Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Ivanti Connect Secure 22.2
CCEVS-VR-VID-11372-2024
IAS Classic v5.2 on MultiApp V5.0
ANSSI-CC-2021/54
name Ivanti Connect Secure 22.2 IAS Classic v5.2 on MultiApp V5.0
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 23.02.2026 04.11.2026
not_valid_before 23.02.2024 04.11.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11372-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_54.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11372-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_54.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11372-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_54en.pdf
manufacturer Ivanti, Inc. THALES DIS FRANCE SA
manufacturer_web https://www.ivanti.com https://www.thalesgroup.com/en/europe/france
security_level {} EAL5+, ALC_DVS.2, AVA_VAN.5
dgst d8de7620dfa8311b c29a527d36110778
heuristics/cert_id CCEVS-VR-VID-11372-2024 ANSSI-CC-2021/54
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:a:ivanti:connect_secure:22.2:-:*:*:*:*:*:*, cpe:2.3:a:ivanti:connect_secure:22.2:r1:*:*:*:*:*:* {}
heuristics/related_cves CVE-2022-35258, CVE-2023-39340, CVE-2024-8495, CVE-2024-47909, CVE-2024-11634, CVE-2024-11004, CVE-2024-11005, CVE-2024-21894, CVE-2024-13830, CVE-2024-47907, CVE-2024-13843, CVE-2022-35254, CVE-2025-0283, CVE-2025-22467, CVE-2024-22023, CVE-2024-22052, CVE-2024-13842, CVE-2024-9844, CVE-2024-21887, CVE-2023-41719, CVE-2024-21888, CVE-2024-47906, CVE-2023-41720, CVE-2024-9420, CVE-2024-47905, CVE-2024-11007, CVE-2024-21893, CVE-2024-22053, CVE-2024-11633, CVE-2024-11006, CVE-2023-46805 {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 22.2 5.0, 5.2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/scheme_data
heuristics/protection_profiles 89f2a255423f4a20 d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf
pdf_data/cert_filename st_vid11372-ci.pdf certificat-anssi-cc-2021_54.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11372-2024: 1
  • FR:
    • ANSSI-CC-2021/54: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0072-2012-: 1
    • BSI-CC-PP- 0076-2013-MA-01: 1
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.C: 1
    • A.O: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20240307110425-05'00'
  • /ModDate: D:20240307110425-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 185858
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate: D:20211104110617+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211104110617+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 293970
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11372-vr.pdf anssi-cc-2021_54.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID11372-2024
    • cert_item: for the Ivanti Connect Secure 22.2
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11372-2024: 1
  • DE:
    • BSI-DSZ-CC-1107-2020: 1
  • FR:
    • ANSSI-CC-2021/54: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-: 1
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-: 1
    • BSI-CC-PP-0072-2012-: 1
    • BSI-CC-PP-0075-: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-: 5
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part3: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_PRE_OPE: 2
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.2: 1
    • FCS_COP: 6
    • FCS_RBG_EXT.1: 1
    • FCS_TLSC_EXT.1: 7
    • FCS_TLSC_EXT.2: 6
    • FCS_TLSS_EXT.1: 8
  • FPT:
    • FPT_APW_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
    • A.VS_CORRECT_CONFIGURATION: 1
    • A.VS_ISOLATION: 1
    • A.VS_REGULAR_UPDATES: 1
    • A.VS_TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.C: 4
    • A.O: 4
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
  • Intertek:
    • Intertek: 2
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 12
  • VPN:
    • VPN: 3
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20211104110830+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211104110830+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 171587
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename st_vid11372-st.pdf anssi-cible-cc-2021_54en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-: 1
    • PP-SSCD-KG: 35
    • PP-SSCD-KI: 27
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 2
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 25
    • FCS_COP.1: 6
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_TLSC_EXT.1: 11
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 14
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSS_EXT.1: 13
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 2
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 8
    • FMT_MOF.1: 2
    • FMT_MTD: 8
    • FMT_MTD.1: 2
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 5
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 5
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 3
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 46
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 2
    • FCS_COP: 28
    • FCS_COP.1: 7
    • FCS_COP.1.1: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 47
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 4
    • FDP_ACF: 34
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 8
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFF: 2
    • FDP_ITC: 8
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 6
    • FDP_RIP.1: 14
    • FDP_RIP.1.1: 1
    • FDP_SDI: 16
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 8
    • FDP_UCT.1: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 14
    • FIA_AFL.1: 4
    • FIA_API: 5
    • FIA_API.1: 11
    • FIA_API.1.1: 2
    • FIA_ATD: 2
    • FIA_UAU: 21
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 19
    • FIA_UID.1: 14
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 9
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.4: 4
    • FMT_MTD: 21
    • FMT_MTD.1: 2
    • FMT_SMF: 6
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR: 7
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ICT: 2
    • FTP_ITC: 28
    • FTP_ITC.1: 16
    • FTP_TRP: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
    • A.VS_CORRECT_CONFIGURATION: 1
    • A.VS_ISOLATION: 1
    • A.VS_REGULAR_UPDATES: 1
    • A.VS_TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMN: 1
    • OE.UPDATES: 1
    • OE.VM_CONFIGURATION: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.C: 5
    • A.CAP_FILE: 3
    • A.CGA: 2
    • A.CSP: 2
    • A.O: 5
    • A.SCA: 2
    • A.VERIFICATION: 3
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.CIPHER: 1
    • O.CONFID-OS-UPDATE: 2
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 3
    • O.SECURE_AC_ACTIVATION: 2
    • O.SECURE_LOAD_ACODE: 2
    • O.SID: 1
    • O.TOE_IDENTIFICATION: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.CAP_FILE: 4
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 3
    • OE.HID_VAD: 1
    • OE.HI_VAD: 2
    • OE.SCP: 2
    • OE.VERIFICATION: 7
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon: 8
  • Thales:
    • Thales: 7
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 5
      • HMAC-SHA-384: 3
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 6
      • ECDHE: 6
    • ECDSA:
      • ECDSA: 17
  • RSA:
    • RSA 2048: 6
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 13
      • SHA-384: 2
      • SHA-512: 7
      • SHA256: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 7
  • TLS:
    • DTLS:
      • DTLS: 4
    • SSL:
      • SSL: 4
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 72
      • TLS 1.0: 1
      • TLS 1.1: 2
      • TLS 1.2: 2
      • TLS v1.1: 2
      • TLS v1.2: 2
      • TLSv1.0: 2
      • TLSv1.1: 7
      • TLSv1.2: 10
  • VPN:
    • VPN: 3
  • PACE:
    • PACE: 11
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 15
  • RNG:
    • RBG: 2
  • RNG:
    • RND: 1
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 5
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-224: 4
    • P-256: 22
    • P-384: 18
    • secp256r1: 7
    • secp384r1: 5
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 7
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 7
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 7
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 7
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 7
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 7
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 7
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 7
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 7
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 7
    • TLS_RSA_WITH_AES_128_CBC_SHA: 7
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 7
    • TLS_RSA_WITH_AES_256_CBC_SHA: 7
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault induction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 5
    • FIPS PUB 196-4: 1
    • FIPS18: 1
    • FIPS186-4: 4
  • ISO:
    • ISO/IEC 10118-: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-90: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 1035: 1
    • RFC 2818: 7
    • RFC 2986: 1
    • RFC 3447: 2
    • RFC 3986: 1
    • RFC 4346: 2
    • RFC 5077: 1
    • RFC 5246: 4
    • RFC 5280: 3
    • RFC 5424: 1
    • RFC 5425: 1
    • RFC 6125: 1
    • RFC 8017: 1
  • X509:
    • X.509: 12
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS197: 2
  • ICAO:
    • ICAO: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • data by authorized users. The functionalities of IAS Classic 5.2 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1 application) provides biometry recognition with: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: D1491739
  • /CreationDate: D:20211019114756+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: 09-04-2019
  • /ModDate: D:20211019185225+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 1.1
  • /Title: MultiApp V4.2: IAS EN Core & Extensions Security Target
  • pdf_file_size_bytes: 2133951
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different