Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Rubrik Cloud Data Management
SERTIT-112
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
name Rubrik Cloud Data Management HarmonyOS 3.0 on Huawei MatePad Pro
category Other Devices and Systems Mobility
scheme NO NL
status archived active
not_valid_after 10.10.2023 19.12.2028
not_valid_before 10.10.2018 19.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20181010%20Sertit-112%20C%20v1_0Rubrik.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20181010%20Sertit-112%20CR%20v1_0Rubrik.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Rubrik_Cloud_Data_Management_v.1.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf
manufacturer Rubrik, Inc. Huawei Device Co., Ltd.
manufacturer_web https://www.rubrik.com https://www.huawei.com/
security_level ALC_FLR.1, EAL2+ EAL2+, ALC_FLR.3
dgst e2806ccff516b927 c85f7e09316c6900
heuristics/cert_id SERTIT-112 NSCIB-CC-0531255-CR
heuristics/cert_lab []
heuristics/cpe_matches {} cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-44114, CVE-2024-47291, CVE-2022-48314, CVE-2024-36501, CVE-2023-46774, CVE-2023-52720, CVE-2022-48297, CVE-2023-37238, CVE-2024-45450, CVE-2023-39392, CVE-2022-48360, CVE-2023-41308, CVE-2024-42036, CVE-2024-30418, CVE-2023-3455, CVE-2024-27896, CVE-2024-54096, CVE-2024-42031, CVE-2023-52381, CVE-2023-39383, CVE-2023-52368, CVE-2022-41590, CVE-2022-44562, CVE-2023-39394, CVE-2024-45447, CVE-2023-52714, CVE-2022-48350, CVE-2023-52369, CVE-2024-32990, CVE-2023-52388, CVE-2023-52108, CVE-2023-39405, CVE-2024-47290, CVE-2023-44098, CVE-2023-39399, CVE-2023-52359, CVE-2023-46767, CVE-2023-37240, CVE-2023-44110, CVE-2024-32995, CVE-2023-52357, CVE-2023-44099, CVE-2022-48293, CVE-2023-39403, CVE-2023-52550, CVE-2023-46756, CVE-2023-41311, CVE-2023-52114, CVE-2024-54100, CVE-2022-44555, CVE-2023-44093, CVE-2023-41307, CVE-2023-52955, CVE-2023-52551, CVE-2022-48357, CVE-2024-36500, CVE-2024-57960, CVE-2023-52364, CVE-2024-36503, CVE-2022-48291, CVE-2024-30417, CVE-2023-52367, CVE-2024-45444, CVE-2024-57961, CVE-2022-48354, CVE-2023-46762, CVE-2023-41312, CVE-2023-39398, CVE-2023-41298, CVE-2022-48300, CVE-2022-48621, CVE-2023-52953, CVE-2023-46758, CVE-2023-37245, CVE-2023-52372, CVE-2022-48352, CVE-2024-54097, CVE-2024-54101, CVE-2023-4565, CVE-2023-46761, CVE-2024-32999, CVE-2023-39382, CVE-2024-30416, CVE-2023-52366, CVE-2023-52554, CVE-2023-52538, CVE-2023-26549, CVE-2024-45443, CVE-2023-52553, CVE-2023-46773, CVE-2023-44109, CVE-2023-52102, CVE-2023-4566, CVE-2022-48513, CVE-2022-48361, CVE-2023-49241, CVE-2023-44097, CVE-2023-39386, CVE-2022-48359, CVE-2022-48355, CVE-2023-37239, CVE-2024-39670, CVE-2023-52104, CVE-2024-42037, CVE-2024-56448, CVE-2023-46768, CVE-2022-48508, CVE-2023-5801, CVE-2023-39391, CVE-2023-44112, CVE-2024-39674, CVE-2023-44105, CVE-2023-52379, CVE-2023-46759, CVE-2023-44116, CVE-2023-52362, CVE-2024-32998, CVE-2023-1693, CVE-2023-52375, CVE-2023-39402, CVE-2023-7265, CVE-2023-46769, CVE-2022-48302, CVE-2023-44103, CVE-2023-52374, CVE-2023-46755, CVE-2023-37241, CVE-2023-52385, CVE-2023-39388, CVE-2023-52111, CVE-2023-44102, CVE-2024-42032, CVE-2024-39673, CVE-2023-52545, CVE-2023-52373, CVE-2023-46760, CVE-2022-48613, CVE-2022-48351, CVE-2023-52107, CVE-2023-46764, CVE-2023-44094, CVE-2023-52549, CVE-2023-49242, CVE-2024-32992, CVE-2023-49240, CVE-2023-46766, CVE-2023-3456, CVE-2023-39396, CVE-2024-45441, CVE-2023-44111, CVE-2024-56447, CVE-2024-42038, CVE-2023-52716, CVE-2023-52719, CVE-2024-56441, CVE-2022-48296, CVE-2023-52363, CVE-2023-7271, CVE-2023-52537, CVE-2024-45445, CVE-2023-34164, CVE-2023-39395, CVE-2023-39387, CVE-2023-39393, CVE-2023-52358, CVE-2023-41296, CVE-2022-44559, CVE-2022-48299, CVE-2023-52370, CVE-2024-45449, CVE-2023-44104, CVE-2023-39397, CVE-2023-49246, CVE-2023-39400, CVE-2023-44119, CVE-2023-52097, CVE-2023-44118, CVE-2024-51528, CVE-2023-52365, CVE-2023-52717, CVE-2022-48286, CVE-2023-39389, CVE-2023-52109, CVE-2022-44560, CVE-2024-32996, CVE-2023-41301, CVE-2024-54098, CVE-2022-48358, CVE-2023-46763, CVE-2022-48290, CVE-2023-41304, CVE-2023-49239, CVE-2023-26547, CVE-2023-52101, CVE-2023-41293, CVE-2023-52113, CVE-2022-44561, CVE-2023-1695, CVE-2023-6273, CVE-2023-41310, CVE-2024-42033, CVE-2023-1692, CVE-2023-44100, CVE-2024-30415, CVE-2023-52377, CVE-2023-52954, CVE-2023-49247, CVE-2023-52387, CVE-2024-47294, CVE-2024-51529, CVE-2023-52380, CVE-2022-48346, CVE-2022-48349, CVE-2023-41302, CVE-2023-39381, CVE-2023-1694, CVE-2024-32991, CVE-2022-48347, CVE-2024-51527, CVE-2022-48292, CVE-2024-42039, CVE-2023-1696, CVE-2021-46856, CVE-2024-36502, CVE-2023-52103, CVE-2022-44548, CVE-2023-41305, CVE-2023-39384, CVE-2023-41300, CVE-2023-39401, CVE-2022-44553, CVE-2023-52112, CVE-2023-41295, CVE-2022-44556, CVE-2023-44115, CVE-2023-46765, CVE-2024-32993, CVE-2023-44096, CVE-2022-48298, CVE-2022-48301, CVE-2023-1691, CVE-2024-45446, CVE-2023-52384, CVE-2023-39409, CVE-2024-42034, CVE-2023-52542, CVE-2024-54099, CVE-2023-44113, CVE-2024-47293, CVE-2023-26548, CVE-2023-49245, CVE-2023-44108, CVE-2023-39380, CVE-2023-44095, CVE-2023-52713, CVE-2023-52386, CVE-2023-52544, CVE-2023-46770, CVE-2023-41309, CVE-2022-48606, CVE-2022-48289, CVE-2024-30414, CVE-2023-52539, CVE-2024-58043, CVE-2023-49248, CVE-2023-52116, CVE-2023-52099, CVE-2023-52378, CVE-2023-37242, CVE-2023-46771, CVE-2025-31175, CVE-2024-32997, CVE-2023-39385, CVE-2023-52541, CVE-2023-39406, CVE-2024-56442, CVE-2023-49243, CVE-2023-39404, CVE-2023-44117, CVE-2024-36499, CVE-2023-44106, CVE-2024-27897, CVE-2023-52552, CVE-2023-41299, CVE-2024-56440, CVE-2022-44557, CVE-2023-52383, CVE-2022-41591, CVE-2023-52540, CVE-2023-39408, CVE-2024-51530, CVE-2023-39390, CVE-2024-56449, CVE-2023-41303, CVE-2023-52543, CVE-2023-49244, CVE-2022-48288, CVE-2023-52098, CVE-2022-48313, CVE-2024-47292, CVE-2023-52376, CVE-2022-48348
heuristics/extracted_sars ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ALC_DEL.1, ASE_OBJ.2, ALC_FLR.1, ATE_COV.1, ALC_CMS.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 ALC_FLR.3, AGD_OPE.1
heuristics/extracted_versions - 3.0
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 10.10.2018
  • developer: Rubrik, Inc.
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-112
    • certification_date: 10.10.2018
    • description: Rubrik delivers backup, instant recovery, replication, and archival in one, infinitely scalable fabric. Rubrik Cloud Data Management collapses physically separate hardware and software resources' like backup software, replication, storage, and catalogs' into a single fabric that scales up to thousands of nodes.
    • developer: Rubrik, Inc.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135349-1607953899/SERTIT/Sertifikater/2018/112/20181010%20Sertit-112%20C%20v1_0Rubrik.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135343-1607953893/SERTIT/Sertifikater/2018/112/ST_Rubrik_Cloud_Data_Management_v.1.2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135346-1607953896/SERTIT/Sertifikater/2018/112/20181010%20Sertit-112%20CR%20v1_0Rubrik.pdf'})]})
    • evaluation_facility: Advanced Data Security
    • expiration_date: 10.10.2023
    • level: EAL 2, ALC_FLR.1
    • mutual_recognition: CCRA
    • product: Version 4.1.2
  • product: Rubrik Cloud Data Management
  • url: https://sertit.no/certified-products/product-archive/rubrik-cloud-data-management
pdf_data/cert_filename 20181010 Sertit-112 C v1_0Rubrik.pdf nscib-cc-23-0531255-cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NO:
    • SERTIT-112: 2
  • NL:
    • CC-23-0531255: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR.3: 3
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • ADS:
    • Advanced Data Security: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • pdf_file_size_bytes: 739787
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 20181010 Sertit-112 CR v1_0Rubrik.pdf nscib-cc-23-0531255-cr.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-112: 18
  • NL:
    • NSCIB-CC-0531255-CR: 11
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 21
    • EAL 2 augmented: 19
    • EAL1: 1
    • EAL2: 2
    • EAL7: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 22
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • R:
    • R.C: 3
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
pdf_data/report_keywords/eval_facility
  • ADS:
    • Advanced Data Security: 1
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 8
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: ragea
  • /CreationDate: D:20181011122907Z00'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: ugradert
  • /ModDate: D:20181011122907Z00'00'
  • /Producer: macOS Version 10.14 (Build 18A391) Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 1215510
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename ST_Rubrik_Cloud_Data_Management_v.1.2.pdf nscib-cc-23-0531255-st_v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 5
    • EAL2 augmented: 4
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXT.1: 14
    • FAU_GEN_EXT.1.1: 1
    • FAU_GEN_EXT.1.2: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA: 1
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
    • FMT_SMR.2: 9
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSICAL: 2
    • A.TRUSTED_ADMIN: 2
  • O:
    • O.ACCESS: 8
    • O.AUDIT: 7
    • O.CRYPTOGRAPHY: 7
    • O.MANAGE: 8
    • O.PROTECTION: 7
  • OE:
    • OE.PHYSICAL: 3
    • OE.TRUSTED_ADMIN: 7
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 5
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 17
  • TLS:
    • TLS:
      • TLS: 15
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • SCA:
    • side-channel: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-4: 2
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 5
  • NIST:
    • NIST SP 800-135: 6
    • SP 800-135: 1
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
  • /Author: Admin
  • /CreationDate: D:20180913204704-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20180913204704-07'00'
  • /Producer: GPL Ghostscript 8.64
  • /Title: Microsoft Word - ST Rubrik Cloud Data Management v.1.2.docx
  • pdf_file_size_bytes: 514543
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different