Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185
CCEVS-VR-VID-10986-2019
Canonical Ubuntu Server 18.04.4
CSEC2019029
name Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185 Canonical Ubuntu Server 18.04.4
category Other Devices and Systems Operating Systems
scheme US SE
status archived active
not_valid_after 01.08.2021 11.12.2025
not_valid_before 01.08.2019 11.12.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10986-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20-%20Ubuntu.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10986-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Canonical%20Ubuntu%20Server%2018.04%20LTS.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10986-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20-%20Canonical%20Ubuntu%20Server%2018.04%20LTS.pdf
manufacturer Vertiv Canonical Group Limited
manufacturer_web https://www.vertivco.com https://www.canonical.com/
security_level {} EAL2, ALC_FLR.3
dgst d04ddd65f0e963a5 17862668d38c8dbe
heuristics/cert_id CCEVS-VR-VID-10986-2019 CSEC2019029
heuristics/cert_lab US []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 18.04.4
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2019
  • evaluation_facility: DXC.technology
  • expiration_date: 01.08.2021
  • id: CCEVS-VR-VID10986
  • product: Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10986
  • vendor: Vertiv IT Systems
heuristics/protection_profiles da2e45c9b3fbb700 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf {}
pdf_data/cert_filename st_vid10986-ci.pdf CCRA - Ubuntu.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10986-2019: 1
  • SE:
    • CSEC2019029: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/eval_facility
  • atsec:
    • atsec: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 17065: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190815111447-04'00'
  • /ModDate: D:20190815111447-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180723
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20201216100731+01'00'
  • /Creator: RICOH MP C4504ex
  • /ModDate: D:20201216100731+01'00'
  • /Producer: RICOH MP C4504ex
  • pdf_file_size_bytes: 908771
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10986-vr.pdf Certification Report - Canonical Ubuntu Server 18.04 LTS.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10986-2019
    • cert_item: Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180, SCKM185
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10986-2019: 1
  • SE:
    • CSEC2019029: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.3: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFF.1: 2
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 2
  • FMT:
    • FMT_MOF.1.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRI: 1
    • O.ANTI_TAMPERING_BACKUP_POWER: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTLY_D: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATION: 1
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_ENDPOINT: 1
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 1
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_CONTR: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.AUTHUSER: 1
    • A.CONNECT: 1
    • A.DETECT: 1
    • A.IT: 1
    • A.KEYS: 1
    • A.MANAGE: 1
    • A.PEER: 2
    • A.PHYSICAL: 1
    • A.TRAINEDUSER: 1
  • T:
    • T.ACCESS: 6
    • T.COMM: 1
    • T.IA: 2
    • T.INFOFLOW: 1
    • T.RESTRICT: 1
pdf_data/report_keywords/eval_facility
  • DXC:
    • DXC Technology: 5
  • atsec:
    • atsec: 4
pdf_data/report_keywords/hash_function
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
    • SSHv2: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2018-20623: 1
    • CVE-2019-1549: 1
    • CVE-2020-10942: 1
    • CVE-2020-24977: 1
    • CVE-2020-8648: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • RFC:
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 4213: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • revealed some residual vulnerabilities. Re- sidual vulnerabilities are vulnerabilities that are out of scope because they require a higher attack potential than the actual EAL is designed to protect from. The: 1
pdf_data/report_metadata
  • /Author: Jerry Johansson
  • /CreationDate: D:20201211132819+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20201211132819+01'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 20FMV108-30:1
  • /Title: Certification Report - Canonical Ubuntu Server 18.04 LTS
  • pdf_file_size_bytes: 454103
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename st_vid10986-st.pdf ST - Canonical Ubuntu Server 18.04 LTS.pdf
pdf_data/st_keywords/cc_cert_id
  • SE:
    • CSEC 2019029: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.3: 5
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 67
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 75
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 12
    • FDP_RIP: 1
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 3
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 44
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 28
    • FCS_COP.1.1: 6
    • FCS_RNG: 2
    • FCS_RNG.1: 35
    • FCS_RNG.1.1: 4
    • FCS_RNG.1.2: 5
  • FDP:
    • FDP_ACC.1: 38
    • FDP_ACC.1.1: 3
    • FDP_ACC.2: 19
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 5
    • FDP_CDP: 5
    • FDP_CDP.1: 14
    • FDP_CDP.1.1: 2
    • FDP_ETC.2: 8
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 14
    • FDP_IFC.2: 20
    • FDP_IFC.2.1: 2
    • FDP_IFC.2.2: 2
    • FDP_IFF.1: 26
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 22
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_RIP.2: 13
    • FDP_RIP.2.1: 1
    • FDP_UCT: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 19
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 50
    • FMT_MSA.1.1: 5
    • FMT_MSA.3: 51
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MSA.4: 6
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 91
    • FMT_MTD.1.1: 13
    • FMT_REV.1: 15
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 35
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 22
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
  • FTA:
    • FTA_SSL.1: 7
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 7
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 10
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 3
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 8
    • O.PERIPHERAL_PORTS_ISOLATION: 11
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 8
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 8
    • O.TAMPER_EVIDENT_LABEL: 9
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 8
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 5
    • A.DETECT: 3
    • A.IT: 3
    • A.KEYS: 2
    • A.MANAGE: 5
    • A.PEER: 6
    • A.PHYSICAL: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.AUDITING: 14
    • O.COMP: 31
    • O.CP: 17
    • O.CRYPTO: 16
    • O.DISCRETIONARY: 10
    • O.MANAGE: 26
    • O.NETWORK: 12
    • O.SUBJECT: 10
    • O.TRUSTED_CHANNEL: 5
  • OE:
    • OE.ADMIN: 6
    • OE.INFO_PROTECT: 9
    • OE.INSTALL: 4
    • OE.IT: 4
    • OE.MAINTENANCE: 3
    • OE.PHYSICAL: 3
    • OE.RECOVER: 4
    • OE.REMOTE: 4
    • OE.TRUSTED: 5
  • T:
    • T.ACCESS: 24
    • T.COMM: 4
    • T.IA: 6
    • T.INFOFLOW: 4
    • T.RESTRICT: 3
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 115
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
      • AES-256: 2
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 2
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 16
    • EdDSA:
      • EdDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 12
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-2: 3
      • SHA-224: 1
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 5
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • SSH:
    • SSH: 60
    • SSHv2: 8
  • TLS:
    • SSL:
      • SSL: 11
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RNG: 18
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 3
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 1
  • XTS:
    • XTS: 3
pdf_data/st_keywords/ecc_curve
  • Edwards:
    • Ed25519: 1
  • NIST:
    • P-256: 1
    • P-384: 1
    • P-521: 1
    • curve P-256: 1
    • curve P-384: 1
    • curve P-521: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
  • libgcrypt:
    • libgcrypt: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 14
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
  • FIPS:
    • FIPS 140-2: 9
    • FIPS 180-4: 6
    • FIPS 186-4: 1
    • FIPS 186-5: 1
    • FIPS 197: 6
    • FIPS 198-1: 2
    • FIPS 46-3: 1
    • FIPS PUB 186-4: 4
    • FIPS PUB 186-5: 2
    • FIPS180-4: 2
    • FIPS197: 2
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 3542: 1
    • RFC 4213: 1
    • RFC 4252: 4
    • RFC 4253: 3
    • RFC 768: 1
    • RFC 791: 2
    • RFC 792: 1
    • RFC 793: 1
    • RFC3526: 2
    • RFC4252: 6
    • RFC4253: 13
    • RFC4419: 3
    • RFC5647: 2
    • RFC5656: 4
    • RFC6668: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
    • PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
    • as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
    • out of scope: 3
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different