Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CA Directory r12.0 SP3
383-4-167
Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
JISEC-CC-CRP-C0505
name CA Directory r12.0 SP3 Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
category Network and Network-Related Devices and Systems Multi-Function Devices
scheme CA JP
not_valid_after 15.05.2017 31.03.2021
not_valid_before 01.03.2011 31.03.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ca-directory-r120-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0505_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ca-directory-r120-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0505_est.pdf
manufacturer CA Technologies Fuji Xerox Co., Ltd.
manufacturer_web https://www.ca.com https://www.fujixerox.co.jp/eng/
security_level EAL3+, ALC_FLR.1 EAL2+, ALC_FLR.2
dgst b1c92fd8a023c4f6 d134e9e8b6240ca4
heuristics/cert_id 383-4-167 JISEC-CC-CRP-C0505
heuristics/cert_lab CANADA []
heuristics/cpe_matches {} cpe:2.3:h:fujixerox:apeosport_3060:-:*:*:*:*:*:*:*, cpe:2.3:h:fujixerox:docucentre-v_3065:-:*:*:*:*:*:*:*
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ASE_TSS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 12.0 1.0.13, 2.0.8
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0505
  • certification_date: 01.03.2016
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0505_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi Function Device (MFD) that provides such functions as copy, print, scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and Fax
    • product_type: Multi Function Device
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0505_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0505_est.pdf
    • toe_version: Controller ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
    • vendor: Fuji Xerox Co., Ltd.
  • expiration_date: 01.04.2021
  • supplier: Fuji Xerox Co., Ltd.
  • toe_japan_name: Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0505_it5559.html
  • toe_overseas_name: Fuji Xerox ApeosPort-V 3065/3060/2060 DocuCentre-V 3065/3060/2060 models with Hard Disk, Data Security, Scan, Print, and FaxController ROM Ver. 1.0.13, FAX ROM Ver. 2.0.8
heuristics/protection_profiles {} 43ce79b420f23a00
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/report_filename ca-directory-r120-cert-eng.pdf c0505_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-167-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-167: 1
    • 383-4-167-CR: 1
  • JP:
    • CRP-C0505-01: 1
    • Certification No. C0505: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 3 augmented: 1
    • EAL 3+: 1
    • EAL3+: 4
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
  • Microsoft:
    • Microsoft: 14
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 8
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 7
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
    • out of scope: 1
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1R3
  • /CC date: July 2009
  • /CEM Version: 3.1R3
  • /CEM date: July 2009
  • /CR_Date: 2 February 2011
  • /CR_Version: 1.0
  • /Client City: Framingham
  • /Client Country: USA
  • /Client Full Name: CA, Inc.
  • /Client Postal Code: 01702
  • /Client Short Name: CA
  • /Client State: Massachusetts
  • /Client Street: 100 Staples Drive
  • /Company: CA Technologies
  • /CreationDate: D:20110328103635-04'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer Long: CA, Inc.
  • /Developer Long Name: CA, Inc.
  • /Developer Short: CA
  • /Developer Short Name: CA
  • /Document Date: 15 June 2010
  • /EAL Level: 3+
  • /EAL Level Base: 3
  • /EAL Level Text: 3 augmented
  • /EAL Long: EAL 3 Augmented
  • /EAL Num Target: 3+
  • /EAL Short: EAL3+
  • /ETPlan_Doc#: 1664-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 1.0
  • /ETPlan_date: 3 January 2011
  • /ETProcRes_Date: 3 January 2011
  • /ETProcRes_Doc#: 1664-000-D004
  • /ETProcRes_Title: Evaluation Test Procedures and Test Results
  • /ETProcRes_Version: 1.0
  • /ETProc_Date: 3 January 2011
  • /ETProc_Doc#: 1664-000-D004
  • /ETProc_Title: Evaluation Test Procedures and Test Results
  • /ETProc_Version: 1.0
  • /ETReport_Date: 1 February 2011
  • /ETReport_Doc#: 1664-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 1.2
  • /EWP_Date: 17 June 2010
  • /EWP_Doc#: 1664-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.0
  • /Eval number: 383-4-167
  • /Eval_End_Date: [dd month yyyy (date on certificate)]
  • /Eval_Start_Date: 1 May 2010
  • /LeadEvaluator: Greg Lague
  • /LeadEvaluatorInitials: GL
  • /ModDate: D:20110328103658-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Product Name: CA Directory r12.0 SP3
  • /Product Short Name: CA Directory
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1664
  • /ST_Date: 30 November 2010
  • /ST_Title: CA Directory r12.0 SP3 Security Target for EAL3+
  • /ST_Version: 3.0
  • /SVC_Date: dd month yyyyy
  • /SVC_Doc#: 1664-000-D007
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: X.X
  • /SVR_Date: dd month yyyyy
  • /SVR_Doc#: 1664-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: X.X
  • /SV_City: Melbourne
  • /Security Classification: EWA-Canada & CA, Inc. Proprietary
  • /SourceModified: D:20110328130724
  • /Sponsor: CA, Inc.
  • /Sponsor City: Framingham
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 01702
  • /Sponsor State: Massachusetts
  • /Sponsor Street: 100 Staples Drive
  • /TOE: CA Directory r12.0 SP3
  • /TOE Line1: [TOE Line1 - enter later for PCR or web page]
  • /TOE Line2: [TOE Line2 - enter later for PCR or web page]
  • /TOE Line3: [TOE Line3 - enter later for PCR or web page]
  • /TOE Line4: [TOE Line4 - enter later for PCR or web page]
  • /TOE Line5: [TOE Line5 - enter later for PCR or web page]
  • /TOE Short: CA Directory
  • /TOE Short with version: CA Directory r12.0 SP3
  • /TOE Short-NoTM: CA Directory
  • /TOE Version: r12.0 SP3
  • /TOE with version: CA Directory r12.0 SP3
  • /TOE-NoTM: CA Directory r12.0 SP3
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • /Version: Version 1.1
  • /_AdHocReviewCycleID: 858570575
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Reade, Rick A.
  • /_EmailSubject: 383-4-167 CPL post request ... rick
  • pdf_file_size_bytes: 83509
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20160519151340+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /ModDate: D:20160519151527+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Title:
  • pdf_file_size_bytes: 479332
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 40
pdf_data/st_filename ca-directory-r120-sec-eng.pdf c0505_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 7
    • EAL3 augmented: 2
    • EAL3+: 1
  • EAL:
    • EAL 2: 1
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 12
    • ADV_FSP.3: 14
    • ADV_TDS.2: 15
  • AGD:
    • AGD_OPE.1: 19
    • AGD_PRE.1: 15
  • ALC:
    • ALC_CMC.3: 15
    • ALC_CMS.2: 2
    • ALC_CMS.3: 6
    • ALC_DEL.1: 10
    • ALC_DVS.1: 7
    • ALC_FLR.1: 13
    • ALC_LCD.1: 8
  • ASE:
    • ASE_CCL.1: 13
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.2: 12
    • ASE_REQ.2: 15
    • ASE_SPD.1: 9
    • ASE_TSS.1: 6
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV.2: 5
    • ATE_DPT.1: 7
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SEL.1: 25
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 12
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 11
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_FLT.1: 11
    • FRU_FLT.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 2
    • FCS_COP: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 99
    • FDP_ACC.1.1: 8
    • FDP_ACF.1: 92
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
    • FDP_IFC: 1
    • FDP_IFC.1: 8
    • FDP_IFF: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 19
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 22
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 99
    • FMT_MSA.1.1: 8
    • FMT_MSA.3: 90
    • FMT_MSA.3.1: 8
    • FMT_MSA.3.2: 8
    • FMT_MTD.1: 23
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 38
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 45
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 16
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.LOCATE: 1
    • A.NOEVIL: 1
  • O:
    • O.ACCESS: 5
    • O.AUDIT: 3
    • O.IDENTIFY: 4
    • O.MANAGE: 3
    • O.PASSWORD: 3
    • O.ROBUST_ADMIN_GUID: 2
    • O.ROBUST_ADMIN_GUIDAN: 1
    • O.SELF_PROTECTION: 3
  • OE:
    • OE.ADMIN: 1
    • OE.AUTH: 6
    • OE.FILESYS: 3
    • OE.LOCATE: 2
    • OE.NOEVIL: 3
    • OE.SYSTIME: 4
  • T:
    • T.ACCESS: 7
    • T.ADMIN_ERROR: 4
    • T.AUDIT_COMPROMISE: 5
    • T.MASK: 4
    • T.MASQUERADE: 2
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 13
    • D.DOC: 60
    • D.FUNC: 53
    • D.PROT: 4
  • O:
    • O.AUDIT: 8
    • O.AUDIT_ACCESS: 10
    • O.AUDIT_STORAGE: 10
    • O.CIPHER: 8
    • O.CONF: 16
    • O.DOC: 16
    • O.FUNC: 8
    • O.INTERFACE: 8
    • O.PROT: 8
    • O.SOFTWARE: 8
    • O.USER: 14
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 159
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 9
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2007-09-004: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2104: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Out of Scope: 5
    • Out of Scope The following table lists the minimum hardware requirements of the TOE. Computer Role Minimum RAM: 1
    • into memory and the TOE is initialized, these configuration files are not referenced and moved out of scope. 2.5.3 Identification & Authentication CA Directory provides the following levels of authentication: 1
    • out of scope: 1
    • • Windows Server 2003 64-bit: Used in the Evaluated Configuration • Linux x86/ servers: Out of Scope • Windows x86/64 servers: Out of Scope • AIX servers: Out of Scope • HPUX RISC: Out of Scope • HPUX: 1
  • ConfidentialDocument:
    • When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
pdf_data/st_metadata
  • /Author: glague
  • /CreationDate: D:20101130113109-05'00'
  • /Creator: PDFCreator Version 1.0.2
  • /Keywords:
  • /ModDate: D:20110304084824-05'00'
  • /Producer: GPL Ghostscript 8.70
  • /Subject:
  • /Title: Booz_Allen_CA_Directory_ASE
  • pdf_file_size_bytes: 462573
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
  • /Author:
  • /CreationDate: D:20160519092202+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160519092202+09'00'
  • /Producer: Acrobat Distiller 10.1.16 (Windows)
  • /Title:
  • pdf_file_size_bytes: 849926
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 136
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different