name |
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60 |
genuscreen 4.0 |
category |
Databases |
Boundary Protection Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
12.10.2017 |
30.10.2019 |
not_valid_before |
06.09.2012 |
29.10.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823b_pdf.pdf |
manufacturer |
Microsoft Corporation |
GeNUA mbH |
manufacturer_web |
https://www.microsoft.com |
https://www.genua.de/ |
security_level |
EAL2 |
ASE_TSS.2, AVA_VAN.4, ALC_FLR.2, EAL4+ |
dgst |
bccee9cca27bae56 |
4577a1ed977931d9 |
heuristics/cert_id |
JISEC-CC-CRP-C0371 |
BSI-DSZ-CC-0823-2014 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, AVA_VAN.4, ADV_TAT.1, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
11.0.2100.60 |
4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0966-2015 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0565-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0966-2015 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0382-2007, BSI-DSZ-CC-0565-2009 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0371
- certification_date: 01.09.2012
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cert_link: https://www.ipa.go.jp/en/security/c0371_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2012. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functions This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user and metadata stored in the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users.
- evaluation_facility: TワV Informationstechnik GmbH, Evaluation Body for IT-Security
- product: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English)
- product_type: Database Management System (DBMS)
- report_link: https://www.ipa.go.jp/en/security/c0371_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0371_est.pdf
- toe_version: 11.0.2100.60
- vendor: Microsoft Corporation
- expiration_date: 01.10.2017
- supplier: Microsoft Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0371_it1383.html
- toe_overseas_name: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.2100.60
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0371_erpt.pdf |
0823a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0823-2014
- cert_item: genuscreen 4.0
- cert_lab: BSI
- developer: genua mbh
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0371-01: 1
- Certification No. C0371: 1
|
- DE:
- BSI-DSZ-CC-0565-2009: 3
- BSI-DSZ-CC-0823: 1
- BSI-DSZ-CC-0823-2014: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 17
- EAL 4 augmented: 3
- EAL 5: 9
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 6
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 7
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 7
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_: 1
- A.PHYSICAL: 1
- T:
- T.MASQUERADE: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHORIZED_: 1
- T.UNIDENTIFIED_: 1
|
- A:
- A.ADMIN: 3
- A.HANET: 3
- A.INIT: 3
- A.NOEVIL: 3
- A.PHYSEC: 4
- A.RANDOM: 4
- A.SINGEN: 3
- A.TIMESTMP: 2
- OE:
- OE.ADMIN: 1
- OE.HANET: 1
- OE.INIT: 1
- OE.NOEVIL: 1
- OE.PHYSEC: 1
- OE.RANDOM: 1
- OE.SINGEN: 1
- OE.TIMESTMP: 1
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 17
- Microsoft Corporation: 7
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7138: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch: 1
- OutOfScope:
- The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a: 1
- or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6: 1
- out of scope: 2
|
pdf_data/report_metadata |
- /CreationDate: D:20130527154721+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20130527154854+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 225890
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 29
|
|
pdf_data/st_filename |
c0371_est.pdf |
0823b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 4
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_INT: 2
- ADV_SPM: 2
- ADV_TAT.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 3
- AGD_PRE: 1
- AGD_PRE.1: 3
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_FLR: 1
- ALC_FLR.2: 3
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.2: 4
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SEL.1: 6
- FAU_SEL.1.1: 1
- FAU_STG: 3
- FAU_STG.1: 2
- FAU_STG.3: 1
- FAU_STG.4: 1
- FAU_STG_EXP: 2
- FAU_STG_EXP.5: 14
- FAU_STG_EXP.5.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 8
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_REV.1: 14
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FAU_GEN: 20
- FAU_GEN.1: 5
- FAU_GEN.2: 1
- FAU_SAR: 12
- FAU_SAR.1: 3
- FAU_SAR.3: 1
- FCS:
- FCS_CKM: 143
- FCS_CKM.1: 29
- FCS_CKM.4: 31
- FCS_COP: 100
- FCS_COP.1: 29
- FDP:
- FDP_IFC: 53
- FDP_IFC.1: 33
- FDP_IFF: 43
- FDP_IFF.1: 37
- FDP_ITT: 32
- FDP_ITT.1: 4
- FIA:
- FIA_ATD: 6
- FIA_ATD.1: 1
- FIA_SOS: 6
- FIA_SOS.1: 1
- FIA_UAU: 12
- FIA_UAU.2: 1
- FIA_UAU.6: 1
- FIA_UID: 6
- FIA_UID.1: 3
- FIA_UID.2: 2
- FMT:
- FMT_IFC.2: 2
- FMT_MOF: 6
- FMT_MOF.1: 1
- FMT_MSA: 166
- FMT_MSA.1: 26
- FMT_MSA.2: 4
- FMT_MSA.3: 18
- FMT_SMF: 49
- FMT_SMF.1: 22
- FMT_SMR: 8
- FMT_SMR.1: 26
- FPT:
- FPT_ITT: 8
- FPT_ITT.1: 3
- FPT_STM.1: 3
- FPT_TEE: 8
- FPT_TEE.1: 2
- FPT_TRC: 6
- FPT_TRC.1: 1
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL: 3
- O:
- O.ADMIN_ROLE: 5
- O.AUDIT_GENERATION: 6
- O.MANAGE: 7
- O.MEDIATE: 4
- OE:
- OE.NO_EVIL: 4
- OE.NO_GENERAL_: 3
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 4
- T:
- T.MASQUERADE: 3
- T.TSF_COMPROMISE: 3
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.UNIDENTIFIED_ACTIONS: 3
|
- A:
- A.ADMIN: 4
- A.HANET: 5
- A.INIT: 4
- A.NOEVIL: 4
- A.PHYSEC: 4
- A.RANDOM: 4
- A.SINGEN: 5
- A.TIMESTMP: 4
- O:
- O.AUDREC: 5
- O.AUTH: 12
- O.AVAIL: 5
- O.CONFID: 13
- O.INTEG: 9
- O.MEDIAT: 4
- O.NOREPLAY: 13
- O.RS: 11
- OE:
- OE.ADMIN: 2
- OE.HANET: 5
- OE.INIT: 7
- OE.NOEVIL: 3
- OE.PHYSEC: 4
- OE.RANDOM: 3
- OE.SINGEN: 4
- OE.TIMESTMP: 5
- T:
- T.MEDIAT: 4
- T.MMODIFY: 4
- T.MODIFY: 4
- T.MSNIFF: 4
- T.NOAUTH: 4
- T.SELPRO: 4
- T.SNIFF: 4
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 54
- Microsoft Corporation: 2
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- PKCS:
- RFC:
- RFC2104: 7
- RFC2409: 9
- RFC2460: 2
- RFC2617: 1
- RFC2965: 1
- RFC3502: 1
- RFC3526: 5
- RFC3602: 1
- RFC4253: 6
- RFC4301: 1
- RFC4344: 1
- RFC4418: 7
- RFC4432: 1
- RFC5656: 7
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware: 1
- out of scope: 4
- the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and: 1
- to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration: 1
- when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP: 1
|
pdf_data/st_metadata |
|
- /Author: Roland Meister
- /CreationDate: D:20141023133113+02'00'
- /Creator: Writer
- /Keywords: CC 3.1
- /Producer: LibreOffice 4.1
- /Subject: Common Criteria
- /Title: genucreen 4.0 Security Target
- pdf_file_size_bytes: 657632
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |