| name |
Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) v6.9.1c |
bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 ControlSoftware |
| category |
Network and Network-Related Devices and Systems |
Multi-Function Devices |
| scheme |
MY |
JP |
| status |
archived |
archived |
| not_valid_after |
14.12.2021 |
28.12.2010 |
| not_valid_before |
14.12.2016 |
26.11.2007 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C076-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0126_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HPE%20ArcSight%20ESM%20ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0126_est.pdf |
| manufacturer |
Hewlett Packard Enterprise |
Konica Minolta Business Technologies, Inc |
| manufacturer_web |
https://www.hpe.com/ |
https://www.konicaminolta.com/ |
| security_level |
EAL2 |
EAL3 |
| dgst |
e77512aeb71ff153 |
060aadeb6ceeb09c |
| heuristics/cert_id |
ISCB-5-RPT-C076-CR-v1 |
JISEC-CC-CRP-C0126 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p1:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p3:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p2:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2017-13986, CVE-2017-14356, CVE-2017-13990, CVE-2017-13988, CVE-2017-13987, CVE-2017-14357, CVE-2017-14358, CVE-2017-13991, CVE-2017-13989 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
6.9.1 |
203, 253 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2016-005-C076
- certification_date: 14.12.2016
- developer: Hewlett Packard Enterprise (HPE)
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C076
- certification_date: 14.12.2016
- developer: Lee IvyEngineering Director, ArcSightHewlett Packard Enterprise Security Products [email protected]: 650-265-3457Mobile: 408-386-17001160 Enterprise Way (Moffett Towers Building G, 7th Floor),Sunnyvale CA 94089
- expiration_date: 14.12.2021
- mutual_recognition: CCRA
- product: Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/ISCB-5-RPT-C076-CR-v1.pdf
- scope: ArcSight ESM is a Security Information and Event Management (SIEM) solution that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early. It is able to concentrate, normalize, analyze, and report the results of its analysis of security event data generated by various Intrusion Detection System (IDS) sensors and scanners in the operational environment. ArcSight ESM provides authorized users with capabilities to monitor events, correlate events for in-depth investigation and analysis, and resolve events with automated escalation procedures and actions. The following security functions are implemented by the TOE: Security Audit Identification adn Authentication Security Management Protection of the TSF Trusted Path/Channels Intrusion Detection System
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/HPE%20ArcSight%20ESM%20ST.pdf
- type: Security Information and Event Management (SIEM)
- expiration_date: 14.12.2021
- level: EAL2
- product: Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/110
|
- cert_id: JISEC-CC-CRP-C0126
- certification_date: 01.11.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0126_eimg.pdf
- description: PRODUCT DESCRIPTION This product is the embedded software that is installed on the Konica Minolta Business Technologies, Inc. digital MFP (bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203)(Hereinafter referred to as “MFP”). This product offers the protection from exposure of the highly confidential document stored in the MFP, and aims at protecting the data which may be exposed against a user's intention. In order to realize it, this offers the functions such as the function that limits the operation to the specific document only to the authorized user, the function that performs the overwrite deletion of the data domain which became unnecessary and the function that deletes the confidential information including a setting value. Moreover , this has the mechanism using the unauthorized access protection function (HDD Lock Function) with which HDD is equipped against the risk of taking out HDD unjustly which is a medium for storing image data in MFP. If the encryption board, an option product, is installed in the MFP controller, this provides the function of generating the encryption key that encrypts all data including image data written to the HDD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software (Japanese Name) bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software (English Name)
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0126_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0126_est.pdf
- toe_version: A02E0Y0-0100-GN0-02
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software A02E0Y0-0100-GN0-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0126_it7141.html
- toe_overseas_name: bizhub C253 / bizhub C203 / ineo+ 253 / ineo+ 203 Control Software A02E0Y0-0100-GN0-02
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C076-CR-v1.pdf |
20080306_c0126_erpt.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C076-CR-v1: 29
|
- JP:
- CRP-C0126-01: 1
- Certification No. C0126: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2.1: 1
- FAU_SAR.3.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FIA:
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTP:
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVER: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC: 1
- T.ACCESS-SECURE-PRINT: 1
- T.BACKUP: 1
- T.BRING-OUT: 1
- T.DISCARD-MFP: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS v1.0: 1
- TLS v1.1: 1
- TLS v1.2: 1
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS 180-1: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 203) (Hereinafter referred to as “MFP”). This TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
|
| pdf_data/report_metadata |
|
- /CreationDate: D:20080305165317+09'00'
- /ModDate: D:20080305165317+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 309885
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
| pdf_data/st_filename |
HPE ArcSight ESM ST.pdf |
20080306_c0126_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.2: 11
- ADV_TDS: 1
- ADV_TDS.1: 11
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 8
- ALC_CMS: 1
- ALC_CMS.2: 6
- ALC_DEL: 1
- ALC_DEL.1: 5
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 14
- ASE_ECD: 1
- ASE_ECD.1: 10
- ASE_INT: 1
- ASE_INT.1: 12
- ASE_OBJ: 1
- ASE_OBJ.2: 10
- ASE_REQ: 1
- ASE_REQ.2: 13
- ASE_SPD: 1
- ASE_SPD.1: 7
- ASE_TSS: 1
- ASE_TSS.1: 5
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 8
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 9
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG: 3
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 2
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 3
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_STM.1: 3
- FTA:
- FTA_SSL: 3
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 50
- FDP_ACC.1.1: 3
- FDP_ACF: 3
- FDP_ACF.1: 48
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 3
- FDP_IFC.1: 3
- FDP_ITC: 1
- FDP_ITC.1: 5
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 87
- FIA_AFL.1.1: 9
- FIA_AFL.1.2: 9
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_NEW.1: 12
- FIA_NEW.1.1: 1
- FIA_NEW.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 67
- FIA_SOS.1.1: 7
- FIA_SOS.2: 11
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 11
- FIA_UAU.1: 17
- FIA_UAU.2: 119
- FIA_UAU.2.1: 7
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UAU.7: 17
- FIA_UAU.7.1: 2
- FIA_UID: 16
- FIA_UID.1: 21
- FIA_UID.2: 62
- FIA_UID.2.1: 7
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_CKM.1: 1
- FMT_MAS.1: 1
- FMT_MOF.1: 111
- FMT_MOF.1.1: 3
- FMT_MSA: 12
- FMT_MSA.1: 34
- FMT_MSA.1.1: 3
- FMT_MSA.2: 4
- FMT_MSA.3: 22
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 3
- FMT_MTD.1: 191
- FMT_MTD.1.1: 13
- FMT_SMF: 19
- FMT_SMF.1: 41
- FMT_SMF.1.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 112
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FPT:
- FPT_RVM.1: 19
- FPT_RVM.1.1: 1
- FPT_SEP.1: 13
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.MANAGE: 2
- A.PLATFORM: 2
- A.PROTECT: 3
- O:
- O.ANALYZER: 7
- O.AUDIT: 5
- O.AUDIT_REVIEW: 4
- O.I_AND_A: 4
- O.PASSWORD_CONTROLS: 4
- O.PROTECTED: 1
- O.PROTECTED_COMMS: 2
- O.RESPONSE: 4
- O.REVIEW: 3
- O.SECURITY_MANAGEMENT: 4
- O.STORAGE: 3
- O.THROTTLE: 4
- OE:
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- OE.PLATFORM: 2
- OE.SENSORS: 3
- OE.TIME: 3
- T:
- T.BRUTE_FORCE: 3
- T.INTEGRITY_COMPROMISE: 2
- T.NETWORK_COMPROMISE: 3
- T.NO_ACCOUNTABILITY: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACTIVITY: 3
- T.UNDETECTED_THREATS: 2
|
- A:
- A.ADMIN: 1
- A.NETWORK: 2
- A.SERVER: 1
- A.SETTING: 1
- O:
- O.CHECK-HDD: 5
- O.CONFIG: 9
- O.CRYPT-KEY: 1
- O.CRYPTO-MAIL: 6
- O.GROUP-BOX: 4
- O.OVERWRITE-ALL: 5
- O.PRIVATE-BOX: 3
- O.PUBLIC-BOX: 6
- O.REGISTERED-USER: 12
- O.SECURE-PRINT: 6
- O.TRUSTED-PASS: 3
- OE:
- OE.CRYPT: 5
- OE.FEED-BACK: 12
- OE.LOCK-HDD: 1
- OE.SESSION: 1
- T:
- T.ACCESS-GROUP-BOX: 2
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-SETTING: 1
- T.BACKUP-RESTORE: 1
- T.DISCARD-MFP: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 6
- TLS v1.0: 4
- TLS v1.1: 4
- TLS v1.2: 2
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-1: 2
- FIPS 186: 4
- FIPS 186-1: 2
- FIPS PUB 197: 5
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- functions that are realized by the TOE. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can encrypt the image data written in HDD for the danger of taking: 1
|
| pdf_data/st_metadata |
- /Author: Apted, Tony J. [RA]
- /CreationDate: D:20161215092549+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20161215092549+00'00'
- /Subject: Security Target
- /Title: HPE ArcSight ESM
- pdf_file_size_bytes: 1391138
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author:
- /Company:
- /CreationDate: D:20080304171807+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0
- /ModDate: D:20080304171946+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: Microsoft Word - 【C0126】Thames2_英文ST-1.03-080304.doc
- /_AdHocReviewCycleID: -1264862075
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: megumi tanabe
- /_EmailSubject: 【Mosel ISO15408】 ST翻訳確認のお願い
- pdf_file_size_bytes: 927101
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 131
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |