| name |
Tenix Interactive Link Data Diode Device, Gigabit Variant, Version 3.0 |
Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02 |
| category |
Other Devices and Systems |
Access Control Devices and Systems |
| scheme |
US |
JP |
| status |
archived |
archived |
| not_valid_after |
06.09.2012 |
13.02.2022 |
| not_valid_before |
16.11.2006 |
13.02.2017 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_eimg.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid9513-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid9513-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf |
| manufacturer |
BAE SYSTEMS DATAGATE (formerly Tenix Datagate) |
Hitachi, Ltd. |
| manufacturer_web |
https://www.baesystems.com |
https://www.hitachi.com/ |
| security_level |
EAL7+ |
EAL2+, ALC_FLR.1 |
| dgst |
c5ff92ac473da244 |
bd28ac0feda9039e |
| heuristics/cert_id |
CCEVS-VR-0051-2006 |
JISEC-CC-CRP-C0536 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ATE_DPT.3, ADV_RCR.3, ALC_LCD.3, ATE_FUN.2, ATE_IND.3, AGD_USR.1, AVA_CCA.3, ALC_TAT.3, ADV_LLD.2, ALC_DVS.2, AVA_VLA.4, ATE_COV.3, AVA_MSU.3, ADV_INT.3, ADV_SPM.3, AGD_ADM.1, AVA_SOF.1, ADV_HLD.5, ADV_IMP.3, ADV_FSP.4 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
3.0 |
8.0.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
CCEVS-VR-0119-2005 |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
CCEVS-VR-0119-2005 |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/9513/
- categories: ['Multiple Domain Solution']
- category: Multiple Domain Solution
- certification_date: 16.11.2006
- evaluation_facility: COACT, Inc. Labs
- expiration_date:
- id: CCEVS-VR-VID9513
- product: Tenix Interactive Link Data Diode Device, Gigabit Variant (P/N FID003)
- scheme: US
- url: https://www.niap-ccevs.org/products/9513
- vendor: BAE Systems Information and Electronic Systems, Inc.
|
- cert_id: JISEC-CC-CRP-C0536
- certification_date: 01.02.2017
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0536_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE security functionality The TOE provides the following security functionality: - Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software
- product_type: Access Control Device and Systems
- report_link: https://www.ipa.go.jp/en/security/c0536_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0536_est.pdf
- toe_version: 8.0.1-02
- vendor: Hitachi, Ltd.
- expiration_date: 01.03.2022
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html
- toe_overseas_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
c0536_eimg.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20170911161211+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /ModDate: D:20170911161350+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title:
- pdf_file_size_bytes: 453124
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
st_vid9513-vr.pdf |
c0536_erpt.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-06-0051
- cert_item: Tenix Datagate Inc Interactive Link Data Diode Device, Gigabit Variant Version 3.0 (P/N FID003
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-05-0119: 2
- CCEVS-VR-06-0051: 1
|
- JP:
- CRP-C0536-01: 1
- Certification No. C0536: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
| pdf_data/report_keywords/cc_sar |
- ACM:
- ADO:
- ATE:
- ATE_FUN: 1
- ATE_IND: 1
- ATE_IND.3: 1
- AVA:
- AVA_CCA.3: 1
- AVA_MSU.2: 1
- AVA_VLA: 1
- AVA_VLA.2: 1
- AVA_VLA.3: 1
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.EMISSION: 1
- A.INSTALLATION: 1
- A.NETWORK: 1
- A.NO_EVIL: 1
- A.PERSONNEL: 1
- A.PHYSICAL: 1
- A.TRAINING: 1
- T:
- T.FAILURE: 1
- T.LOGIC: 1
- T.TAMPER: 1
- T.TRANSFER: 1
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 2
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- T:
- T.ILLEGAL_ACCESS: 1
- T.UNAUTHORISED_ACCESS: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Validation Team
- /Company: MITRE and NSA
- /CreationDate: D:20061128153410-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20061128153454-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20061128171400
- /Title: Validation Report for Marconi
- pdf_file_size_bytes: 190901
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /CreationDate: D:20171211090255+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171211090339+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 207872
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
| pdf_data/st_filename |
st_vid9513-st.pdf |
c0536_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 7: 4
- EAL 7 augmented: 1
- EAL7: 2
|
- EAL:
- EAL2: 8
- EAL2 augmented: 3
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.2: 2
- ACM_CAP.3: 3
- ACM_CAP.5: 1
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.3: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 8
- ADV_FSP.2: 1
- ADV_FSP.4: 3
- ADV_HLD.1: 1
- ADV_HLD.2: 2
- ADV_HLD.3: 1
- ADV_HLD.5: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 3
- ADV_IMP.3: 1
- ADV_INT.1: 1
- ADV_INT.3: 2
- ADV_LLD.1: 4
- ADV_LLD.2: 1
- ADV_RCR.1: 2
- ADV_RCR.2: 1
- ADV_RCR.3: 2
- ADV_SPM.1: 4
- ADV_SPM.3: 3
- AGD:
- AGD_ADM.1: 11
- AGD_USR.1: 10
- ALC:
- ALC_DVS.2: 3
- ALC_LCD.3: 2
- ALC_TAT.1: 1
- ALC_TAT.3: 2
- ATE:
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 3
- ATE_FUN.2: 2
- ATE_IND.3: 2
- AVA:
- AVA_CCA.3: 11
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.4: 2
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_IFC: 3
- FDP_IFC.1: 6
- FDP_IFC.2: 16
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF: 3
- FDP_IFF.1: 22
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.5: 1
- FDP_IFF.5: 14
- FMT:
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 15
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.3: 10
- FPT_SEP.3.1: 1
- FPT_SEP.3.2: 1
- FPT_SEP.3.3: 1
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.EMISSION: 4
- A.INSTALLATION: 2
- A.NETWORK: 2
- A.NO_EVIL: 3
- A.PERSONNEL: 4
- A.PHYSICAL: 3
- A.TRAINING: 3
- O:
- O.CONFIDENTIAITY: 1
- O.CONFIDENTIALITY: 13
- O.FAILSECURE: 10
- O.INVOKE: 10
- O.ROM: 9
- O.TAMPER_SEAL: 1
- O.TAMPER_SEALS: 9
- OE:
- OE.EMISSION: 4
- OE.INSTALLATION: 6
- OE.NETWORK: 3
- OE.NO_EVIL: 10
- OE.PERSONNEL: 9
- OE.PHYSICAL: 11
- OE.TRAINING: 7
- T:
- T.FAILURE: 5
- T.LOGIC: 3
- T.TAMPER: 6
- T.TRANFER: 1
- T.TRANSFER: 4
|
- A:
- A.ADMINISTRATORS: 4
- A.CLIENTS: 3
- A.NETWORKS: 3
- A.PASSWORD: 4
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
| pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 4
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Chris Walsh
- /Comments: Issue No. 5.1
- /Company: Tenix Datagate Inc.
- /CreationDate: D:20050901021753+09'30'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Keywords: Doc. No. 9162P01000001
- /ModDate: D:20061128100602-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20050831164405
- /Subject: Interactive Link Data Diode Device
- /Title: Security Target
- pdf_file_size_bytes: 225489
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /CreationDate: D:20171130192201+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20171130192201+09'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 1103262
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |