| name |
RSA Adaptive Authentication System v6.0.2.1 with Service Pack 1 |
Oracle Enterprise Linux Version 5 Update 1 |
| category |
Access Control Devices and Systems |
Operating Systems |
| scheme |
CA |
DE |
| status |
archived |
archived |
| not_valid_after |
28.09.2015 |
01.09.2019 |
| not_valid_before |
10.02.2009 |
15.10.2008 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rsa-adaptive-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0481a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rsa-adaptive-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0481b.pdf |
| manufacturer |
RSA, The Security Division of EMC |
Oracle Corporation |
| manufacturer_web |
https://www.rsa.com/ |
https://www.oracle.com |
| security_level |
EAL2+, ALC_FLR.1 |
EAL4+, ALC_FLR.3 |
| dgst |
e4169ab5825780d2 |
f13f26271d047c8f |
| heuristics/cert_id |
383-4-96 |
BSI-DSZ-CC-0481-2008 |
| heuristics/cert_lab |
CANADA |
BSI |
| heuristics/cpe_matches |
{} |
cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*, cpe:2.3:o:oracle:linux:5:9:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2015-3195, CVE-2014-1737, CVE-2016-5387, CVE-2014-6271, CVE-2014-9584, CVE-2016-3710, CVE-2015-0239, CVE-2013-7421, CVE-2014-1738, CVE-2014-0203, CVE-2014-7169, CVE-2015-0235, CVE-2011-2306, CVE-2016-2182, CVE-2014-9644, CVE-2016-5403, CVE-2014-3153, CVE-2016-2178, CVE-2014-3673, CVE-2016-3427, CVE-2016-2177, CVE-2014-3687, CVE-2014-2678 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_FSP.2, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, ALC_FLR.1, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 |
AVA_MSU.2, ALC_FLR.3, ATE_FUN.1, ADV_RCR.1, ADV_LLD.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ADV_IMP.1, ALC_LCD.1, ADV_HLD.2, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ADV_SPM.1 |
| heuristics/extracted_versions |
6.0.2.1 |
5, 1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0427-2007 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0427-2007 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0766-2012, BSI-DSZ-CC-0765-2012 |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0766-2012, BSI-DSZ-CC-0765-2012 |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
rsa-adaptive-cert-eng.pdf |
0481a.pdf |
| pdf_data/report_frontpage |
- DE:
- CA:
- cert_id: 383-4-96-CR
- cert_lab: CANADA
|
- DE:
- cert_id: BSI-DSZ-CC-0481-2008
- cert_item: Oracle Enterprise Linux Version 5 Update 1
- cert_lab: BSI
- developer: Oracle Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- CA:
|
| pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-96: 1
- 383-4-96-CR: 1
|
- DE:
- BSI-DSZ-CC-0427-2007: 4
- BSI-DSZ-CC-0481-2008: 19
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 2
- EAL 2+: 4
|
- EAL:
- EAL 1: 1
- EAL 4: 3
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 1
- EAL4+: 2
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.3: 5
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 14: 1
- AIS 32: 1
- AIS 34: 2
- AIS19: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report Oracle Enterprise Linux 5 Update 1, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, 7 July 2008, SVN logs for EL 5.1 x86-64 security evaluation: 1
|
| pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: User
- /CC Version: 3.1 R2
- /CC date: September 2007
- /CEM Version: 3.1 R2
- /CEM date: September 2007
- /CR_Date: 10 February 2009
- /CR_Version: 1.1
- /Client City: Herzlia
- /Client Country: Israel
- /Client Full Name: RSA® The Security Division of EMC
- /Client Postal Code: 46733
- /Client Short Name: RSA
- /Client State:
- /Client Street: 7 Shenkar Street, 4th floor
- /CreationDate: D:20090212071323-05'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: RSA, The Security Division of EMC
- /Developer Short Name: RSA
- /EAL Level: 2+
- /EAL Level Base: 2
- /EAL Long: EAL 2 Augmented
- /EAL Short: EAL 2+
- /ETPlan_Doc#: 1589-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 1.0
- /ETPlan_date: 24 November 2008
- /ETProcRes_Date: 8 December 2008
- /ETProcRes_Doc#: 1589-000-D005
- /ETProcRes_Title: Evaluation Test Procedure and Results
- /ETProcRes_Version: 1.1
- /ETProc_Date: [dd month yyyy]
- /ETProc_Doc#: [1xxx-000-D004]
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.x]
- /ETReport_Date: 19 January 2009
- /ETReport_Doc#: 1589-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: 1.4
- /EWP_Date: 15 April 2008
- /EWP_Doc#: 1589-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.1
- /Eval number: 383-4-96
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: [dd month yyyy (registration)]
- /ModDate: D:20090312092421-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectNumber: 1589
- /ST_Date: 4 February 2009
- /ST_Title: RSA®, The Security Division of EMC, RSA Adaptive Authentication System v6.0.2.1 with Service Pack 1 Security Target
- /ST_Version: 1.0
- /SVR_Date: 11 September 2008
- /SVR_Doc#: 1589-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Herzlia
- /Security Classification: EWA-Canada & EMC/RSA Proprietary
- /SourceModified: D:20090212121247
- /Sponsor: RSA, The Security Division of EMC
- /Sponsor City: Hopkinton
- /Sponsor Country: USA
- /Sponsor Postal Code: 01748
- /Sponsor State: Massachusetts
- /Sponsor Street: 176 South Street
- /TOE: RSA Adaptive Authentication System Version 6.0.2.1 with Service Pack 1
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: RSA Adaptive Authentication System
- /TOE Short with version: RSA AA v6.0.2.1 SP1
- /TOE Short-NoTM: RSA AA
- /TOE Version: 6.0.2.1 SP1
- /TOE with version: RSA Adaptive Authentication System v6.0.2.1 Service Pack 1
- /TOE-NoTM: [TOE Name, no version, no trademarks]
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 127448
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20081106141556+01'00'
- /Creator: Writer
- /Keywords: "Oracle Enterprise LinuxVersion 5 Update 1, Oracle Corporation, BSI-DSZ-CC-0481-2008"
- /ModDate: D:20081107123841+01'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0481-2008
- pdf_file_size_bytes: 768415
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
| pdf_data/st_filename |
rsa-adaptive-sec-eng.pdf |
0481b.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 1
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL3: 1
- EAL4: 6
- EAL4 augmented: 3
- EAL4+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 5
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 6
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.3: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 1
- FAU_GEN: 4
- FAU_SAA: 2
- FDP:
- FDP_ACC.1: 29
- FDP_ACC.1.1: 2
- FDP_ACF.1: 19
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ETC.1: 11
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 11
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FIA:
- FIA_ATD.1: 14
- FIA_ATD.1.1: 2
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 2
- FMT_MSA.1: 24
- FMT_MSA.1.1: 3
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 24
- FMT_MTD.1.1: 3
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
|
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 12
- FAU_SAR.2.1: 1
- FAU_SAR.3: 11
- FAU_SAR.3.1: 1
- FAU_SEL.1: 12
- FAU_SEL.1.1: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 11
- FAU_STG.3.1: 1
- FAU_STG.4: 11
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 19
- FCS_CKM.1.1: 3
- FCS_CKM.2: 19
- FCS_CKM.2.1: 4
- FCS_CKM.4: 4
- FCS_COP.1: 19
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 39
- FDP_ACC.1.1: 3
- FDP_ACF.1: 31
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 3
- FDP_ETC: 1
- FDP_ETC.1: 9
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 10
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 16
- FDP_IFC.1.1: 1
- FDP_IFF.1: 4
- FDP_IFF.2: 10
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 1
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_IFF.2.7: 1
- FDP_ITC: 1
- FDP_ITC.1: 11
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 11
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_MSA.3: 1
- FDP_RIP.2: 14
- FDP_RIP.2.1: 1
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT.1: 11
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_ATD.1: 17
- FIA_ATD.1.1: 1
- FIA_SOS.1: 14
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 11
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 5
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 27
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 40
- FMT_MSA.1.1: 6
- FMT_MSA.2: 16
- FMT_MSA.2.1: 1
- FMT_MSA.3: 38
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 4
- FMT_MTD.1: 69
- FMT_MTD.1.1: 6
- FMT_MTD.3: 11
- FMT_MTD.3.1: 1
- FMT_REV.1: 29
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF: 2
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.2: 24
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_AMT.1: 10
- FPT_AMT.1.1: 1
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_RCV: 1
- FPT_RCV.1: 10
- FPT_RCV.1.1: 1
- FPT_RCV.4: 9
- FPT_RCV.4.1: 1
- FPT_RVM.1: 14
- FPT_RVM.1.1: 1
- FPT_SEP.1: 18
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TDC.1: 12
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_LSA.1: 10
- FTA_LSA.1.1: 1
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.AUDIT: 3
- A.INSTALL: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NETCON: 3
- A.NOEVIL: 3
- A.PROTECT: 3
- A.TIMESTAMP: 3
- O:
- O.ADMIN: 24
- O.ADMIN_AUTH: 23
- O.ENDUSER: 9
- O.ENDUSER_AUTH: 12
- O.MONITOR: 9
- O.RECOMMEND: 12
- O.RISK_FACTOR: 7
- OE:
- OE.AUDIT: 5
- OE.NETWORK: 3
- OE.PLATFORM: 7
- OE.PROTECT: 11
- OE.SECURE_COMMS: 9
- OE.TIME: 7
- T:
- T.DOS: 3
- T.FRAUD: 3
- T.MASQUERADE: 3
- T.TAMPERING: 3
- T.UNAUTH: 3
|
- A:
- A.ACCESS: 3
- A.ASSET: 3
- A.CLEARANCE: 3
- A.CONNECT: 7
- A.COOP: 3
- A.LOCATE: 3
- A.MANAGE: 5
- A.NET_COMP: 5
- A.NO_EVIL_ADMIN: 4
- A.OWNER: 3
- A.PEER: 3
- A.PROTECT: 5
- A.SENSITIVITY: 3
- A.UTRAIN: 3
- A.UTRUST: 3
- O:
- O.AUDITING: 19
- O.AUTHORIZATION: 18
- O.COMPROT: 23
- O.DISCRETIONARY_ACCESS: 15
- O.DUTY: 7
- O.ENFORCEMENT: 12
- O.HIERARCHICAL: 7
- O.MANAGE: 33
- O.MANDATORY_ACCESS: 18
- O.RESIDUAL_INFO: 9
- O.RESIDUAL_INFORMATION: 1
- O.ROLE: 21
- OE:
- OE.ADMIN: 7
- OE.CREDEN: 4
- OE.HW_SEP: 8
- OE.INFO_PROTECT: 20
- OE.INSTALL: 12
- OE.MAINTENANCE: 5
- OE.PHYSICAL: 8
- OE.PROTECT: 10
- OE.RECOVER: 8
- OE.SERIAL_LOGIN: 4
- OE.SOFTWARE_IN: 5
- T:
- T.ACCESS: 4
- T.COMPROT: 3
- T.OPERATE: 3
- T.ROLEDEV: 5
- T.UAUSER: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- outside of the TOE, such as the hypervisor’s enforcement of separation between guest VMs, is out of scope for this Security Target. 2.4.3 TOE Environment Several TOE systems may be interlinked in a network: 1
|
| pdf_data/st_metadata |
- /Author: Darryl H. Johnson
- /CreationDate: D:20090204170557Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090219112655-05'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: RSA Adaptive Authentication System v6.0.2.1 with Service Pack 1
- /Title: Security Target
- pdf_file_size_bytes: 947595
- pdf_hyperlinks: http://www.corsec.com/, http://www.rsa.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |