name |
Wickr Enterprise Client 6.10 |
A10 Networks Thunder TPS 4435S, 5435S and 6435S |
category |
Operating Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
NO |
status |
archived |
archived |
not_valid_after |
07.04.2025 |
29.06.2022 |
not_valid_before |
07.04.2023 |
29.06.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11320-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11320-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170629%20Sertit-062%20CR%20v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11320-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_A10_Networks_Thunder_TPS%20_v.1.5_06_01_2017-1ce.pdf |
manufacturer |
Wickr LLC |
A10 Networks, Inc. |
manufacturer_web |
https://wickr.com |
https://a10networks.com |
security_level |
{} |
EAL2+, ALC_FLR.1 |
dgst |
b8021ad7b03c725f |
94d03473bc603162 |
heuristics/cert_id |
CCEVS-VR-VID-11320-2023 |
SERTIT-062 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, ATE_FUN.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, ALC_TSU_EXT.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
6.10 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Application Software
- certification_date: 07.04.2023
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 07.04.2025
- id: CCEVS-VR-VID11320
- product: Wickr Enterprise Client 6.10
- scheme: US
- url: https://www.niap-ccevs.org/product/11320
- vendor: Wickr LLC
|
- category: Network and Network-Related Devices and Systems
- certification_date: 29.06.2017
- developer: A10 Networks, Inc.
- enhanced:
- category: Network and Network-Related Devices and Systems
- cert_id: SERTIT-062
- certification_date: 29.06.2017
- description: A10 Thunder TPS product line of Threat Protection Systems provides high-performance, network-wide protection against distributed denial of service (DDoS) attacks, and enables service availability against a variety of volumetric, protocol, resource and other sophisticated application attacks. The Thunder TPS product line is built upon our Advanced Core Operating System (ACOS) platform, with A10's Symmetric Scalable Multi-Core Processing (SSMP) software architecture that delivers high performance and leverages a shared memory architecture to provide efficient tracking of network flows, as well as accurate DDoS protection enforcement for service providers, Web site operators and enterprises. A10 Thunder TPS devices protect critical services in highly efficient hardware form factors, which enables your data center resources to be used productively. The combination of high performance in a small form factor results in lower OPEX through significantly lower power usage, reduced rack space and lowered cooling requirements.
- developer: A10 Networks, Inc.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135130-1607953013/SERTIT/Sertifikater/2017/62/20170629_Sertit-062_C_v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135124-1607953007/SERTIT/Sertifikater/2017/62/ST_A10_Networks_Thunder_TPS%20_v.1.5_06_01_2017-1ce.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135127-1607953010/SERTIT/Sertifikater/2017/62/20170629%20Sertit-062%20CR%20v1.0.pdf'})]})
- evaluation_facility: Advanced Data Security
- level: EAL 2, ALC_FLR.1
- mutual_recognition: CCRA
- product: 4435S, 5435S and 6435S
- product: A10 Networks Thunder TPS
- url: https://sertit.no/certified-products/product-archive/a10-networks-thunder-tps
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
90c116e62a19bc4d |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_V1.4.pdf |
{} |
pdf_data/cert_filename |
st_vid11320-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11320-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230411095315-04'00'
- /ModDate: D:20230411095315-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 179621
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11320-vr.pdf |
20170629 Sertit-062 CR v1.0.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11320-2023
- cert_item: for Wickr Enterprise Client 6.10
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11320-2023: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 3
- EAL 2 augmented: 2
- EAL1: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.2: 1
- FDP_IFF.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_STM.1: 1
- FPT_TST.1: 1
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.PHYSICAL_SECURITY: 1
- A.SECURITY_MAINTENANCE: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ACCESS: 1
- O.AUDIT: 1
- O.DATA_PROTECTION: 1
- O.ID_AUTH: 1
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.SELF_TEST: 1
- OE:
- OE.PHYSICAL_SECURITY: 1
- OE.SECURITY_MAINTENANCE: 1
- OE.TIME_STAMP: 1
- OE.TRUSTED_ADMIN: 1
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Qualcomm:
- Samsung:
|
|
pdf_data/report_keywords/eval_facility |
|
- ADS:
- Advanced Data Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Leidos CCTL
- /CreationDate: D:20230410085107-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230410085107-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 610080
- pdf_hyperlinks: https://nvd.nist.gov/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /AAPL:Keywords: ['ugradert']
- /Author: Rage, Arne Høye
- /CreationDate: D:20170629100905Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20170629100905Z00'00'
- /Producer: Mac OS X 10.12.5 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 662981
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
st_vid11320-st.pdf |
ST_A10_Networks_Thunder_TPS _v.1.5_06_01_2017-1ce.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 5
- EAL2 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_TSU_EXT: 2
- ALC_TSU_EXT.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 2
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.1: 4
- FCS_CKM_EXT.1.1: 1
- FCS_COP: 6
- FCS_COP.1: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.2: 5
- FCS_RBG_EXT.2.1: 1
- FCS_RBG_EXT.2.2: 1
- FCS_STO_EXT: 1
- FCS_STO_EXT.1: 10
- FCS_STO_EXT.1.1: 1
- FDP:
- FDP_DAR_EXT: 1
- FDP_DAR_EXT.1: 4
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT: 1
- FDP_DEC_EXT.1: 4
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 1
- FDP_NET_EXT: 1
- FDP_NET_EXT.1: 4
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT: 1
- FMT_CFG_EXT.1: 4
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 1
- FMT_MEC_EXT: 1
- FMT_MEC_EXT.1: 4
- FMT_MEC_EXT.1.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FPR:
- FPR_ANO_EXT: 1
- FPR_ANO_EXT.1: 4
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT: 1
- FPT_AEX_EXT.1: 4
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 1
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT: 1
- FPT_API_EXT.1: 4
- FPT_API_EXT.1.1: 1
- FPT_IDV_EXT: 2
- FPT_IDV_EXT.1: 3
- FPT_IDV_EXT.1.1: 1
- FPT_LIB_EXT: 1
- FPT_LIB_EXT.1: 4
- FPT_LIB_EXT.1.1: 1
- FPT_TUD_EXT: 10
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.2: 5
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 2
- FPT_TUD_EXT.2.3: 1
- FTP:
- FTP_DIT_EXT: 1
- FTP_DIT_EXT.1: 5
- FTP_DIT_EXT.1.1: 1
|
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_IFC.2: 8
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.PHYSICAL_SECURITY: 2
- A.SECURITY_MAINTENANCE: 1
- A.TRUSTED_ADMIN: 2
- O:
- O.ACCESS: 7
- O.AUDIT: 9
- O.DATA_PROTECTION: 8
- O.ID_AUTH: 7
- O.INTEGRITY: 7
- O.MANAGEMENT: 8
- O.SELF_TEST: 6
- OE:
- OE.PHYSICAL_SECURITY: 4
- OE.SECURITY_MAINTENANCE: 3
- OE.TIME_STAMP: 3
- OE.TRUSTED_ADMIN: 7
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Qualcomm:
- Samsung:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 5
- HMAC-SHA-384: 5
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 8
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-4: 8
- FIPS PUB 186-4: 12
- FIPS PUB 198-1: 4
- NIST:
- NIST SP 800-38: 4
- NIST SP 800-38D: 1
- NIST SP 800-56A: 4
- NIST SP 800-57: 1
- NIST SP 800-90A: 4
- RFC:
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.google: 2
- com.google.android: 4
- com.googlecode: 1
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Admin
- /CreationDate: D:20170604000342-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20170604000342-07'00'
- /Producer: GPL Ghostscript 8.64
- /Title: Microsoft Word - ST_A10_Networks_Thunder_TPS _v.1.5_06_01_2017-1ce.docx
- pdf_file_size_bytes: 738328
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |