name |
McAfee Enterprise Mobility Management 12.0 |
Secure Analogue and Digital KVM Switches - Black Box models SW2006A-USB-EAL, SW4006A-USB-EAL, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2009A-USB-EAL, SW4009A-USB-EAL |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
CA |
UK |
status |
archived |
archived |
not_valid_after |
04.09.2019 |
04.01.2016 |
not_valid_before |
04.09.2014 |
04.01.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CT%20v1.0e.docx |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CR%20v1.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp260.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20ST%20v1.16.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/t265_st.pdf |
manufacturer |
McAfee, Inc. |
Black Box Corporation |
manufacturer_web |
https://www.mcafee.com/ |
https://www.blackbox.com/ |
security_level |
EAL2+, ALC_FLR.2 |
ALC_FLR.2, ATE_DPT.2, EAL4+ |
dgst |
b193f130f541449d |
4605e0eaf615d2c4 |
heuristics/cert_id |
383-4-275 |
CRP260 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ATE_DPT.2, ATE_FUN.1, ALC_CMC.4, ADV_FSP.4, ATE_IND.2, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, AVA_VAN.3, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
12.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
CRP269 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
CRP269 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
383-4-275 CT v1.0e.docx |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
383-4-275 CR v1.0e.pdf |
crp260.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-275-CR
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 2+: 3
|
- EAL:
- EAL4: 2
- EAL4 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation: 1
- analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: cpclark
- /CR date: 04 September 2014
- /CR version: 1.0
- /Certificate date: 04 September 2014
- /Company: CSEC-CSTC
- /Conformance Claim: EAL 2 augmented
- /CreationDate: D:20140922130520-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: McAfee, Inc.
- /Document number: 383-4-275-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of McAfee, Inc. McAfee Enterprise Mobility Management 12.0, Version 0.3, 15 August 2014
- /Evaluation completion date: 15 August 2014
- /ModDate: D:20140922130523-04'00'
- /Producer: Adobe PDF Library 10.0
- /ST Title: Security Target: McAfee Enterprise Mobility Management 12.0, v1.16, 20 July 2014
- /SourceModified: D:20140903182940
- /TOE name and version: McAfee Enterprise Mobility Management 12.0
- /TOE short name: McAfee EMM v12.0
- /Title: 383-4-XXX CR vxe
- /_DocHome: -1616610741
- pdf_file_size_bytes: 289620
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: User
- /Company: Certification Body, CESG
- /CreationDate: D:20110111164749Z
- /Creator: Acrobat PDFMaker 7.0.5 for Word
- /ModDate: D:20110111164751Z
- /Producer: Acrobat Elements 7.0.5 (Windows)
- /Title: Certification Report
- /_AdHocReviewCycleID: -1320395370
- /_AuthorEmail: Nigel.WhittakerAxon@cesg.gsi.gov.uk
- /_AuthorEmailDisplayName: WhittakerAxon, Nigel
- /_EmailSubject: Word -> PDF (3)
- /_PreviousAdHocReviewCycleID: 2047206653
- pdf_file_size_bytes: 203099
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
383-4-275 ST v1.16.pdf |
t265_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 11
- EAL4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 3
- ADV_IMP.1: 2
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 5
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FDP:
- FDP_ACC.1: 3
- FDP_ETC: 1
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 3
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 5
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 3
- FDP_ITC.1.3: 1
- FDP_MSA.1: 1
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_SMF: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 2
- FMT_SMR.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.DATABASE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.PKI: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 14
- O.AUDITS: 4
- O.EADMIN: 6
- O.IDAUTH: 19
- O.INTEGRITY: 6
- O.MOBILE_POLICY: 3
- OE:
- OE.AUDIT_REVIEW: 2
- OE.CREDEN: 3
- OE.CRYPTO: 4
- OE.DATABASE: 4
- OE.INSTALL: 5
- OE.INTEROP: 3
- OE.MOBILE_ACCESS: 2
- OE.PERSON: 8
- OE.PHYCAL: 6
- OE.PKI: 3
- OE.PROTECT: 5
- OE.STORAGE: 4
- OE.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.IMPCON: 3
- T.LOSSOF: 3
- T.MOBILE_POLICY: 3
- T.NOHALT: 3
- T.PRIVIL: 3
|
- A:
- A.ACCESS: 2
- A.EMISSION: 1
- A.ISOLATE: 1
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.SCENARIO: 4
- O:
- O.CONF: 5
- O.CONNECT: 8
- O.INDICATE: 3
- O.INVOKE: 1
- O.NOPROG: 5
- O.ROM: 5
- O.SELECT: 3
- O.SWITCH: 9
- OE:
- OE.ACCESS: 2
- OE.EMISSION: 1
- OE.ISOLATE: 1
- OE.MANAGE: 5
- OE.NOEVIL: 5
- OE.PHYSICAL: 4
- OE.SCENARIO: 2
- T:
- T.BYPASS: 2
- T.INSTALL: 2
- T.LOGICAL: 3
- T.PHYSICAL: 2
- T.RESIDUAL: 2
- T.SPOOF: 2
- T.STATE: 2
- T.TRANSFER: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- of policies for managed mobile devices. 1.6.2 McAfee EMM Portal The McAfee Client Application (out of scope) connects to the EMM Portal to request the policy for the device. The McAfee EMM Portal (EMM Portal: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Primasec
- /CreationDate: D:20140924094632-04'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20140924094632-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Enterprise Mobility Management 12.0
- /Title: Security Target
- pdf_file_size_bytes: 1436557
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: Ian Mearns
- /CreationDate: D:20101206093805
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20101206093805
- /Producer: Microsoft® Office Word 2007
- /Title:
- pdf_file_size_bytes: 580697
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |