Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
JISEC-CC-CRP-C0475
EMC® Greenplum® 4.2
383-4-196
name Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 EMC® Greenplum® 4.2
scheme JP CA
not_valid_after 01.07.2020 15.05.2017
not_valid_before 16.06.2015 12.04.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-greenplum-v42-cert-eng.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-greenplum-v42-sec-eng.pdf
manufacturer Microsoft Corporation EMC Corporation
manufacturer_web https://www.microsoft.com https://www.emc.com/
dgst c225189611bed8f2 92a9c18ad5532d42
heuristics/cert_id JISEC-CC-CRP-C0475 383-4-196
heuristics/cert_lab [] CANADA
heuristics/extracted_sars ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 12.0.2000.8 4.2
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0475
  • certification_date: 01.06.2015
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0475_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2014. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • protection_profile: U.S. Government Protection Profile for Database Management Systems, Version 1.3
    • report_link: https://www.ipa.go.jp/en/security/c0475_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0475_est.pdf
    • toe_version: 12.0.2000.8
    • vendor: Microsoft Corporation
  • expiration_date: 01.07.2020
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0475_it3480.html
  • toe_overseas_name: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
pdf_data/report_filename c0475_erpt.pdf emc-greenplum-v42-cert-eng.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 383-4-196-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0475-01: 1
    • Certification No. C0475: 1
  • CA:
    • 383-4-196-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 2
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 2
    • EAL 2+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 7
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • EWA:
    • EWA-Canada: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /CreationDate: D:20150724094408+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150724094442+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 233021
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: User
  • /CCEF: EWA-Canada
  • /CR date: 12 April 2012
  • /CR version: 1.0
  • /Certificate date: 12 April 2012
  • /Company: Microsoft
  • /CreationDate: D:20120413084524-04'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Developer name: EMC Corporation
  • /Document number: 383-4-196-CR
  • /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of EMC Corporation EMC® Greenplum® 4.2 Document No. 1716-000-D002 Version 1.3, 26 March 2012
  • /Evaluation completion date: 26 March 2012
  • /ModDate: D:20120430111256-04'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /ST Title: EMC Corporation EMC® Greenplum® 4.2 Security Target
  • /ST date: 22 March 2012
  • /ST version: 0.9
  • /SourceModified: D:20120413124455
  • /Sponsor: EMC
  • /TOE Version: 4.2.0
  • /TOE name and version: EMC® Greenplum® 4.2
  • /TOE short name: Greenplum 4.2
  • /Title: EAL 2 Evaluation of <TOE name and version>
  • pdf_file_size_bytes: 76221
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename c0475_est.pdf emc-greenplum-v42-sec-eng.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 51
  • EAL:
    • EAL 2: 1
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL2+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
  • AGD:
    • AGD_ADD: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.2: 2
    • ADV_TDS: 2
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 5
    • AGD_PRE: 3
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 3
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SEL: 8
    • FAU_SEL.1: 2
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 15
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF: 8
    • FDP_ACF.1: 6
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 16
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 12
    • FAU_GEN.1: 10
    • FAU_GEN.2: 2
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_SEL: 7
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UID.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF: 7
    • FDP_ACF.1: 6
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 19
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 14
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 15
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_STM.1: 2
    • FPT_TRC: 2
    • FPT_TRC.1: 1
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FRU:
    • FRU_FLT.1: 8
    • FRU_FLT.1.1: 1
    • FRU_RSA.1: 8
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_MCS.1: 10
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH: 1
    • FTA_TAH.1: 1
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_GUIDANCE: 1
    • O.ADMIN_ROLE: 4
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 4
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.DOCUMENTED_DESIGN: 1
    • O.INTERNAL_TOE_DOMAINS: 1
    • O.MANAGE: 6
    • O.MEDIATE: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 1
    • O.PARTIAL_SELF_PROTECTION: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMAT: 2
    • O.RESIDUAL_INFORMATION: 3
    • O.TOE_ACCESS: 7
    • O.VULNERABILITY_ANALYSIS: 1
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
  • A:
    • A.DOMAIN_SEPARATION: 2
    • A.NO_BYPASS: 2
    • A.NO_EVIL: 2
    • A.NO_GENERAL_PURPOSE: 2
    • A.PHYSICAL: 2
    • A.RESTRICT_OS_ACCESS: 2
    • A.ROBUST_ENVIRONMENT: 2
    • A.SECURE_COMMS: 2
    • A.TIME_STAMPS: 2
  • O:
    • O.ACCESS_HISTORY: 4
    • O.ADMIN_GUIDANCE: 6
    • O.ADMIN_ROLE: 4
    • O.AUDIT_GENERATION: 8
    • O.AUDIT_REVIEW: 4
    • O.AUDIT_STORAGE: 5
    • O.CONFIGURATION_IDENTIFI: 2
    • O.CONFIGURATION_IDENTIFIC: 2
    • O.DOCUMENTED_DESIGN: 6
    • O.FAIL_SECURE: 5
    • O.INTERNAL_TOE_DOMAINS: 5
    • O.MANAGE: 9
    • O.MEDIATE: 5
    • O.PARTIAL_FUNCTIONAL_TES: 4
    • O.PARTIAL_FUNCTIONAL_TEST: 2
    • O.PARTIAL_SELF_PROTECTIO: 2
    • O.PARTIAL_SELF_PROTECTION: 2
    • O.QUOTAS: 4
    • O.RESIDUAL_INFORMATION: 6
    • O.TOE_ACCESS: 11
    • O.VULNERABILITY_ANALYSIS: 8
  • OE:
    • OE.DOMAIN_SEPARATION: 3
    • OE.NO_BYPASS: 3
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.RESTRICT_OS_ACCESS: 3
    • OE.ROBUST_ENVIRONMENT: 3
    • OE.SECURE_COMMS: 4
    • OE.TIME_STAMPS: 5
    • OE.TRUST_IT: 3
  • T:
    • T.ACCIDENTAL_ADMIN_ERROR: 2
    • T.ACCOUNTABILITY: 2
    • T.AUDIT_COMPROMISE: 2
    • T.CRITICAL_FAILURE: 2
    • T.MASQUERADE: 2
    • T.POOR_DESIGN: 2
    • T.POOR_IMPLEMENTATION: 2
    • T.POOR_TEST: 2
    • T.RESIDUAL_DATA: 2
    • T.TSF_COMPROMISE: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAVAILABILITY: 2
    • T.UNIDENTIFIED_ACTIONS: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 11
    • Microsoft Corporation: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_metadata
  • /Author: Greg Milliken
  • /CreationDate: D:20120322105240-04'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20120416131946-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: EMC® Greenplum® 4.2
  • /Title: Security Target
  • pdf_file_size_bytes: 1106056
  • pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.emc.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 70
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different