Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1
CCEVS-VR-VID-11417-2024
Mobiles eHealth Kartenterminal ORGA 930 M online, 4.9.0: 1.0.0
BSI-DSZ-CC-0596-V3-2023
name Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1 Mobiles eHealth Kartenterminal ORGA 930 M online, 4.9.0: 1.0.0
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme US DE
not_valid_after 20.05.2026 17.01.2028
not_valid_before 20.05.2024 18.01.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0596V3c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0596V3a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0596V3b_pdf.pdf
manufacturer Trellix Worldlline Healthcare GmbH
manufacturer_web https://www.trellix.com https://de.worldline.com
security_level {} EAL3+, ADV_FSP.4, ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, ADV_TDS.3
dgst cf362acffcd3daeb a91d0202506bb11c
heuristics/cert_id CCEVS-VR-VID-11417-2024 BSI-DSZ-CC-0596-V3-2023
heuristics/cert_lab US BSI
heuristics/extracted_sars ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 ALC_LCD.1, ADV_TDS.3, ALC_CMS.3, ALC_TAT.1, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMC.3, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1
heuristics/extracted_versions 11.1 4.9.0, 1.0.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0596-V2-2018, BSI-DSZ-CC-0950-V2-2018
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0596-V2-2018, BSI-DSZ-CC-0950-V2-2018, BSI-DSZ-CC-0928-2018, BSI-DSZ-CC-0950-2017
heuristics/scheme_data
  • category: eHealth
  • cert_id: BSI-DSZ-CC-0596-V3-2023
  • certification_date: 18.01.2023
  • enhanced:
    • applicant: Worldline Healthcare GmbH Konrad-Zuse-Ring 1 24220 Flintbek
    • assurance_level: EAL3+,AVA_VAN.5,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0596V3c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 18.01.2023
    • description: TOEs are the mobile card terminal “ORGA 930 M” and the most widely identical “Cherry ST-1530” in Version 4.7.0:1.0.0 with integrated smart card readers. The TOE fulfills the requirements to be used with the German electronic Health Card (eHC) and the German Professional Card (HPC) based on the regulations of the German healthcare system.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0596-V3-2023-MA-02 (Ausstellungsdatum / Certification Date 02.01.2025)', 'description': 'The changes are firmware adaptions regarding gematik specifications, adaption of BCD-display and the clicktone. Further the advance warning time regarding the expiration of the HBA/SMC-B certificates is extended.'}), frozendict({'id': 'BSI-DSZ-CC-0596-V3-2023-MA-01 (Ausstellungsdatum / Certification Date 02.01.2024)', 'description': ', an improvement of power consumption management and a truststore update of the productive environment.'}), frozendict({'id': 'BSI-DSZ-CC-0596-V3-2023 (Ausstellungsdatum / Certification Date 18.01.2023, gültig bis / valid until 17.01.2028)', 'description': 'as product optimizing and Updates of the Open Source components. The Secure Delivery Chain was improved, as it is now independent from the forwarder with new security measures.'}), frozendict({'id': 'BSI-DSZ-CC-0596-V2-2018-MA-3 (23.11.2020)', 'description': 'TOEs are the mobile card terminal “ORGA 930 M” and the most widely identical “Cherry ST-1530” in Version 4.7.0:1.0.0 with integrated smart card readers. The TOE fulfills the requirements to be used with the German electronic Health Card (eHC) and the German Professional Card (HPC) based on the regulations of the German healthcare System.'}), frozendict({'id': 'BSI-DSZ-CC-0596-V2-MA-02 (19.12.2018)', 'description': 'The certified product itself did not change compared to 0596-V2-2018.'}), frozendict({'id': 'BSI-DSZ-CC-0596-V2-2018 (Ausstellungsdatum / Certification Date 25.09.2010, gültig bis / valid until 24.09.2018)', 'description': 'Certificate'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 17.01.2028
    • product: Mobiles eHealth Kartenterminal ORGA 930 M online, 4.9.0: 1.0.0
    • protection_profile: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0596V3a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0596V3b_pdf.pdf?__blob=publicationFile&v=2
  • product: Mobiles eHealth Kartenterminal ORGA 930 M online, 4.9.0: 1.0.0
  • subcategory: Card reader
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0596V2_0596V3.html
  • vendor: Worldline Healthcare GmbH
heuristics/protection_profiles 89f2a255423f4a20, 6448a1802bb874d8 854be21fba7a106c
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf
pdf_data/cert_filename st_vid11417-ci.pdf 0596V3c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11417-2024: 1
  • DE:
    • BSI-DSZ-CC-0596-V3-2023: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0052-2015: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20240528122641-04'00'
  • /ModDate: D:20240528122641-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 187669
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Site Certification, Theben"
  • /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Site Certification, Theben
  • /Title: Certificate BSI-DSZ-CC-0596-V3-2023
  • pdf_file_size_bytes: 327524
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11417-vr.pdf 0596V3a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID11417-2024
    • cert_item: for the Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by AVA_VAN.5, ALC_TAT.1, ADV_TDS.3, ADV_IMP.1, ADV_FSP.4
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0596-V3-2023
    • cert_item: Mobiles eHealth Kartenterminal ORGA 930 M online 4.9.0: 1.0.0
    • cert_lab: BSI
    • developer: Worldline Healthcare GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 24 September 2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11417-2024: 1
  • DE:
    • BSI-DSZ-CC-0596-V2-: 1
    • BSI-DSZ-CC-0596-V2-2018: 1
    • BSI-DSZ-CC-0596-V3-2023: 14
    • BSI-DSZ-CC-0928: 1
    • BSI-DSZ-CC-0950-V2-2018: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0052-2015: 1
    • BSI-CC-PP-0052-2015: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL 4: 4
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_DEL: 1
    • ALC_FLR: 3
    • ALC_TAT.1: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_ITT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.COMPONENTS_RUNNING: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 5
  • Intertek:
    • Intertek: 2
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-: 1
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 2
      • AES-256: 1
    • HPC:
      • HPC: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 8
  • RSA:
    • RSA-4096: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 4
      • SHA-384: 6
      • SHA-512: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-512: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 11
  • TLS:
    • TLS:
      • TLS: 6
      • TLSv1.2: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 12
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 8
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS186-4: 15
  • X509:
    • X.509: 1
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 23: 1
    • AIS 34: 1
    • AIS 41: 1
    • AIS 45: 1
    • AIS 46: 1
  • FIPS:
    • FIPS197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC3174: 1
    • RFC6234: 2
  • X509:
    • X.509: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • use of a default self-signed certificate for trust establishment with the sensor, such a channel is out of scope for this evaluation. The sensor- Manager channel must be established using CA-signed certificates: 1
  • ConfidentialDocument:
    • GmbH [7] Evaluation Technical Report Summary, Version 2, 2023-01-06, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • from Evaluation of the Product ORGA v 6141 online and ORGA 930 online, Worldline Healthcare GmbH (confidential document) [10] Bedienungsanleitung Mobiles eHealth Kartenterminal ORGA 930 M online mit Firmware-Version 4.9: 1
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20240528114708-04'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240528114708-04'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 486358
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename st_vid11417-st.pdf 0596V3b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0596-V3-2022: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0052: 1
    • BSI-CC-PP-0032: 1
    • BSI-CC-PP-0052: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 3 augmented: 3
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.3: 5
  • AGD:
    • AGD_IAN: 2
    • AGD_KAL: 2
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXT.1: 4
    • FAU_GEN_EXT.1.1: 1
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
    • FAU_STG_EXT.4: 5
    • FAU_STG_EXT.4.1: 1
    • FAU_STG_EXT.5: 5
    • FAU_STG_EXT.5.1: 1
  • FCO:
    • FCO_CPC_EXT.1: 6
    • FCO_CPC_EXT.1.1: 1
    • FCO_CPC_EXT.1.2: 1
    • FCO_CPC_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_COP: 22
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 5
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 2
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHC_EXT.1.9: 1
    • FCS_SSHS_EXT.1: 6
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 6
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSS_EXT.1: 6
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 1
    • FCS_TLSS_EXT.2: 6
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 2
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 5
    • FMT_MOF.1: 1
    • FMT_MTD: 5
    • FMT_MTD.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 6
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_APW_EXT.1: 1
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 6
    • FTP_TRP.1: 3
  • FCS:
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 24
    • FCS_CKM.4.1: 1
    • FCS_COP: 37
    • FCS_COP.1: 8
  • FDP:
    • FDP_ACC.1: 24
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC: 48
    • FDP_IFC.1: 13
    • FDP_IFF: 45
    • FDP_IFF.1: 26
    • FDP_ITC.1: 24
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 11
    • FDP_RIP: 12
    • FDP_RIP.1: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SVR: 2
    • FDP_SVR.1: 11
    • FDP_SVR.1.1: 5
    • FDP_SVR.1.2: 3
    • FDP_SVR.1.3: 3
  • FIA:
    • FIA_AFL: 15
    • FIA_AFL.1: 4
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 6
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 2
    • FTA_SSL.4: 8
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.COMPONENTS_RUNNING: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.COMPONENTS_RUNNING: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.ADMIN: 3
    • A.CARDS: 4
    • A.DEVELOPER: 2
    • A.DMS: 4
    • A.ENVIRONME: 1
    • A.ENVIRONMENT: 2
    • A.MEDIC: 3
    • A.PHYSICAL: 2
  • O:
    • O.AUTH_STATE: 9
    • O.DMS_CONNECT: 1
    • O.DMS_CONNECTION: 5
    • O.LOG_CARDS: 3
    • O.LOG_DATA: 7
    • O.MANAGEMENT: 10
    • O.PIN: 7
    • O.PROTECTION: 8
    • O.RESIDUAL: 6
    • O.SEALING: 3
    • O.SELFTESTS: 6
    • O.TIME: 6
    • O.TRANSFER: 3
  • OE:
    • OE.ADMIN: 9
    • OE.CARDS: 7
    • OE.DEVELOPER: 2
    • OE.DMS: 5
    • OE.ENVIRONMENT: 6
    • OE.MEDIC: 9
    • OE.PHYSICAL: 6
  • OSP:
    • OSP.DMS_CONN: 1
    • OSP.DMS_CONNE: 1
    • OSP.DMS_CONNECTION: 1
    • OSP.EMERGENCY: 1
    • OSP.EMERGENCY_: 1
    • OSP.EMERGENCY_DATA: 1
    • OSP.LOG_CARDS: 3
    • OSP.LOG_DATA: 4
    • OSP.SEALING: 3
    • OSP.SELFTESTS: 3
    • OSP.TIME: 3
    • OSP.TRANSFER: 3
  • T:
    • T.ACCESS: 3
    • T.ADMIN_PIN: 3
    • T.AUTH_STATE: 3
    • T.DATA: 3
    • T.FIRMWARE: 3
    • T.MAN_HW: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-256: 3
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 5
      • HMAC-SHA-384: 5
      • HMAC-SHA-512: 5
  • AES_competition:
    • AES:
      • AES: 10
      • AES-: 1
      • AES-256: 1
    • HPC:
      • HPC: 21
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 3
      • ECDHE: 10
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • Diffie-Hellman: 8
  • RSA:
    • RSA 2048: 7
  • RSA:
    • RSA-4096: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 6
      • SHA-384: 4
      • SHA-512: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-512: 6
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 97
  • TLS:
    • DTLS:
      • DTLS: 4
    • SSL:
      • SSL: 2
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 87
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
      • TLS1.1: 1
      • TLS1.2: 1
      • TLSv1.2: 5
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 22
  • RNG:
    • RBG: 3
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 15
  • GCM:
    • GCM: 5
  • GCM:
    • GCM: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 44
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 7
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 7
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 26
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 7500: 1
    • BSI 7586: 1
    • BSI TR-03116-1: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 186-4: 5
    • FIPS186-4: 15
  • ISO:
    • ISO/IEC 10118-: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 9796-2: 1
  • NIST:
    • SP 800-56A: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2460: 1
    • RFC 2463: 1
    • RFC 2818: 3
    • RFC 2986: 1
    • RFC 3986: 1
    • RFC 4253: 2
    • RFC 5077: 1
    • RFC 5246: 3
    • RFC 5280: 3
    • RFC 6125: 2
    • RFC 6960: 1
    • RFC 768: 1
    • RFC 791: 1
    • RFC 792: 1
    • RFC 793: 1
  • X509:
    • X.509: 13
  • RFC:
    • RFC8017: 2
  • X509:
    • X.509: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • use of a default self-signed certificate for trust establishment with the sensor, such a channel is out of scope for this evaluation. The sensor-Manager channel must be established using CA-signed certificates. 1: 1
  • OutOfScope:
    • done by an authorised card that is out of scope of this ST: 1
    • out of scope: 1
    • the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
pdf_data/st_metadata
  • /Author: Jenn Lobb
  • /CreationDate: D:20240528114459-04'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240528114459-04'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 1144300
  • pdf_hyperlinks: mailto:[email protected], https://docs.trellix.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
  • /Author: gematik GmbH
  • /Title: ORGA 900 Security Target
  • pdf_file_size_bytes: 955165
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different