Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185
CCEVS-VR-VID-10986-2019
Cortex M33 r0p4
NSCIB-CC-202003-CR
name Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185 Cortex M33 r0p4
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US NL
not_valid_after 01.08.2021 13.02.2025
not_valid_before 01.08.2019 13.02.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10986-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-20-202003.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10986-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10986-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf
manufacturer Vertiv Arm Limited
manufacturer_web https://www.vertivco.com https://www.arm.com
security_level {} EAL6+, ASE_TSS.2, ALC_FLR.1
dgst d04ddd65f0e963a5 d9414c80a0ee7958
heuristics/cert_id CCEVS-VR-VID-10986-2019 NSCIB-CC-202003-CR
heuristics/cert_lab US
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2019
  • evaluation_facility: DXC.technology
  • expiration_date: 01.08.2021
  • id: CCEVS-VR-VID10986
  • product: Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180 and SCKM185
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10986
  • vendor: Vertiv IT Systems
heuristics/protection_profiles da2e45c9b3fbb700 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf {}
pdf_data/cert_filename st_vid10986-ci.pdf CC-20-202003.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10986-2019: 1
  • NL:
    • CC-20-202003: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190815111447-04'00'
  • /ModDate: D:20190815111447-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180723
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20200213160251+01'00'
  • /Creator: NL-ARN-SAL-C
  • /ModDate: D:20200213160645+01'00'
  • /Producer: KONICA MINOLTA bizhub C300i
  • pdf_file_size_bytes: 173675
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10986-vr.pdf Certification Report NSCIB-CC-202003-CR v1.1.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID10986-2019
    • cert_item: Vertiv Secure KM Models SCKM120, SCKM140, SCKM145, SCKM180, SCKM185
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-202003-CR
    • cert_item: Cortex M33 r0p4
    • cert_lab: Brightsight
    • developer: Arm Limited
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10986-2019: 1
  • NL:
    • NSCIB-CC-202003-CR: 13
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 1
    • EAL4+: 2
    • EAL6: 5
    • EAL6 augmented: 3
    • EAL6+: 3
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_FLR.1: 2
  • ASE:
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFF.1: 2
    • FDP_IFF.1.5: 1
    • FDP_RIP.1.1: 2
  • FMT:
    • FMT_MOF.1.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRI: 1
    • O.ANTI_TAMPERING_BACKUP_POWER: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTLY_D: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATION: 1
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_ENDPOINT: 1
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 1
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_CONTR: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/report_keywords/eval_facility
  • DXC:
    • DXC Technology: 5
  • BrightSight:
    • Brightsight: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 5
    • JIL-AAPS: 2
    • JIL-COMP: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
pdf_data/st_filename st_vid10986-st.pdf [M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL6: 11
    • EAL6 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.5: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR.1: 7
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 8
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 67
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 75
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 12
    • FDP_RIP: 1
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 3
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FDP:
    • FDP_ACC: 23
    • FDP_ACC.1: 11
    • FDP_ACC.2: 10
    • FDP_ACF: 22
    • FDP_ACF.1: 23
    • FDP_IFC.1: 4
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 10
    • FMT_MSA.3: 15
    • FMT_SMF: 18
    • FMT_SMF.1: 10
    • FMT_SMR.1: 11
  • FPT:
    • FPT_FLS.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 10
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 3
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 8
    • O.PERIPHERAL_PORTS_ISOLATION: 11
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 8
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 8
    • O.TAMPER_EVIDENT_LABEL: 9
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 11
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 8
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 14
  • FI:
    • Malfunction: 6
  • SCA:
    • Leak-Inherent: 6
    • Physical Probing: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 94
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out: 1
    • 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This: 1
    • Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
    • This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation: 1
    • This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are: 1
    • contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in: 1
    • is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the: 1
    • must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of: 1
    • out of scope: 12
    • to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but: 1
    • transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different