: Palo Alto Networks, Inc.
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf {}
pdf_data/cert_filename st_vid11024-ci.pdf certificate 0114526.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11024-2020: 1
  • NL:
    • CC-20-0114526: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
  • Secura:
    • Secura: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20200228095911-05'00'
  • /ModDate: D:20200228095911-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181696
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20200820105007+01'00'
  • /Creator: C458-M
  • /ModDate: D:20200820163719+02'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S20082010490
  • pdf_file_size_bytes: 66649
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11024-vr.pdf NSCIB-CC-0114526-CR.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID11024-2019
    • cert_item: for the Venafi Trust Protection Platform v19.2
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-0114526-CR
    • cert_item: Youwipe Erasure Tool 4 with WipeCenter 4
    • cert_lab: Secura B.V.
    • developer: AllWipe Ltd
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11024-2019: 1
  • NL:
    • NSCIB-CC-0114526-CR: 11
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Samsung:
    • Samsung: 1
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 3
  • Secura:
    • Secura: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
    • reverse engineering: 1
pdf_data/report_metadata
  • /CreationDate: D:20200227162648-05'00'
  • /ModDate: D:20200227162648-05'00'
  • pdf_file_size_bytes: 805289
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename st_vid11024-st.pdf YouWipe_Common_Criteria_EAL3_ST_V6.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP.1: 5
    • FCS_COP.1.1: 2
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_SSHC_EXT.1: 3
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSH_EXT.1: 3
    • FCS_SSH_EXT.1.1: 1
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT.1: 4
    • FDP_DAR_EXT.1.1: 1
    • FDP_DEC_EXT.1: 4
    • FDP_DEC_EXT.1.1: 1
    • FDP_DEC_EXT.1.2: 1
    • FDP_NET_EXT.1: 3
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 4
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 5
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 5
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 1
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 4
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 4
    • FTP_DIT_EXT.1.1: 1
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.2: 5
    • FCS_COP: 20
    • FCS_COP.1: 3
    • FCS_COP.1.1: 3
    • FCS_RNG: 3
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_RNG.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITI.1: 6
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_STM.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.BEHAVED_DRIV: 1
    • A.BEHAVED_DRIVES: 2
    • A.BIOS_PREVENTI: 1
    • A.BIOS_PREVENTING: 2
    • A.COMPETENT_U: 1
    • A.COMPETENT_USERS: 2
    • A.CORRECT_DEPL: 1
    • A.CORRECT_DEPLOYMENT: 3
    • A.SECURE_LOCAT: 1
    • A.SECURE_LOCATION: 3
    • A.SYSTEM_TIME: 3
    • A.TRUSTED_NET: 1
    • A.TRUSTED_NETWORK: 2
  • O:
    • O.AUTHENTIC: 1
    • O.AUTHENTICATED_USER: 5
    • O.PROPER_A: 1
    • O.PROPER_AUDIT: 5
    • O.PROPER_ER: 1
    • O.PROPER_ERASE: 7
    • O.PROPER_RE: 1
    • O.PROPER_REPORTS: 5
    • O.USER_SEPARATION: 2
    • O.USER_SEPE: 1
    • O.USER_SEPERATION: 4
  • OE:
    • OE.BEHAVED_DRIVES: 2
    • OE.BIOS_PREVENTING: 3
    • OE.COMPETENT_USERS: 3
    • OE.CORRECT_DEPLOYMENT: 2
    • OE.PROPER_TIME: 1
    • OE.SECURE_LOCATION: 4
    • OE.SYSTEM_TIME: 2
  • T:
    • T.DATA_RECOVER: 1
    • T.DATA_RECOVERY: 2
    • T.UNAUTHENTIC: 1
    • T.UNAUTHENTICATED_USER: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 2
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA2: 1
  • SHA:
    • SHA2:
      • SHA256: 13
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 36
  • TLS:
    • TLS:
      • TLS: 12
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RNG: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 5
    • P-384: 4
    • P-521: 4
    • curve P-256: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 2
  • NIST:
    • NIST SP 800-38A: 1
  • PKCS:
    • PKCS12: 2
    • PKCS8: 2
  • RFC:
    • RFC 4251: 1
    • RFC 4253: 1
    • RFC 5280: 4
    • RFC 5759: 1
  • X509:
    • X.509: 3
  • FIPS:
    • FIPS 180-4: 2
  • PKCS:
    • PKCS#1: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Erasure Tool User Manual v.2.0.6 well as all the hardware associated with the targeted media, are out of scope for the evaluation. YouWipe lists all the detected hardware via its user interface (GUI). The user: 1
    • as well as the hardware of the mobile phone are assumed to be operating correctly and are out of scope of the evaluation. After overwriting step, the data in disk is verified to be overwritten: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: f.kirbiyik
  • /CreationDate: D:20200803163651+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20200803163651+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1239579
  • pdf_hyperlinks: https://www.commoncriteriaportal.org/products/#DP
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different