name |
NetApp E-Series & EF-Series with SANtricity OS 11.50 |
CardOS V6.0 ID R1.1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
DE |
status |
archived |
active |
not_valid_after |
03.01.2024 |
17.10.2028 |
not_valid_before |
03.01.2019 |
17.10.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-468%20CTv1.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-468%20CR%20v1.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-468%20NetApp%20SANtricity%2011%20Security%20Target_1.3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1162V2b_pdf.pdf |
manufacturer |
NetApp, Inc. |
Eviden Germany GmbH |
manufacturer_web |
https://www.netapp.com/ |
https://eviden.com |
security_level |
{} |
ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
d56aeb0d30f7640f |
f720e5aa107bdbbe |
heuristics/cert_id |
383-4-468 |
BSI-DSZ-CC-1162-V2-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ALC_FLR.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
11.50 |
6.0, 1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1162-V3-2024 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-1162-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1162-V3-2024 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1162-2021, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
- category: Electronic ID documents
- cert_id: BSI-DSZ-CC-1162-V3-2024
- certification_date: 04.12.2024
- enhanced:
- applicant: Eviden Germany GmbH Otto-Hahn-Ring 6 81739 München
- assurance_level: EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1162V3c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 04.12.2024
- description: The composite TOE is named CardOS V6.0 ID R1.0 (developed by Atos Information Technology GmbH). The TOE is a smart card operating system on an IC with at least one application. Applications covered by this TOE comprise an electronic passport (ePass) application and/or a signature (eSign) application. The IC platform comprises the integrated circuit SLC52GDA448* (IFX_CCI_000005 Design Step H13) and the cryptographic libraries RSA v2.08.007, EC v2.08.007, Toolbox v2.08.007, Base v2.08.007, HCL2 v1.12.001 (hash library) and Symmetric Crypto Library (SCL) v2.04.002 certified according CC v3.1 with ID BSI-DSZ-CC-1110-V4-2021.
- entries: [frozendict({'id': 'EN'}), frozendict({'id': 'Protection', 'description': 'Information Society Standardization System'}), frozendict({'id': 'Protection', 'description': 'Information Society Standardization System'}), frozendict({'id': 'Machine', 'description': 'Extended Access Control'}), frozendict({'id': 'Common', 'description': 'Protection Profile'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 03.12.2029
- product: CardOS V6.0 ID R1.2
- protection_profile: EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02,Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application, CEN / ISSS - Information Society Standardization System, 12 October 2013, BSI-CC-PP-0071-2012-MA-01 Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application, CEN / ISSS - Information Society Standardization System, 12 October 2013, BSI-CC-PP-0072-2012-MA-01,Machine Readable Travel Document with "ICAO Application" Extended Access Control with PACE, Version 1.3.2, 5 December 2012, BSI-CC-PP-0056-V2-2012-MA-02,Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP), Version 1.01, 22 July 2014, BSI-CC-PP-0068-V2-2011-MA-01
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1162V3a_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1162V3b_pdf.pdf?__blob=publicationFile&v=3
- product: CardOS V6.0 ID R1.2
- subcategory: IC with applications
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-IC_mit_Anwendung/1162.html
- vendor: Eviden Germany GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
b380aabf93b29692, d9553e7194783182, d918b28fd7bb5d79, a33327d40f253f46, 1f7ea2e05de5b88b |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf |
pdf_data/cert_filename |
383-4-468 CTv1.2.pdf |
1162V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1162-V2-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: White, Debra E.
- /Company: CSEC
- /CreationDate: D:20190103125251-05'00'
- /Creator: Acrobat PDFMaker 17 for Word
- /ModDate: D:20190103125256-05'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20190103175224
- pdf_file_size_bytes: 204766
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.1, Eviden Germany GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.1, Eviden Germany GmbH
- /Title: Certificate BSI-DSZ-CC-1162-V2-2023
- pdf_file_size_bytes: 232198
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
383-4-468 CR v1.2.pdf |
1162V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2, AVA_VAN.5 valid until: 16 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1162-V2-2023
- cert_item: CardOS V6.0 ID R1.1
- cert_lab: BSI
- developer: Eviden Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: BSI-CC-PP-0056-V2-2012-MA-02 BSI-CC-PP-0068-V2-2011-MA-01 EN 419211-2:2013 (BSI-CC-PP-0059-2009-MA-02) EN 419211-4:2013 (BSI-CC-PP-0071-2012-MA-01) EN 419211-5:2013 (BSI-CC-PP-0072-2012-MA-01
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 1
- BSI-DSZ-CC-1110-V5-2022-MA-01: 6
- BSI-DSZ-CC-1162-2021: 3
- BSI-DSZ-CC-1162-2021-MA-01: 1
- BSI-DSZ-CC-1162-V2-2023: 19
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-: 2
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0059-2009-: 2
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0068-V2-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0071-2012-: 2
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-: 2
- BSI-CC-PP-0072-2012-MA-01: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 4
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 5
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 8
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 180-3: 1
- FIPS 186-4: 2
- FIPS 197: 1
- FIPS 198: 1
- ISO:
- NIST:
- SP 800-56A: 1
- SP 800-90A: 1
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 3
- AIS 25: 4
- AIS 26: 4
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 1
- AIS 36: 5
- AIS 37: 3
- AIS 38: 1
- AIS 46: 3
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- ETR-COMP) for BSI-DSZ- CC-1110-V5-2022, Version 1, 2022-03-29, TÜV Informationstechnik GmbH (confidential document) Evaluation Technical Report for Composite Evaluation Addendum (ETR COMP_ADD_MA-01) for: 1
- Germany GmbH Packages & Release Notes, CardOS V6.0, 06/2023, Eviden Germany GmbH [13] STAR Reports (confidential documents): Site Technical Audit Report – Munich, Version 2, 2023-09-28, TÜV Informationstechnik GmbH Site: 1
- Technical Report Summary (ETR Summary), Version 5, 2023-09-28, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profiles: Protection profiles for secure signature creation device – Part 2: Device: 1
- V6.0 ID R1.1 (BAC)’, Version 1.42, 2023-09-27, Eviden Germany GmbH (confidential document) 26 / 30 BSI-DSZ-CC-1162-V2-2023 Certification Report [12] Guidance documentation for the TOE: 1
- Version 1, 2022-08- 15, TÜV Informationstechnik GmbH (confidential document) [11] Configuration List for BSI-DSZ-CC-1162-V2-2023, Configuration List ’CardOS V6.0 ID R1.1’ and: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: White, Debra E.
- /Comments: v1.2
- /Company: CSEC
- /CreationDate: D:20190103125119-05'00'
- /Creator: Acrobat PDFMaker 17 for Word
- /ModDate: D:20190103125126-05'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20190103175032
- /Title: 383-4-XXX CR v0.1
- pdf_file_size_bytes: 220499
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.1, Eviden Germany GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, CardOS V6.0 ID R1.1, Eviden Germany GmbH
- /Title: Certification Report BSI-DSZ-CC-1162-V2-2023
- pdf_file_size_bytes: 409879
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
pdf_data/st_filename |
383-4-468 NetApp SANtricity 11 Security Target_1.3.pdf |
1162V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-: 1
- BSI-DSZ-CC-1162: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0055-110: 2
- BSI-CC-PP- 0056-V2-2012-MA-02: 1
- BSI-CC-PP- 0059-2009-MA-02: 4
- BSI-CC-PP- 0068-V2-2011-MA-01: 7
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP- 2200: 1
- BSI-CC-PP- 3020: 1
- BSI-CC-PP- 5785: 1
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-110: 10
- BSI-CC-PP-0056-: 2
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0056-V2-2012-: 2
- BSI-CC-PP-0056-V2-2012-MA-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 22
- BSI-CC-PP-0059-: 2
- BSI-CC-PP-0059-2009-MA-: 1
- BSI-CC-PP-0059-2009-MA-02: 31
- BSI-CC-PP-0068-: 2
- BSI-CC-PP-0068-V2-: 2
- BSI-CC-PP-0068-V2-2011-: 3
- BSI-CC-PP-0068-V2-2011-MA-01: 55
- BSI-CC-PP-0071-2012-: 1
- BSI-CC-PP-0071-2012-MA-01: 7
- BSI-CC-PP-0072-: 1
- BSI-CC-PP-0072-2012-: 1
- BSI-CC-PP-0072-2012-MA-01: 11
- BSI-CC-PP-0084-2014: 10
- BSI-CC-PP-0086-2015: 4
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6+: 1
- EAL4: 15
- EAL4 augmented: 4
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT: 11
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 84
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 29
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_DPT.2: 7
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 19
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 10
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FAU_STG_EXT.2: 5
- FAU_STG_EXT.2.1: 1
- FCO:
- FCO_CPC_EXT: 2
- FCO_CPC_EXT.1: 9
- FCO_CPC_EXT.1.1: 3
- FCO_CPC_EXT.1.2: 3
- FCO_CPC_EXT.1.3: 2
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 21
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 77
- FCS_COP.1: 5
- FCS_DTLS: 1
- FCS_DTLS_EXT.1.1: 1
- FCS_DTLS_EXT.2.1: 1
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 22
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 3
- FCS_SSHC_EXT: 2
- FCS_SSHC_EXT.1: 6
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 2
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 6
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 14
- FCS_TLSC_EXT.1.1: 5
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.1.4: 2
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FCS_TLSS_EXT: 5
- FCS_TLSS_EXT.1: 12
- FCS_TLSS_EXT.1.1: 6
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2: 4
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 1
- FCS_TLSS_EXT.2.6: 1
- FCS_TLS_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 10
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.2: 12
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF: 13
- FMT_MOF.1: 2
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT: 4
- FPT_ITT.1: 4
- FPT_PTD: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 10
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 2
- FPT_STM_EXT: 1
- FPT_STM_EXT.1: 8
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 3
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 10
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 7
- FPT_TST_EXT.2.1: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.1.3: 8
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 8
- FTP_TRP.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 138
- FCS_CKM.1: 35
- FCS_CKM.2: 14
- FCS_CKM.4: 68
- FCS_CKM.4.1: 2
- FCS_COP: 151
- FCS_COP.1: 26
- FCS_ITC: 1
- FCS_RNG: 1
- FCS_RNG.1: 24
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 39
- FDP_ACC.1: 27
- FDP_ACF: 34
- FDP_ACF.1: 53
- FDP_DAU: 7
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 15
- FDP_ITC.1: 24
- FDP_ITC.2: 24
- FDP_ITT.1: 1
- FDP_LIM: 2
- FDP_RIP.1: 22
- FDP_RIP.1.1: 2
- FDP_SDC.1: 1
- FDP_SDI: 12
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_UCT: 12
- FDP_UCT.1: 3
- FDP_UIT: 16
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 38
- FIA_AFL.1: 10
- FIA_API: 15
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_UAU: 99
- FIA_UAU.1: 26
- FIA_UAU.1.1: 5
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.5: 17
- FIA_UAU.6: 4
- FIA_UID: 14
- FIA_UID.1: 24
- FIA_UID.1.1: 3
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 13
- FMT_LIM.1.1: 2
- FMT_LIM.2: 11
- FMT_LIM.2.1: 3
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 7
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 21
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 97
- FMT_MTD.1: 11
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 55
- FMT_SMF.1.1: 1
- FMT_SMR: 19
- FMT_SMR.1: 43
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 9
- FPT_EMS.1: 17
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 16
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 39
- FTP_ITC.1: 19
- FTP_TRP.1: 6
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_: 1
- A.LIMITED_: 1
- A.NO_THRU_: 1
- A.PHYSICAL_: 1
- A.REGULAR_: 1
- A.RESIDUAL_: 1
- A.TRUSTED_: 1
- OE:
- OE.ADMIN_CREDEN: 1
- OE.NO_GENERAL_: 1
- OE.NO_THRU_: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_: 1
- T.PASSWORD_CRACKING: 3
- T.SECURITY_: 2
- T.SECURITY_FUNCTIONAL: 2
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_ADMINIS: 1
- T.UNDETECTED_: 1
- T.UNDETECTED_ACTIVITY: 2
- T.UNTRUSTED_: 1
- T.UNTRUSTED_COMMUNI: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_: 2
- T.WEAK_AUTHENTICATIO: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- OE:
- OE.CGA_TC_: 1
- OE.HID_VAD: 9
- OE.SCA_TC_DTBS_: 1
- OE.SSCD_: 1
- OT:
- OT.TOE_: 1
- OT.TOE_TC_VAD_: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 21
- AES-: 2
- AES-128: 1
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 3
- HMAC-SHA-384: 4
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 12
- DHE: 2
- Diffie-Hellman: 10
|
- ECC:
- FF:
- DH:
- DH: 11
- Diffie-Hellman: 16
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 2
- SHA-512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-256: 11
- SHA-384: 7
- SHA-512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 4
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 4
- IKEv1: 12
- IKEv2: 12
- IPsec:
- SSH:
- TLS:
- DTLS:
- DTLS: 75
- DTLS 1.0: 9
- DTLS 1.2: 9
- DTLS v1.0: 4
- DTLS v1.2: 4
- SSL:
- SSL: 8
- SSL 2.0: 3
- SSL 3.0: 3
- TLS:
- TLS: 99
- TLS 1.0: 3
- TLS 1.1: 7
- TLS 1.2: 9
- TLS v1.0: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 2
- P-521: 6
- curve P-384: 2
- secp256r1: 7
- secp384r1: 4
- secp512r1: 2
- secp521r1: 5
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-384: 4
- NIST P-521: 4
- P-256: 4
- P-384: 8
- P-521: 8
- prime256v1: 1
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 8
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 7
- Physical Tampering: 6
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- physical probing: 4
- side channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03110: 1
- BSI TR-03116: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 1
- EF.DG1: 7
- EF.DG14: 7
- EF.DG15: 3
- EF.DG16: 6
- EF.DG2: 2
- EF.DG3: 12
- EF.DG4: 12
- EF.DG5: 1
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 5
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 2818: 8
- RFC 2986: 2
- RFC 3602: 2
- RFC 4106: 1
- RFC 4109: 1
- RFC 4251: 1
- RFC 4253: 6
- RFC 4301: 2
- RFC 4303: 1
- RFC 4304: 1
- RFC 4346: 4
- RFC 4347: 9
- RFC 4492: 2
- RFC 4868: 2
- RFC 4945: 1
- RFC 5246: 10
- RFC 5280: 12
- RFC 5282: 1
- RFC 5289: 12
- RFC 5759: 1
- RFC 5996: 2
- RFC 6125: 9
- RFC 6187: 1
- RFC 6347: 13
- RFC 6960: 2
- X509:
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS 36: 1
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. FCS_SSHC_EXT.1 SSH Client Protocol NetApp, Inc: 1
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 2
|
- OutOfScope:
- it should then proceed with passive authentications. Others than above listed terminals are out of scope of this ST. In particular, terminals using Basic Access Control (BAC) may be functionally supported: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /AAPL:Keywords: []
- /CreationDate: D:20190103170831Z
- /Creator: Word
- /Keywords:
- /ModDate: D:20190103124046-05'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: Microsoft Word - NetApp SANtricity 11 Security Target_1.3.docx
- pdf_file_size_bytes: 1050732
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
- /Author: Eviden Germany GmbH
- /Keywords: Common Criteria, CardOS, ASE, eID, ICAO, QSCD
- /Subject: Security Target CardOS V6.0
- /Title: Security Target 'CardOS V6.0 ID R1.1'
- pdf_file_size_bytes: 1793599
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 182
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |