name |
Microsoft SQL Server 2019 Database Engine Enterprise Edition x64 (English), version 15.0.4033.1 |
MX-FR10 Version:C.10 |
category |
Databases |
Other Devices and Systems |
scheme |
ES |
JP |
status |
active |
archived |
not_valid_after |
17.10.2025 |
31.07.2014 |
not_valid_before |
17.10.2020 |
27.07.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-44_Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-44-INF-3227.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0226_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-44-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0226_est.pdf |
manufacturer |
Microsoft Corporation |
Sharp Corporation |
manufacturer_web |
https://www.microsoft.com |
https://sharp-world.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
d58435cea411a495 |
b4bab3db4118c65f |
heuristics/cert_id |
2019-44-INF-3227 |
JISEC-CC-CRP-C0226 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
15.0.4033.1 |
10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Database management systems
- certification_date: 17.10.2020
- enhanced:
- manufacturer: Microsoft Corp.
- product: Microsoft SQL Server 2019 Database Engine Enterprise Edition x64 (English), version 15.0.4033.1
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/604-microsoft-sql-server-2019-database-engine-enterprise-edition-x64-english-version-15-0-4033-1
|
- cert_id: JISEC-CC-CRP-C0226
- certification_date: 01.07.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0226_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an “MFD”. One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functions The TOE counters unauthorized disclosure of image data by: - the encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD or the Flash memory in the MFD, - the erasure function, which overwrites random or constant numbers onto storage areas that store encrypted data, - the confidential file function, which protects image data that a user files with a password so as not to be abused by others, - the network protection function, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - the fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-FR10
- product_type: data protection function in Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0226_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0226_est.pdf
- toe_version: C.10
- vendor: Sharp Corporation
- expiration_date: 01.07.2014
- supplier: Sharp Corporation
- toe_japan_name: MX-FR10 C.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0226_it8240.html
- toe_overseas_name: MX-FR10 C.10
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c0b2fe8891b23088, 69ad074e832ce078 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088V2b_EP_AH_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088V2b_pdf.pdf |
{} |
pdf_data/cert_filename |
2019-44_Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
- EAL2+: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
|
pdf_data/cert_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 762070
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-44-INF-3227.pdf |
c0226_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0226-01: 1
- Certification No. C0226: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 8
- EAL2+: 6
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_ADD: 6
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.2: 9
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_REV.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_TSE.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.OPERATOR: 1
- T:
- T.RECOVER: 1
- T.REMOTE: 1
- T.SPOOF: 1
- T.TAMPER: 1
- T.TAP: 1
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 20
- Microsoft Corporation: 3
|
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 5
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110907095030+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110907095111+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 317037
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
2019-44-ST.pdf |
c0226_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
- EAL2: 1
- EAL2 augmented: 1
- EAL2+: 68
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_ADD: 7
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 16
- FIA_ATD.1.1: 3
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_REV.1: 12
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTA:
- FTA_MCS.1: 7
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
|
- FCS:
- FCS_CKM: 17
- FCS_CKM.1: 5
- FCS_CKM.2: 3
- FCS_CKM.4: 12
- FCS_COP: 19
- FCS_COP.1: 5
- FDP:
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP: 1
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 4
- FIA_SOS: 16
- FIA_SOS.1: 2
- FIA_UAU: 44
- FIA_UAU.1: 10
- FIA_UAU.2: 2
- FIA_UAU.7: 2
- FIA_UID: 24
- FIA_UID.1: 10
- FIA_UID.2: 2
- FMT:
- FMT_MOF: 27
- FMT_MOF.1: 3
- FMT_MSA.3: 5
- FMT_MTD: 30
- FMT_MTD.1: 4
- FMT_SMF.1: 32
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 16
- FTA:
- FTA_TSE.1: 9
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 15
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 3
- A.CONNECT: 4
- A.MANAGE: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL: 3
- A.SUPPORT: 4
- A.TRAINEDUSER: 3
- O:
- O.ACCESS_HISTORY: 11
- O.ADMIN_ROLE: 8
- O.AUDIT_GENERATI: 1
- O.AUDIT_GENERATION: 6
- O.DISCRETIONARY_: 1
- O.DISCRETIONARY_ACCESS: 5
- O.MANAGE: 11
- O.MEDIATE: 8
- O.RESIDUAL_INFOR: 1
- O.RESIDUAL_INFORMATION: 8
- O.TOE_ACCESS: 18
- OE:
- OE.ADMIN: 12
- OE.INFO_PROTECT: 19
- OE.IT_REMOTE: 10
- OE.IT_TRUSTED_SYSTEM: 9
- OE.NO_GENERAL_: 2
- OE.NO_GENERAL_PURPOSE: 6
- OE.PHYSICAL: 8
- T:
- T.ACCESS_TSFDATA: 3
- T.ACCESS_TSFFUNC: 3
- T.IA_MASQUERADE: 4
- T.IA_USER: 3
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 4
- T.UNAUTHORIZED_ACCESS: 4
|
- A:
- A.NETWORK: 4
- A.OPERATOR: 4
- O:
- O.FAXTONET: 6
- O.FILTER: 9
- O.MANAGE: 11
- O.REMOVE: 7
- O.RESIDUAL: 7
- O.TRP: 8
- O.USER: 6
- OE:
- OE.CIPHER: 3
- OE.ERASEALL: 3
- OE.FIREWALL: 3
- OE.OPERATE: 3
- OE.PC-USER: 4
- OE.SUBNET: 3
- OE.USER: 3
- T:
- T.RECOVER: 5
- T.REMOTE: 3
- T.SPOOF: 4
- T.TAMPER: 3
- T.TAP: 4
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 21
- Microsoft Corporation: 3
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20110830153943+09'00'
- /ModDate: D:20110830153943+09'00'
- pdf_file_size_bytes: 327485
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |