name |
Forescout v8.3 |
PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0 |
category |
Network and Network-Related Devices and Systems |
Operating Systems |
scheme |
US |
DE |
status |
active |
active |
not_valid_after |
20.06.2025 |
17.09.2028 |
not_valid_before |
05.08.2022 |
18.09.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11279-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11279-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11279-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185b_pdf.pdf |
manufacturer |
ForeScout Technologies, Inc. |
SYSGO GmbH |
manufacturer_web |
https://www.forescout.com/ |
https://www.SYSGO.com |
security_level |
{} |
ADV_IMP.2, ALC_CMC.5, EAL5, AVA_VAN.5, ALC_DVS.2, ALC_FLR.3 |
dgst |
c1819079f2cf4d17 |
34fd0553bb4a99ab |
heuristics/cert_id |
CCEVS-VR-VID-11279-2022 |
BSI-DSZ-CC-1185-2023 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ALC_TAT.1, ALC_CMS.5, AVA_VAN.5, ADV_FSP.4, ALC_LCD.1, ALC_DVS.2, ALC_CMC.5, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ATE_DPT.1, ALC_FLR.3, ADV_INT.2, ADV_IMP.2, AGD_PRE.1 |
heuristics/extracted_versions |
8.3 |
5.1.3, 3.1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1146-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1146-2022 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
89f2a255423f4a20 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
pdf_data/cert_filename |
st_vid11279-ci.pdf |
1185c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11279-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.3: 1
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220815124603-04'00'
- /ModDate: D:20220815124603-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181185
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel"
- /Subject: Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel
- /Title: Certificate BSI-DSZ-CC-1185-2023
- pdf_file_size_bytes: 337655
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid11279-vr.pdf |
1185a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID11279-2022
- cert_item: Forescout v8.3
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5 valid until: 17 September 2028
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1185-2023
- cert_item: PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0
- cert_lab: BSI
- developer: SYSGO GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11279-2022: 1
|
- DE:
- BSI-DSZ-CC-1146-2022: 2
- BSI-DSZ-CC-1185-2023: 15
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 4
- EAL 5: 7
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_IMP.2: 5
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMC.5: 5
- ALC_CMS.5: 1
- ALC_DVS.2: 5
- ALC_FLR: 3
- ALC_FLR.3: 5
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.3: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_COP: 4
- FCS_RBG_EXT.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- OE:
- OE.EXCLUSIVE_RESOURCES: 1
- OE.HARDWARE: 1
- OE.PHYSICAL: 1
- OE.PRIVILEGED_EXECUTABLES: 1
- OE.TRUSTWORTHY_PERSONNEL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC-SHA-256: 2
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- SSH:
- SSH: 11
- SSHv1: 2
- SSHv2: 1
- TLS:
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 4, 2023-08-30, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE (Master Document List), 2023-07-27, 20069-0000- MDL.xlsx, Sysgo: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [9] Guidance documentation for the TOE, see table 2 in chapter 2 7 specifically • AIS 32, Version: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20220815113601-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220815113601-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 570905
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel"
- /Subject: Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel
- /Title: Certification Report BSI-DSZ-CC-1185-2023
- pdf_file_size_bytes: 509913
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
st_vid11279-st.pdf |
1185b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 5
- EAL 5 augmented: 2
- EAL 5+: 1
- EAL5: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 13
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 7
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_SPD: 2
- ASE_SPD.1: 7
- ASE_TSS.1: 7
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 4
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.5: 4
- ALC_DVS.2: 5
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 2
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 2
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 32
- FCS_COP.1: 4
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHS_EXT.1: 10
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT.1: 8
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.1.4: 4
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 7
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 1
- FMT_MTD: 5
- FMT_MTD.1: 1
- FMT_SMF.1: 8
- FMT_SMR.2: 6
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 6
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 6
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 3
|
- FDP:
- FDP_ACC: 32
- FDP_ACC.2: 12
- FDP_ACF: 34
- FDP_ACF.1: 27
- FDP_IFC.2: 8
- FDP_IFF.1: 11
- FIA:
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.3: 7
- FMT_MSA.3.1: 2
- FMT_MTD: 12
- FMT_MTD.1: 3
- FMT_SMF.1: 5
- FMT_SMR.1: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTION: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.EXCLUSIVE_RESOURCES: 4
- A.HARDWARE: 4
- A.PHYSICAL: 4
- A.PRIVILEGED_EXECUTABLES: 5
- A.TRUSTWORTHY_PERSONNEL: 4
- OE:
- OE.EXCLUSIVE_RESOURCES: 3
- OE.HARDWARE: 2
- OE.PHYSICAL: 2
- OE.PRIVILEGED_EXECUTABLES: 3
- OE.TRUSTWORTHY_PERSONNEL: 3
- OT:
- OT.API_PROTECTION: 4
- OT.CONFIDENTIALITY: 6
- OT.INTEGRITY: 4
- OT.RESOURCE_AVAILABILITY: 6
- T:
- T.DEPLETION: 4
- T.DISCLOSURE: 4
- T.EXECUTION: 4
- T.MODIFICATION: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 8
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 9
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 11
- SHA-384: 8
- SHA-512: 6
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 3
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 69
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS v1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-004-001: 1
- CCMB-2017-004-002: 1
- CCMB-2017-004-003: 1
- CCMB-2017-004-004: 1
- FIPS:
- FIPS 186-4: 8
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 5
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 18031:2011: 4
- ISO/IEC 19772:2009: 1
- ISO/IEC 9796-2: 2
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 3268: 4
- RFC 3447: 2
- RFC 3526: 10
- RFC 4253: 1
- RFC 5077: 1
- RFC 5246: 10
- RFC 5280: 4
- RFC 5288: 4
- RFC 6125: 2
- RFC 6960: 2
- RFC7030: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- environment the TOE is managing. The TOEs management of the enterprise operational environment is out of scope for the NDcPP. Therefore, interface E4 to these components is out of scope of the evaluation: 1
- out of scope: 3
- the update server directly. The TOE receives the update from the Forescout Console. Interface E8 is out of scope of the evaluation. It is being declared as part of the test environment for completeness as it is: 1
|
|
pdf_data/st_metadata |
- /Author: McGeady, Megan [USA]
- /CreationDate: D:20230504103519-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230504103519-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1111513
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0639, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0631, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0638, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0564, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0580, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0592, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0670, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0538, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0569, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0635, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0555, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0536, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0571, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0546, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0528, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0636, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0563, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0581, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0537, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0633, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0547, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0591, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0632, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0556, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0570, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0527, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0572, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0634
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
- /Author: Guillaume Fumaroli
- /Keywords: operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforcé
- /Subject:
- /Title: Security Target for the PikeOS Separation Kernel v5.1.3 for the NXP LS1023A/LS1043A Processor
- pdf_file_size_bytes: 897440
- pdf_hyperlinks: mailto:[email protected], mailto:[email protected], mailto:[email protected], https://www.sysgo.com
- pdf_is_encrypted: True
- pdf_number_of_pages: 59
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |