name |
Argus Command Center Web Portal Stable Version 2.1 |
STARCOS 3.2 QES Version 2.0B |
category |
Other Devices and Systems |
Products for Digital Signatures |
scheme |
MY |
DE |
status |
active |
archived |
not_valid_after |
23.06.2026 |
01.09.2019 |
not_valid_before |
23.06.2021 |
04.03.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0495a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20–%20Security%20Target%20[ASE]-v1.14%202.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0495b.pdf |
manufacturer |
Certis CISCO Security Pte Ltd (Certis) |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.certisgroup.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
EAL2 |
EAL4+, AVA_MSU.3, AVA_VLA.4 |
dgst |
c86ad5ef88d4cf8b |
b59c5a88ea2e67d4 |
heuristics/cert_id |
ISCB-3-RPT-C115-CR-v1 |
BSI-DSZ-CC-0495-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_TDS.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 |
ATE_IND.2, ALC_DVS.1, AVA_VLA.4, ADV_FSP.2, ATE_FUN.1, ADV_SPM.1, ATE_COV.2, AGD_USR.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, ALC_TAT.1, ADV_HLD.2, ALC_LCD.1, AVA_MSU.3, ATE_DPT.1, AVA_SOF.1, ADV_IMP.1 |
heuristics/extracted_versions |
2.1 |
3.2, 2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0648-2010 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0456-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0648-2010 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0456-2009, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0266-2005 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0322-2005 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005 |
heuristics/protection_profiles |
{} |
40002c3611fc465f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
pdf_data/cert_filename |
ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210630131348Z
- /Creator: Word
- /ModDate: D:20210630215915+08'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 205722
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
ISCB-5-RPT-C115-CR-v1.pdf |
0495a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0495-2009
- cert_item: STARCOS 3.2 QES Version 2.0B
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-3-RPT-C115-CR-v1: 35
|
- DE:
- BSI-DSZ-CC-0322-2005: 1
- BSI-DSZ-CC-0456-2009: 4
- BSI-DSZ-CC-0495-2009: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 7
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 1
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMS.2: 1
- ALC_DEL.1: 1
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 4
- ATE_IND: 5
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 6
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 7
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 14
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 5
- FIA_SOS.1: 3
- FIA_SOS.2: 2
- FIA_UAU.1: 2
- FIA_UID.1: 7
- FMT:
- FMT_MSA.1: 7
- FMT_SMF.1: 3
- FMT_SMR.1: 3
- FTP:
- FTP_ITC.1: 17
- FTP_TRP.1: 2
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CLOUD: 1
- A.CONNECTIVITY: 1
- A.DDOS: 1
- A.MALWARE: 1
- A.THIRDPARTY: 1
- A.TIMESTAMP: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_DEV: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- AIS 20: 2
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 4
- AIS 38: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- / m1534a13 SLE66CX360PE / m1536a13 both with RSA2048 V1.4, Version 5, 2007- 11-13, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
- IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.3, 2009-01-08, Configuration List STARCOS 3.2 QES V2: 1
- Target BSI-DSZ-0495-2009, Version 1.0, 08.01.2009, STARCOS 3.2 QES V2.0B, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 4, 2009-01-20, STARCOS 3.2 QES 2.0/2.0B, Evaluation Body: 1
- confidential document) [9] Security Target BSI-DSZ-0495-2009, Version 1.0, 08.01.2009, STARCOS 3.2 QES V2.0B, Giesecke &: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20210629084408Z00'00'
- /Creator: Word
- /ModDate: D:20210629084408Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 800031
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090319111933+01'00'
- /Creator: Writer
- /Keywords: "BSI-DSZ-CC-0495-2009, Certification, Common Criteria, Giesecke & Devrient GmbH, STARCOS 3.2 QES, Version 2.0B"
- /ModDate: D:20090319112806+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria, Certification
- /Title: Certification Report BSI-DSZ-CC-0495-2009
- pdf_file_size_bytes: 395114
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf |
0495b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0322-2005: 2
- BSI-DSZ-CC-0322-2005-MA-04: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0006-2002: 1
- BSI-PP-0002-2001: 2
- BSI-PP-0006-2002: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 21
- EAL4: 7
- EAL4 augmented: 2
- EAL4+: 5
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 4
- ASE:
- ASE_CCL.1: 3
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 5
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.3: 1
- ACM_CAP.4: 2
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 5
- ADV:
- ADV_FSP.1: 10
- ADV_FSP.2: 3
- ADV_HLD.1: 2
- ADV_HLD.2: 4
- ADV_IMP.1: 6
- ADV_LLD.1: 5
- ADV_RCR.1: 5
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 10
- AGD_USR.1: 8
- ALC:
- ALC_DVS.1: 4
- ALC_LCD.1: 2
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 5
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 9
- AVA_SOF: 1
- AVA_SOF.1: 3
- AVA_VLA.4: 10
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_SOS.2: 5
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 10
- FCS_CKM.1.1: 3
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 14
- FCS_COP: 12
- FCS_COP.1: 9
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF: 26
- FDP_ACF.1: 17
- FDP_ETC: 5
- FDP_ETC.1: 3
- FDP_ITC: 7
- FDP_ITC.1: 7
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FDP_SDI: 10
- FDP_SDI.2: 6
- FDP_UIT: 18
- FDP_UIT.1: 11
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 3
- FMT_MSA: 9
- FMT_MSA.1: 8
- FMT_MSA.2: 10
- FMT_MSA.2.1: 3
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 3
- FMT_SMF.1: 10
- FMT_SMF.1.1: 3
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 2
- FPT_PHP: 1
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 2
- FPT_RVM: 1
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 9
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TRP: 1
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 19
- FTP_ITC.1: 16
- FTP_TRP: 9
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CLOUD: 3
- A.CONNECTIVITY: 4
- A.DDOS: 3
- A.MALWARE: 4
- A.THIRDPARTY: 3
- A.TIMESTAMP: 4
- A.TRUSTED_ADMIN: 4
- A.TRUSTED_DEV: 3
- O:
- O.SEC_ACCESS: 5
- O.SEC_AUTHENTICATE: 5
- O.SEC_COMMUNICATION: 5
- O.SEC_PASSWORD_GENER: 1
- O.SEC_PASSWORD_GENERATION: 3
- OE:
- OE.ADMINISTRATOR: 3
- OE.ANTI_DDOS: 3
- OE.ANTI_MALWARE: 3
- OE.DEVELOPER: 3
- OE.SAFE_CLOUD: 3
- OE.SAFE_CONNECTIVITY: 3
- OE.SYN_TIMESTAMP: 3
- OE.THIRDPARTY: 3
- T:
- T.BROKEN_AUTH: 4
- T.INTERCEPTION: 4
- T.UNAUTHORIZED_AC: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.WEAK_PASSWORD_: 1
- T.WEAK_PASSWORD_GENE: 1
- T.WEAK_PASSWORD_GENERATION: 1
|
|
pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 8
- Giesecke & Devrient: 7
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- RIPEMD-160: 2
- RIPEMD160: 1
- SHA:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 9
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS 32: 1
- AIS20: 1
- AIS31: 1
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 9796-1: 1
- ISO/IEC 9796-2: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope: 1
- environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and: 1
- infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s: 1
- inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the: 1
- out of scope: 5
- together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting: 1
|
|
pdf_data/st_metadata |
- /Author: CLAIREHYC
- /CreationDate: D:20210701124256+08'00'
- /Creator: PDFCreator Free 4.2.0
- /Keywords:
- /ModDate: D:20210701124256+08'00'
- /Producer: GPL Ghostscript 9.52
- /Subject:
- /Title: 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
- pdf_file_size_bytes: 1022047
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
- /Author: Giesecke & Devrient
- /Company: Giesecke & Devrient
- /CreationDate: D:20090108190334+01'00'
- /Creator: Acrobat PDFMaker 7.0 für Word
- /Keywords: Version 1.0/Status 08.01.2009
- /ModDate: D:20090108190834+01'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Subject: STARCOS 3.2 QES V2.0B
- /Title: Security Target
- pdf_file_size_bytes: 332386
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 72
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |