Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Oracle Identity Governance 12c
604-LSS
Red Hat Enterprise Linux 9.0 EUS
CCEVS-VR-VID-11379-2024
name Oracle Identity Governance 12c Red Hat Enterprise Linux 9.0 EUS
category Access Control Devices and Systems Operating Systems
scheme CA US
not_valid_after 09.10.2029 09.01.2026
not_valid_before 09.10.2024 09.01.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/604-LSS%20CT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11379-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/604-LSS%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11379-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/604-LSS%20ST%20v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11379-st.pdf
manufacturer Oracle Corporation Red Hat, Inc.
manufacturer_web https://www.oracle.com https://www.redhat.com
dgst b3bdda767050e981 b4464b45639dc26c
heuristics/cert_id 604-LSS CCEVS-VR-VID-11379-2024
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*, cpe:2.3:a:redhat:enterprise_linux_fast_datapath:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:9.0:*:*:*:*:*:arm64:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.0:*:*:*:*:*:*:*, cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_high_availability:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.0_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-6693, CVE-2023-44487, CVE-2022-1587, CVE-2023-4133, CVE-2025-26465, CVE-2023-3773, CVE-2023-1513, CVE-2024-8354, CVE-2023-1667, CVE-2007-3103, CVE-2021-3997, CVE-2023-5217, CVE-2022-2989, CVE-2023-5869, CVE-2023-4569, CVE-2022-4743, CVE-2023-6622, CVE-2023-1192, CVE-2022-1158, CVE-2023-46848, CVE-2024-9676, CVE-2024-1048, CVE-2024-0564, CVE-2023-3750, CVE-2000-1207, CVE-2023-52356, CVE-2024-3049, CVE-2023-2491, CVE-2023-51764, CVE-2023-4194, CVE-2024-7006, CVE-2024-12088, CVE-2022-2153, CVE-2023-46846, CVE-2023-1729, CVE-2001-0889, CVE-2023-34968, CVE-2003-0461, CVE-2023-5380, CVE-2023-50782, CVE-2002-1155, CVE-2023-38473, CVE-2025-0678, CVE-2023-33951, CVE-2023-3138, CVE-2024-44070, CVE-2023-50781, CVE-2022-2601, CVE-2024-49395, CVE-2016-7091, CVE-2024-0232, CVE-2023-2731, CVE-2023-6004, CVE-2022-3500, CVE-2023-6121, CVE-2023-5090, CVE-2022-2211, CVE-2022-24805, CVE-2024-0639, CVE-2025-26599, CVE-2024-45778, CVE-2024-45782, CVE-2023-6536, CVE-2022-0171, CVE-2023-5157, CVE-2023-42669, CVE-2023-39193, CVE-2022-24809, CVE-2024-45617, CVE-2024-0690, CVE-2023-39189, CVE-2023-41175, CVE-2023-2454, CVE-1999-0894, CVE-2023-40549, CVE-2023-3972, CVE-2023-4459, CVE-2023-2194, CVE-2023-3961, CVE-2022-4904, CVE-2023-40661, CVE-2023-3576, CVE-2021-3695, CVE-2022-2509, CVE-2023-0778, CVE-2022-1184, CVE-2023-4004, CVE-2023-32573, CVE-2000-0017, CVE-2022-3821, CVE-2024-6237, CVE-2003-0464, CVE-2024-3567, CVE-2023-5455, CVE-2023-2319, CVE-2022-4132, CVE-2023-6683, CVE-2022-0480, CVE-2023-2203, CVE-2024-9341, CVE-2023-2602, CVE-2022-2078, CVE-2022-25310, CVE-2003-0442, CVE-2021-35938, CVE-2023-3899, CVE-2023-44488, CVE-2023-6915, CVE-2024-0841, CVE-2022-2639, CVE-2023-6606, CVE-2022-1789, CVE-2021-3839, CVE-2023-40660, CVE-2022-24808, CVE-2023-6531, CVE-2023-28327, CVE-2023-5156, CVE-2023-3812, CVE-2023-6356, CVE-2022-1354, CVE-2022-34302, CVE-2022-25308, CVE-2025-3155, CVE-2024-50074, CVE-2021-3696, CVE-2023-43785, CVE-2024-45619, CVE-2022-1355, CVE-2023-4155, CVE-2023-3164, CVE-2023-1073, CVE-2022-3560, CVE-2025-26600, CVE-2024-0562, CVE-2022-24806, CVE-2022-34303, CVE-2023-0179, CVE-2023-4806, CVE-2023-38471, CVE-2023-48795, CVE-2023-39198, CVE-2023-2700, CVE-2023-3212, CVE-2023-4527, CVE-2024-0443, CVE-2023-5215, CVE-2023-0494, CVE-2025-26594, CVE-2023-2977, CVE-2023-38472, CVE-2021-35937, CVE-2023-43787, CVE-2020-14394, CVE-2023-5992, CVE-2023-42754, CVE-2024-2496, CVE-2023-4147, CVE-2023-3640, CVE-2022-2625, CVE-2023-5557, CVE-2023-39194, CVE-2022-1998, CVE-2023-1380, CVE-2023-1183, CVE-2023-2283, CVE-2022-1706, CVE-2022-1708, CVE-2025-26595, CVE-2023-5088, CVE-2023-4091, CVE-2023-4001, CVE-2024-6387, CVE-2023-50387, CVE-2022-1949, CVE-2023-3255, CVE-2023-3347, CVE-2023-5178, CVE-2023-2156, CVE-2023-7250, CVE-2023-40546, CVE-2023-6918, CVE-2023-3567, CVE-2023-38201, CVE-2025-26601, CVE-2023-6535, CVE-2003-0364, CVE-2023-38559, CVE-2023-6917, CVE-2023-2455, CVE-2024-0553, CVE-2024-0607, CVE-1999-0037, CVE-2023-38469, CVE-2024-0646, CVE-1999-0798, CVE-2024-12086, CVE-2023-3301, CVE-2003-0434, CVE-2025-3891, CVE-2021-4217, CVE-2022-24807, CVE-2024-49393, CVE-2023-38200, CVE-2022-2964, CVE-2024-45615, CVE-2023-1981, CVE-2023-40550, CVE-2023-32233, CVE-2024-45618, CVE-2024-45620, CVE-2023-5367, CVE-1999-1288, CVE-2025-1755, CVE-2024-12087, CVE-2023-2680, CVE-2023-1652, CVE-2023-2513, CVE-2023-4535, CVE-2023-40547, CVE-2023-3269, CVE-2022-34301, CVE-2022-40982, CVE-2022-3715, CVE-2023-33203, CVE-2021-4204, CVE-2023-3161, CVE-2023-0361, CVE-2024-8443, CVE-2023-7216, CVE-2024-0641, CVE-2022-1247, CVE-2023-2295, CVE-2023-38470, CVE-2022-2963, CVE-2022-2393, CVE-2025-5914, CVE-2024-6505, CVE-2023-46847, CVE-2022-1652, CVE-2025-2784, CVE-2024-3056, CVE-2022-2990, CVE-2023-40745, CVE-2022-4285, CVE-2024-0775, CVE-1999-0297, CVE-2022-1586, CVE-2024-23301, CVE-2024-0914, CVE-2023-6679, CVE-2021-3697, CVE-2023-5981, CVE-2023-1289, CVE-2024-9675, CVE-2023-4693, CVE-2023-43789, CVE-2023-6710, CVE-2023-5868, CVE-2024-0229, CVE-2023-2603, CVE-2022-1198, CVE-2023-6240, CVE-2023-34966, CVE-2023-43786, CVE-2023-4641, CVE-2022-0168, CVE-2022-25309, CVE-2023-34967, CVE-2001-0690, CVE-2022-4283, CVE-2022-2132, CVE-2024-0217, CVE-2022-3424, CVE-2023-27561, CVE-2023-7192, CVE-2022-1016, CVE-2023-6610, CVE-2023-5870, CVE-2023-6681, CVE-2023-2019, CVE-2022-2127, CVE-2023-4813, CVE-2023-2953, CVE-2022-2873, CVE-2023-6176, CVE-2023-1206, CVE-2023-5824, CVE-2023-3618, CVE-2022-0987, CVE-2022-1263, CVE-2023-1672, CVE-2024-1151, CVE-2022-1462, CVE-2023-5633, CVE-2023-3758, CVE-2023-47038, CVE-2024-1488, CVE-2024-5742, CVE-2022-3707, CVE-2023-0664, CVE-2023-51765, CVE-2023-4911, CVE-2023-51767, CVE-2023-42753, CVE-2023-3354, CVE-2023-39418, CVE-2023-52160, CVE-2025-26596, CVE-2021-4158, CVE-2023-40551, CVE-2023-4387, CVE-2024-6239, CVE-2023-39417, CVE-2022-0934, CVE-2023-42756, CVE-2024-0193, CVE-2023-5871, CVE-2023-3772, CVE-2023-4273, CVE-2023-6546, CVE-2024-0409, CVE-2023-39191, CVE-2023-52355, CVE-2025-26597, CVE-2023-4692, CVE-2023-4010, CVE-2023-43788, CVE-2023-3019, CVE-2024-1454, CVE-2023-33952, CVE-2024-45616, CVE-2000-0701, CVE-2022-4900, CVE-2023-1095, CVE-2022-2850, CVE-2023-32373, CVE-2024-0408, CVE-2022-1852, CVE-2021-3864, CVE-2024-49394, CVE-2025-26598
heuristics/extracted_sars AGD_PRE.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, ALC_CMS.1, AVA_VAN.1, ASE_OBJ.1, ASE_SPD.1, ASE_ECD.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 ALC_CMS.1, ASE_CCL.1, AGD_PRE.1, ADV_FSP.1, ASE_INT.1, AVA_VAN.1, ASE_ECD.1, ASE_SPD.1, ALC_TSU_EXT.1, ASE_REQ.2, ATE_IND.1, ASE_TSS.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1
heuristics/extracted_versions - 9.0
heuristics/scheme_data
  • certification_date: 09.10.2024
  • level: PP_ESM_ICM_V2.1
  • product: Oracle Identity Governance 12c
  • vendor: Oracle Corporation
heuristics/protection_profiles baff81729834174e 3d6ad6fde534f6c6, c40ae795865a0dba, ed9c9d74c3710878
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ESM_ICM_V2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf
pdf_data/cert_filename 604-LSS CT.pdf st_vid11379-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 604-LSS: 1
  • US:
    • CCEVS-VR-VID11379-2024: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_metadata
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20241021133224-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20241021133224-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 386313
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20240111094409-05'00'
  • /ModDate: D:20240111094409-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 188451
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 604-LSS CR.pdf st_vid11379-vr.pdf
pdf_data/report_frontpage
  • US:
  • CA:
  • US:
    • cert_id: CCEVS-VR-VID11379-2024
    • cert_item: for the Red Hat Enterprise Linux 9.0 EUS
    • cert_lab: US NIAP
  • CA:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11379-2024: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
pdf_data/report_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
  • Lightship:
    • Lightship Security: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 4
    • SSHv2: 4
  • TLS:
    • TLS:
      • TLS: 3
      • TLSv1.2: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Gugel, Anne T.
  • /CreationDate: D:20240111093533-05'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240111093632-05'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 426989
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename 604-LSS ST v1.5.pdf st_vid11379-st.pdf
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 1
    • FCS_CKM_EXT.4: 1
    • FCS_COP: 2
    • FCS_COP.1: 2
    • FCS_RBG_EXT.1: 2
    • FCS_SSH: 1
    • FCS_SSH_EXT.1: 2
    • FCS_SSH_EXT.1.7: 1
    • FCS_TLS: 1
    • FCS_TLS_EXT.1: 2
  • FIA:
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 4
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
  • FTA:
    • FTA_TAB.1: 1
  • FTP:
    • FTP_ICT.1: 1
    • FTP_ITC: 1
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 31
    • FCS_COP.1: 4
    • FCS_RBG_EXT: 8
    • FCS_RBG_EXT.1: 6
    • FCS_SSHC_EXT.1: 6
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT.1: 11
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_STO_EXT.1: 5
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 5
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.3: 5
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.5: 5
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 4
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT.1: 6
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 5
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 3
  • FPT:
    • FPT_ACF_EXT.1: 4
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 9
    • FPT_ASLR_EXT.1: 3
    • FPT_SBOP_EXT.1: 4
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT.1: 4
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 4
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 6
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CRYPTO: 1
    • A.ENROLLMENT: 1
    • A.ESM: 2
    • A.FEDERATE: 1
    • A.MANAGE: 1
    • A.ROBUST: 1
    • A.SYSTIME: 1
  • O:
    • O.ACCESSID: 1
    • O.AUDIT: 1
    • O.AUTH: 1
    • O.BANNER: 1
    • O.EXPORT: 1
    • O.IDENT: 1
    • O.INTEGRITY: 1
    • O.MANAGE: 1
    • O.PROTCOMMS: 1
    • O.PROTCRED: 1
    • O.SELFID: 1
  • OE:
    • OE.ADMIN: 1
    • OE.CRYPTO: 1
    • OE.ENROLLMENT: 1
    • OE.FEDERATE: 1
    • OE.INSTALL: 1
    • OE.MANAGEMENT: 1
    • OE.PERSON: 1
    • OE.ROBUST: 1
    • OE.SYSTIME: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.EAVES: 1
    • T.FALSIFY: 1
    • T.FORGE: 1
    • T.INSUFFATR: 1
    • T.MASK: 1
    • T.RAWCRED: 1
    • T.UNAUTH: 1
    • T.WEAKIA: 1
  • A:
    • A.PLATFORM: 3
    • A.PROPER_: 2
    • A.PROPER_ADMIN: 2
    • A.PROPER_USER: 2
  • O:
    • O.ACCOUNTABILITY: 6
    • O.INTEGRITY: 6
    • O.MANAGEMENT: 6
    • O.PROTECTED_: 7
    • O.PROTECTED_COMMS: 2
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_: 2
    • T.LOCAL_: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_: 3
    • T.NETWORK_ATTACK: 5
    • T.NETWORK_EAVESDROP: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 6
    • RSA 4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 7
      • SHA-384: 5
      • SHA-512: 8
      • SHA256: 7
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 3
  • KEX:
    • Key Exchange: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 9
  • SSH:
    • SSH: 64
    • SSHv2: 5
  • TLS:
    • DTLS:
      • DTLS: 1
    • TLS:
      • TLS: 44
      • TLS 1.1: 1
      • TLS 1.2: 1
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RBG: 1
  • PRNG:
    • DRBG: 12
  • RNG:
    • RBG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 10
    • P-521: 12
    • secp384r1: 2
    • secp521r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 10
pdf_data/st_keywords/standard_id
  • NIST:
    • NIST SP 800-131A: 1
  • FIPS:
    • FIPS PUB 180-4: 2
    • FIPS PUB 186-4: 6
    • FIPS PUB 198-1: 1
    • FIPS186-4: 6
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 2
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 2
  • RFC:
    • RFC 4251: 1
    • RFC 4252: 2
    • RFC 4253: 3
    • RFC 4344: 1
    • RFC 5246: 1
    • RFC 5280: 4
    • RFC 5288: 2
    • RFC 5289: 4
    • RFC 5647: 1
    • RFC 5656: 10
    • RFC 6066: 1
    • RFC 6125: 1
    • RFC 6668: 2
    • RFC 8268: 4
    • RFC 8332: 6
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • e.g. !, $, #, ^) 59 Additional password policy options are provided by the product but they are out of scope of the claimed Protection Profile so they are not discussed as part of the TSF: 1
    • e.g. !, $, #, ^) 59 Additional password policy options are provided by the product but they are out of scope of the claimed Protection Profile so they are not discussed as part of the TSF. 6.1.3 ESM_ICT.1 60: 1
    • out of scope: 1
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile,and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Garrett Nickel
  • /CreationDate: D:20240104152134-08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240111093302-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Red Hat Enterprise Linux 9.0 EUS
  • /Title: Red Hat
  • pdf_file_size_bytes: 513783
  • pdf_hyperlinks: https://www.lightshipsec.com/, mailto:[email protected], https://access.redhat.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different