Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1
CCEVS-VR-VID-11417-2024
Infineon Technologies AG Smartcard IC IFX_CCI_000011h, 00001Bh, 00001Eh,000025h, design step G12 with optional libraries and with specific dedicated software
BSI-DSZ-CC-1025-V6-2024
name Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1 Infineon Technologies AG Smartcard IC IFX_CCI_000011h, 00001Bh, 00001Eh,000025h, design step G12 with optional libraries and with specific dedicated software
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 20.05.2026 12.07.2028
not_valid_before 20.05.2024 28.10.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V6c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V6a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11417-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V6b_pdf.pdf
manufacturer Trellix Infineon Technologies AG
manufacturer_web https://www.trellix.com https://www.infineon.com/
security_level {} ALC_FLR.1, EAL6+
dgst cf362acffcd3daeb be4efea6540a7aa0
heuristics/cert_id CCEVS-VR-VID-11417-2024 BSI-DSZ-CC-1025-V6-2024
heuristics/cert_lab US BSI
heuristics/extracted_sars ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_SPD.1, ASE_OBJ.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 ADV_IMP.2, AVA_VAN.5, ADV_ARC.1, ADV_FSP.5, ALC_CMC.5, ASE_TSS.1, ADV_TDS.5, AGD_OPE.1, ATE_DPT.3, ATE_COV.3, ASE_REQ.2, ADV_SPM.1, ATE_FUN.2, ADV_CMC.5, ALC_DVS.2, AGD_PRE.1, ATE_IND.2, ASE_CCL.1, ASE_ECD.1, ADV_INT.3, ALC_DEL.1, ASE_OBJ.2, ALC_FLR.1, ASE_INT.1, ASE_SPD.1, ALC_TAT.3, ALC_CMS.5, ALC_LCD.1
heuristics/extracted_versions 11.1 -
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1025-V5-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1025-V3-2020, BSI-DSZ-CC-1025-V2-2019, BSI-DSZ-CC-1025-V4-2021, BSI-DSZ-CC-1025-2018, BSI-DSZ-CC-1025-V5-2023
heuristics/protection_profiles 89f2a255423f4a20, 6448a1802bb874d8 cf0f01bcd7be3e9c
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename st_vid11417-ci.pdf 1025V6c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11417-2024: 1
  • DE:
    • BSI-DSZ-CC-1025-V6-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 5: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20240528122641-04'00'
  • /ModDate: D:20240528122641-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 187669
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Subject: Infineon Technologies AG Smartcard IC IFX_CCI_000011h, 00001Bh, 00001Eh,000025h, design step G12 with optional libraries and with specific dedicated software
  • /Title: Certification Report BSI-DSZ-CC-1025-V6-2024
  • pdf_file_size_bytes: 234957
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11417-vr.pdf 1025V6a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID11417-2024
    • cert_item: for the Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 12 July 2028
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1025-V6-2024
    • cert_item: Infineon Technologies AG Smartcard IC IFX_CCI_000011h, 00001Bh, 00001Eh,000025h, design step G12 with optional libraries and with specific dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11417-2024: 1
  • DE:
    • BSI-DSZ-CC-1025-V5-2023: 2
    • BSI-DSZ-CC-1025-V6-2024: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 1
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 5
    • EAL 6 augmented: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_ITT.1: 1
  • FCS:
    • FCS_RNG: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.COMPONENTS_RUNNING: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 1
    • Infineon Technologies AG: 30
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 5
  • Intertek:
    • Intertek: 2
  • TUV:
    • TÜV Informationstechnik: 6
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-: 1
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 3
      • Triple-DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 8
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 4
      • SHA-384: 6
      • SHA-512: 3
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 11
  • TLS:
    • TLS:
      • TLS: 6
      • TLSv1.2: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 3
  • CTR:
    • CTR: 4
  • ECB:
    • ECB: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 12
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 8
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS186-4: 15
  • X509:
    • X.509: 1
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
    • AIS31: 2
  • FIPS:
    • FIPS PUB 186-4: 1
    • FIPS186-4: 4
    • FIPS197: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 8: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS1: 2
  • RFC:
    • RFC 5639: 1
    • RFC563: 1
    • RFC5639: 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • use of a default self-signed certificate for trust establishment with the sensor, such a channel is out of scope for this evaluation. The sensor- Manager channel must be established using CA-signed certificates: 1
  • ConfidentialDocument:
    • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 1, 2024-10-02, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
    • IFX_CCI_00001Bh, IFX_CCI_00001Eh, IFX_CCI_000025h” G12,, TÜV Informationstechnik GmbH (confidential document) and Addendum to ETR for composite to ETR for composite [10], Version 1, 2024-10-02, EVALUATION: 1
    • REPORT FOR COMPOSITE EVALUATION ADDENDUM (ETR COMP_ADD), TÜV Informationstechnik GmbH (confidential document) 9 specifically see Chapter 9.1. 29 / 34 Certification Report BSI-DSZ-CC-1025-V6-2024 [11] 32-bit: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • 8.1.3.1] |K| = 19768 – 4096 (note: TOE supports larger and smaller key sizes, which are generally out of scope of evaluation in BSI scheme) Yes (only for ACL v3.03.003) 16 Key generation RSA key Generation: 1
    • note: TOE supports larger and smaller key sizes, which are generally out of scope of evaluation in BSI scheme: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20240528114708-04'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240528114708-04'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 486358
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename st_vid11417-st.pdf 1025V6b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL6: 140
    • EAL6 augmented: 137
    • EAL6+: 137
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 6
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 3
    • ALC_CMC.5: 2
    • ALC_CMS: 2
    • ALC_CMS.4: 2
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.1: 2
    • ALC_DVS.2: 4
    • ALC_FLR.1: 11
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 10
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 20
    • ASE_INT.1: 1
    • ASE_OBJ: 9
    • ASE_OBJ.2: 1
    • ASE_REQ: 51
    • ASE_REQ.2: 1
    • ASE_SPD: 8
    • ASE_SPD.1: 1
    • ASE_TSS: 17
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXT.1: 4
    • FAU_GEN_EXT.1.1: 1
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
    • FAU_STG_EXT.4: 5
    • FAU_STG_EXT.4.1: 1
    • FAU_STG_EXT.5: 5
    • FAU_STG_EXT.5.1: 1
  • FCO:
    • FCO_CPC_EXT.1: 6
    • FCO_CPC_EXT.1.1: 1
    • FCO_CPC_EXT.1.2: 1
    • FCO_CPC_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_COP: 22
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 5
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 2
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHC_EXT.1.9: 1
    • FCS_SSHS_EXT.1: 6
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 6
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSS_EXT.1: 6
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 1
    • FCS_TLSS_EXT.2: 6
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 2
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 5
    • FMT_MOF.1: 1
    • FMT_MTD: 5
    • FMT_MTD.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 6
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_APW_EXT.1: 1
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 6
    • FTP_TRP.1: 3
  • FAU:
    • FAU_SAS: 3
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 130
    • FCS_CKM.1: 42
    • FCS_CKM.2: 6
    • FCS_CKM.4: 35
    • FCS_COP: 233
    • FCS_COP.1: 33
    • FCS_RNG: 47
    • FCS_RNG.1: 16
  • FDP:
    • FDP_ACC: 17
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 1
    • FDP_ACF: 17
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_AFC: 1
    • FDP_IFC.1: 16
    • FDP_ITC.1: 30
    • FDP_ITC.2: 30
    • FDP_ITT.1: 14
    • FDP_PHP.3: 1
    • FDP_SDC: 2
    • FDP_SDC.1: 12
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 13
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 16
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 16
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 3
    • FIA_API.1: 13
    • FIA_API.1.1: 1
    • FIA_SOS.2: 2
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
  • FMT:
    • FMT_ACF: 1
    • FMT_LIM: 29
    • FMT_LIM.1: 12
    • FMT_LIM.2: 11
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 20
    • FPT_ITC.1: 2
    • FPT_ITT.1: 15
    • FPT_PHP.3: 17
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2: 31
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 9
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.COMPONENTS_RUNNING: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.COMPONENTS_RUNNING: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • O:
    • O.AES: 4
    • O.RND: 4
    • O.TDES: 4
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 16
    • Infineon Technologies: 20
    • Infineon Technologies AG: 33
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-256: 3
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 5
      • HMAC-SHA-384: 5
      • HMAC-SHA-512: 5
  • AES_competition:
    • AES:
      • AES: 54
      • AES-128: 3
  • DES:
    • 3DES:
      • TDEA: 3
      • TDES: 35
      • Triple-DES: 4
      • TripleDES: 2
    • DES:
      • DES: 23
  • constructions:
    • MAC:
      • CBC-MAC: 8
      • CMAC: 13
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 3
      • ECDHE: 10
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • Diffie-Hellman: 8
  • RSA:
    • RSA 2048: 7
  • ECC:
    • ECC:
      • ECC: 17
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 6
    • RSA4096: 6
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 6
      • SHA-384: 4
      • SHA-512: 5
  • MD:
    • MD5:
      • MD5: 25
  • SHA:
    • SHA1:
      • SHA1: 25
    • SHA2:
      • SHA256: 6
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 7
  • KA:
    • Key Agreement: 2
    • Key agreement: 2
  • MAC:
    • MAC: 11
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 97
  • TLS:
    • DTLS:
      • DTLS: 4
    • SSL:
      • SSL: 2
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 87
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
      • TLS1.1: 1
      • TLS1.2: 1
      • TLSv1.2: 5
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 22
  • RNG:
    • RBG: 3
    • RNG: 4
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 5
    • RNG: 25
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 15
  • GCM:
    • GCM: 5
  • CBC:
    • CBC: 14
  • CFB:
    • CFB: 6
  • CTR:
    • CTR: 8
  • ECB:
    • ECB: 16
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 44
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 7
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 7
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 26
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 7
    • Malfunction: 12
    • fault injection: 2
    • malfunction: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 12
    • Physical Probing: 2
    • SPA: 6
    • Side-channel: 1
    • Timing Attack: 1
    • physical probing: 1
    • side channel: 11
    • side-channel: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 186-4: 5
    • FIPS186-4: 15
  • ISO:
    • ISO/IEC 10118-: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 9796-2: 1
  • NIST:
    • SP 800-56A: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2460: 1
    • RFC 2463: 1
    • RFC 2818: 3
    • RFC 2986: 1
    • RFC 3986: 1
    • RFC 4253: 2
    • RFC 5077: 1
    • RFC 5246: 3
    • RFC 5280: 3
    • RFC 6125: 2
    • RFC 6960: 1
    • RFC 768: 1
    • RFC 791: 1
    • RFC 792: 1
    • RFC 793: 1
  • X509:
    • X.509: 13
  • BSI:
    • AIS20: 1
    • AIS31: 13
    • AIS32: 8
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 197: 4
    • FIPS PUB 140-2: 1
  • ISO:
    • ISO/IEC 11770-3: 1
    • ISO/IEC 14443-4: 3
    • ISO/IEC 14888-3: 6
    • ISO/IEC 15946-1: 1
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 2
    • ISO/IEC 9798-2: 1
  • NIST:
    • SP 800-108: 1
    • SP 800-38A: 11
    • SP 800-38B: 3
    • SP 800-67: 6
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 8
  • RFC:
    • RFC 5639: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • use of a default self-signed certificate for trust establishment with the sensor, such a channel is out of scope for this evaluation. The sensor-Manager channel must be established using CA-signed certificates. 1: 1
  • OutOfScope:
    • SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. End of note: 1
    • certification. The user operating system and further applications implemented on the TOE are also out of scope of this certification. To summarize, if used with the PCD software the certification view equals to: 1
    • is enabled to communicate via the selected interfaces. The surrounding environment is in both cases out of scope. Public 30 Revision 1.14 2024-10-01 Target of Evaluation Description Public Security Target Common: 1
    • out of scope: 3
pdf_data/st_metadata
  • /Author: Jenn Lobb
  • /CreationDate: D:20240528114459-04'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240528114459-04'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 1144300
  • pdf_hyperlinks: https://docs.trellix.com/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different