name |
RICOH IM 9000/9000T/8000/7000J-2.00 |
Cisco Email Security Appliance with AsyncOS 13.0 |
category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
scheme |
JP |
CA |
status |
active |
active |
not_valid_after |
31.01.2029 |
20.09.2026 |
not_valid_before |
31.01.2024 |
20.09.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/495-LSS%20CT%20v1.1.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/495-LSS%20CR%20v1.1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0804_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/495-LSS%20ST%20v1.3.pdf |
manufacturer |
Ricoh Company, Ltd. |
Cisco Systems, Inc. |
manufacturer_web |
https://www.ricoh.com/ |
https://www.cisco.com |
security_level |
EAL2+, ALC_FLR.2 |
{} |
dgst |
bf6eacbf491bd984 |
9fe346b62f0ab20b |
heuristics/cert_id |
JISEC-CC-CRP-C0804-01-2024 |
495-LSS |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
cpe:2.3:o:cisco:asyncos:13.0.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:13.0.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:13.0.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:13.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:13.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:13.0.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2021-1566, CVE-2020-3132, CVE-2023-20009, CVE-2020-3568, CVE-2020-3181, CVE-2020-3370, CVE-2022-20653, CVE-2022-20960, CVE-2020-3164, CVE-2022-20664, CVE-2020-3447, CVE-2021-1129, CVE-2020-3137, CVE-2023-20075 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
2.00 |
13.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0804
- certification_date: 01.01.2024
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0804
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_eimg.pdf
- certification_date: 31.01.2024
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a multifunction product that provides Copy, Printer, Scanner, Fax, and Document Server functions. The TOE provides security functions that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Security Management Function: Enables the TOE administrator to control security functions. Integrity Verification Function: Enables the TOE to verify the integrity of executable codes of control software. Fax Line Separation Function: Enables the TOE to prevent unauthorized intrusion from telephone lines.
- evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
- expiration_date: 31.01.2029
- product: RICOH IM 9000/9000T/8000/7000
- product_type: Multifunction Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000002pnj-att/c0804_est.pdf
- toe_version: J-2.00
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.01.2029
- supplier: RICOH COMPANY, LTD.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0804_it3851.html
- toe_japan_name: RICOH IM 9000 / 9000T / 8000 / 7000 J-2.00
- toe_overseas_link: None
- toe_overseas_name: -----
|
- certification_date: 20.09.2021
- level: cPP_ND_v2.1
- product: Cisco Email Security Appliance with AsyncOS 13.0
- vendor: Cisco Systems, Inc
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
43ce79b420f23a00 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
pdf_data/cert_filename |
c0804_eimg.pdf |
495-LSS CT v1.1.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0804-01-2024: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Cisco:
- Cisco: 1
- Cisco Systems: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20240328140527+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20240328140702+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20240328050510
- /Subject:
- /Title:
- pdf_file_size_bytes: 236136
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20210921083120-05'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1640464
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0804_erpt.pdf |
495-LSS CR v1.1.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 495-LSS
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0804-01-2024: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 3
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 15
- Cisco Systems: 1
- Cisco Systems, Inc: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IPsec:
- TLS:
- TLS:
- TLS: 6
- TLS 1.2: 3
- TLS 1.3: 3
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /Company:
- /CreationDate: D:20240328145542+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /Manager:
- /ModDate: D:20240328145658+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20240327021241
- /Subject:
- /Title:
- pdf_file_size_bytes: 628579
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: Clark, Cory P.
- /CreationDate: D:20210921082624-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210921082624-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 677468
- pdf_hyperlinks: http://www.securiteam.com/, http://nessus.org/plugins/index.php?view=search, https://www.openssh.com/releasenotes.html, mailto:[email protected], https://www.exploit-db.com/, http://www.kb.cert.org/vuls/html/search, https://tools.cisco.com/security/center/publicationListing.x, http://www.zerodayinitiative.com/advisories, https://www.rapid7.com/db/vulnerabilities, https://www.openssl.org/news/vulnerabilities.html, https://web.nvd.nist.gov/view/vuln/search
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
c0804_est.pdf |
495-LSS ST v1.3.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 10
- FAU_SAR.2.1: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 28
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 28
- FMT_MSA.1.1: 2
- FMT_MSA.3: 25
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 18
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 32
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_GEN_EXT.1: 3
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 9
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 3
- FAU_STG_EXT.2: 3
- FAU_STG_EXT.3: 6
- FAU_STG_EXT.4: 4
- FCO:
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 11
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 38
- FCS_COP.1: 5
- FCS_NTP_EXT: 2
- FCS_NTP_EXT.1: 3
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 16
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 4
- FCS_RGB_EXT.1.2: 1
- FCS_SSHC_EXT: 3
- FCS_SSHC_EXT.1: 11
- FCS_SSHC_EXT.1.1: 4
- FCS_SSHC_EXT.1.2: 2
- FCS_SSHC_EXT.1.3: 2
- FCS_SSHC_EXT.1.4: 3
- FCS_SSHC_EXT.1.5: 5
- FCS_SSHC_EXT.1.6: 3
- FCS_SSHC_EXT.1.7: 3
- FCS_SSHC_EXT.1.8: 2
- FCS_SSHC_EXT.1.9: 3
- FCS_SSHS_EXT: 3
- FCS_SSHS_EXT.1: 12
- FCS_SSHS_EXT.1.1: 4
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 5
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 3
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 4
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSS_EXT: 6
- FCS_TLSS_EXT.1: 14
- FCS_TLSS_EXT.1.1: 4
- FCS_TLSS_EXT.1.2: 3
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2: 2
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.4: 1
- FCS_TLSS_EXT.2.5: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 11
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.2: 12
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF: 9
- FMT_MOF.1: 1
- FMT_MTD: 10
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 12
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT: 1
- FPT_ITT.1: 3
- FPT_PTD: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 3
- FPT_STM_EXT: 3
- FPT_STM_EXT.1: 8
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 3
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 6
- FPT_TST_EXT.2.1: 1
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 12
- FPT_TUD_EXT.1.1: 4
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.1.3: 8
- FPT_TUD_EXT.2: 5
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 8
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 12
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 17
- FTP_ITC.1.2: 1
- FTP_TRP: 4
- FTP_TRP.1: 3
- FTP_TRP.1.3: 1
- FTP_TUD.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.ADMIN: 10
- A.USER: 5
- D:
- D.CONF: 4
- D.DOC: 19
- D.FUNC: 13
- D.PROT: 4
- O:
- O.AUDIT: 9
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.INTERFACE: 9
- O.PROT: 10
- O.SOFTWARE: 9
- O.USER: 21
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 3
- OE.AUDIT_ACCESS_AUTHORIZED: 1
- OE.AUDIT_STORAGE: 4
- OE.INTERFACE: 4
- OE.PHYSICAL: 4
- OE.USER: 20
- T:
- T.CONF: 10
- T.DOC: 10
- T.FUNC: 5
- T.PROT: 5
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
- T.X: 1
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 37
- Cisco Systems, Inc: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 12
- SHA-512: 3
- SHA256: 6
- SHA384: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- SSL:
- TLS:
- TLS: 9
- TLS1.2: 2
- TLS1.3: 2
|
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 3
- SSL 2.0: 2
- SSL 3.0: 2
- SSL2.0: 1
- SSL3.0: 1
- TLS:
- TLS: 61
- TLS 1.0: 2
- TLS 1.1: 3
- TLS 1.2: 3
- TLS v1.0: 2
- TLS1.1: 1
- TLS1.2: 1
- TLSv1.1: 3
- TLSv1.2: 3
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 4
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 1
- FIPS 186-4: 2
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-3: 2
- FIPS PUB 186-4: 4
- ISO:
- ISO/IEC 18031:2011: 6
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-56A: 1
- SP 800-90: 1
- PKCS:
- RFC:
- RFC 2818: 4
- RFC 2986: 2
- RFC 3268: 6
- RFC 3526: 4
- RFC 4251: 3
- RFC 4253: 8
- RFC 4346: 2
- RFC 5246: 10
- RFC 5280: 7
- RFC 5647: 2
- RFC 5759: 2
- RFC 6960: 1
- RFC 8017: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. RFC 5647 only applies to the RFC compliant: 2
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: 株式会社リコー
- /CreationDate: D:20240311170537+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240311170537+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: RICOH IM 9000/9000T/8000/7000 Security Target
- pdf_file_size_bytes: 1332169
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |