| name |
Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches |
iSAS, Release 1.0 |
| category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
US |
DE |
| status |
archived |
active |
| not_valid_after |
21.08.2020 |
02.03.2027 |
| not_valid_before |
21.08.2018 |
02.03.2022 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2b_pdf.pdf |
| manufacturer |
Siemens Canada Ltd. |
Frequentis AG |
| manufacturer_web |
https://www.siemens.com |
https://www.frequentis.com |
| security_level |
{} |
EAL4+, ADV_INT.3, ASE_TSS.2, AVA_VAN.5 |
| dgst |
d832f21299727366 |
56159ceb71850ff4 |
| heuristics/cert_id |
CCEVS-VR-VID-10877-2018 |
BSI-DSZ-CC-0619-V2-2022 |
| heuristics/cert_lab |
US |
BSI |
| heuristics/cpe_matches |
cpe:2.3:h:siemens:ruggedcom_rs940gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs400f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2100pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m969f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2488f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gpf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2200f:-:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ALC_CMC.1, AGD_PRE.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_OBJ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ADV_INT.3, ASE_TSS.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
4.2.2 |
1.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
48ac4778e4272298 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
{} |
| pdf_data/cert_filename |
st_vid10877-ci.pdf |
0619V2a_pdf.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10877-2018: 1
|
- DE:
- BSI-DSZ-CC-0619-V2-2022: 13
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
- EAL4+: 1
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 3
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- BSI:
- AIS 14: 1
- AIS 19: 1
- AIS 25: 1
- AIS 26: 1
- AIS 32: 1
- AIS 34: 1
- AIS 35: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
- ConfidentialDocument:
- BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
- Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
|
| pdf_data/cert_metadata |
- /CreationDate: D:20180823111041-04'00'
- /ModDate: D:20180823111041-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 183909
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Infomationstechnik
- /CreationDate: D:20220304075744+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0619-V2, iSAS Release 1.0"
- /ModDate: D:20220304154821+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Certification Report
- /Title: Certification Report BSI-DSZ-CC-0619-V2-2022
- pdf_file_size_bytes: 509526
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
| pdf_data/report_filename |
st_vid10877-vr.pdf |
0619V2a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10877-2018
- cert_item: Siemens Canada Ltd. RUGGEDCOM Rugged Operating System (ROS) V4.2.2.F Running on the M2100F, M2200F, M969F, RSG2100F, RSG2100PF, RSG2200F, RSG2300F, RSG2300PF, RSG2488F, RS400F, RS416F, RS416PF, RS900F, RS900GF, RS900GPF, and RS940GF RUGGEDCOM switches
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0619-V2-2022
- cert_item: iSAS Release 1.0
- cert_lab: BSI
- developer: Frequentis AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10877-2018: 1
|
- DE:
- BSI-DSZ-CC-0619-V2-2022: 13
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
- EAL4+: 1
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 14: 1
- AIS 19: 1
- AIS 25: 1
- AIS 26: 1
- AIS 32: 1
- AIS 34: 1
- AIS 35: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
- Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
|
| pdf_data/report_metadata |
- /CreationDate: D:20180822131120-04'00'
- /ModDate: D:20180822131120-04'00'
- pdf_file_size_bytes: 690785
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Infomationstechnik
- /CreationDate: D:20220304075744+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0619-V2, iSAS Release 1.0"
- /ModDate: D:20220304154821+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Certification Report
- /Title: Certification Report BSI-DSZ-CC-0619-V2-2022
- pdf_file_size_bytes: 509526
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
| pdf_data/st_filename |
st_vid10877-st.pdf |
0619V2b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 1
- EAL4: 8
- EAL4 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_INT.3: 5
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 5
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FCS:
- FCS_CKM.1: 35
- FCS_CKM.1.1: 1
- FCS_CKM.2: 16
- FCS_CKM.2.1: 1
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 65
- FCS_COP.1: 13
- FCS_RBG_EXT.1: 19
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHS_EXT.1: 20
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSS_EXT: 3
- FCS_TLSS_EXT.1: 15
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLS_EXT.1: 2
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 13
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 3
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 13
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 19
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 4
- FMT:
- FMT_MOF: 8
- FMT_MOF.1: 1
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 10
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT.1: 2
- FPT_PTD: 1
- FPT_SKP_EXT.1: 12
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_STM.1: 3
- FPT_STM_EXT.1: 15
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TST: 1
- FPT_TST_EXT.1: 12
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 14
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_SSL.4: 8
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 12
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 15
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 10
- FTP_TRP.1: 3
|
- FAU:
- FAU_ARP.1: 11
- FAU_ARP.1.1: 1
- FAU_GEN.1: 1
- FAU_SAA.1: 11
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FDP:
- FDP_ETC.1: 12
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 33
- FDP_IFC.1: 5
- FDP_IFF: 69
- FDP_IFF.1: 30
- FDP_IFF.5: 4
- FDP_IFF.5.1: 1
- FDP_ITC: 20
- FDP_ITC.1: 10
- FMT:
- FMT_MSA: 38
- FMT_MSA.1: 5
- FMT_MSA.3: 8
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 4
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
| pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 13
- RSA:
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 14
- SHA-384: 11
- SHA-512: 13
- SHA256: 3
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 6
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 51
- TLS 1.0: 2
- TLS 1.1: 3
- TLS 1.2: 3
- TLS v1.0: 1
- TLS v1.1: 1
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 10
- P-521: 12
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- malfunction: 7
- physical tampering: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 1
- FIPS PUB 186-4: 3
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 1
- SP 800-135: 1
- SP 800-52: 1
- SP 800-56A: 2
- SP 800-56B: 1
- SP 800-57: 1
- PKCS:
- RFC:
- RFC 2818: 3
- RFC 2986: 2
- RFC 3268: 4
- RFC 3526: 3
- RFC 4253: 2
- RFC 4346: 2
- RFC 4492: 2
- RFC 5246: 6
- RFC 5280: 5
- RFC 5289: 2
- RFC 5759: 1
- RFC 6069: 1
- RFC 6960: 1
- RFC24: 1
- X509:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- touch entry device). Protection of TSF The TOE provides a Fail Secure security function. 1.4.2.3 Out of Scope The following firmware and hardware features are outside the scope of the defined TSF and are: 1
- 12 1.4.2.3 Out of Scope: 2
- Microphone_Inputs/Earpiece_Outputs are connected to the BLACK or RED VCS. The touch entry device is out of scope of the TOE. Therefore, this setup requires that the MOD iSAS-P is mounted visible, and the operator: 1
- Out of Scope: 2
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author: Siemens Canada Ltd
- /CreationDate: D:20180814122918-04'00'
- /Creator: DocBook XSL Stylesheets with Apache FOP
- /ModDate: D:20180822130851-04'00'
- /PDFVersion: 1.4
- /Producer: Apache FOP Version 1.0
- /Title: v4.2.2.F
- pdf_file_size_bytes: 468220
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#3336, mailto:[email protected], http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#4037, http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1204, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#2635, http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#3329, https://www.siemens.com/ruggedcom, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#2072, http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsanewval.html#899, http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1207, http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#858, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#2078, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#2631, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#4030, http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#863, http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsanewval.html#903, https://www.siemens.com/industrialsecurity, https://support.automation.siemens.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
- /Author: Frequentis
- /CreationDate: D:20220202143605+01'00'
- /Creator: Microsoft® Word 2019
- /Keywords: Secure audio switch, Trusted audio switch, Red/Black separation, Audio interface
- /ModDate: D:20220202143605+01'00'
- /Producer: Microsoft® Word 2019
- /Subject: Security Target Lite
- /Title: iSAS
- pdf_file_size_bytes: 898592
- pdf_hyperlinks: http://www.frequentis.com/
- pdf_is_encrypted: True
- pdf_number_of_pages: 81
|
| state/cert/convert_garbage |
False |
False |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
False |
False |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
False |
False |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |