| name |
Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) v6.9.1c |
Virtual Machine of ID Motion V1 G231 mask with AMD 122v1 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
FR |
| status |
archived |
archived |
| not_valid_after |
14.12.2021 |
01.09.2019 |
| not_valid_before |
14.12.2016 |
29.03.2013 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C076-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_11_fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HPE%20ArcSight%20ESM%20ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible-2013_11en.pdf |
| manufacturer |
Hewlett Packard Enterprise |
Gemalto / Trusted Labs |
| manufacturer_web |
https://www.hpe.com/ |
https://www.gemalto.com |
| security_level |
EAL2 |
EAL7 |
| dgst |
e77512aeb71ff153 |
32f420aa3f6ca59c |
| heuristics/cert_id |
ISCB-5-RPT-C076-CR-v1 |
ANSSI-CC-2013/11 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p1:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p3:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p2:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2017-13986, CVE-2017-14356, CVE-2017-13990, CVE-2017-13988, CVE-2017-13987, CVE-2017-14357, CVE-2017-14358, CVE-2017-13991, CVE-2017-13989 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ATE_FUN.2, ALC_DVS.2, ADV_IMP.2, ALC_CMC.5, AVA_VAN.5, ATE_COV.3, ADV_COMP.1, ADV_INT.3, ATE_DPT.4, ALC_TAT.3, ALC_LCD.2, ADV_FSP.6, ADV_SPM.1, ADV_TDS.6 |
| heuristics/extracted_versions |
6.9.1 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/85 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2012/85, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012 |
| heuristics/scheme_data |
- cert_no: 2016-005-C076
- certification_date: 14.12.2016
- developer: Hewlett Packard Enterprise (HPE)
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C076
- certification_date: 14.12.2016
- developer: Lee IvyEngineering Director, ArcSightHewlett Packard Enterprise Security Products [email protected]: 650-265-3457Mobile: 408-386-17001160 Enterprise Way (Moffett Towers Building G, 7th Floor),Sunnyvale CA 94089
- expiration_date: 14.12.2021
- mutual_recognition: CCRA
- product: Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/ISCB-5-RPT-C076-CR-v1.pdf
- scope: ArcSight ESM is a Security Information and Event Management (SIEM) solution that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early. It is able to concentrate, normalize, analyze, and report the results of its analysis of security event data generated by various Intrusion Detection System (IDS) sensors and scanners in the operational environment. ArcSight ESM provides authorized users with capabilities to monitor events, correlate events for in-depth investigation and analysis, and resolve events with automated escalation procedures and actions. The following security functions are implemented by the TOE: Security Audit Identification adn Authentication Security Management Protection of the TSF Trusted Path/Channels Intrusion Detection System
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/HPE%20ArcSight%20ESM%20ST.pdf
- type: Security Information and Event Management (SIEM)
- expiration_date: 14.12.2021
- level: EAL2
- product: Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/110
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C076-CR-v1.pdf |
ANSSI-CC-2013_11_fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C076-CR-v1: 29
|
- FR:
- ANSSI-CC-2012/85: 5
- ANSSI-CC-2013/11: 18
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 3
- EAL4: 2
- EAL7: 2
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2.1: 1
- FAU_SAR.3.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FIA:
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTP:
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS v1.0: 1
- TLS v1.1: 1
- TLS v1.2: 1
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author: torno
- /CreationDate: D:20130304090501+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20130304090501+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: ANSSI-CC-2013_11_fr
- pdf_file_size_bytes: 166636
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
| pdf_data/st_filename |
HPE ArcSight ESM ST.pdf |
anssi-cc-cible-2013_11en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0606-2010: 8
- BSI-DSZ-CC-0640-2010: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.2: 11
- ADV_TDS: 1
- ADV_TDS.1: 11
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 8
- ALC_CMS: 1
- ALC_CMS.2: 6
- ALC_DEL: 1
- ALC_DEL.1: 5
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 14
- ASE_ECD: 1
- ASE_ECD.1: 10
- ASE_INT: 1
- ASE_INT.1: 12
- ASE_OBJ: 1
- ASE_OBJ.2: 10
- ASE_REQ: 1
- ASE_REQ.2: 13
- ASE_SPD: 1
- ASE_SPD.1: 7
- ASE_TSS: 1
- ASE_TSS.1: 5
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 8
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- ADV_COMP.1: 1
- ADV_FSP.6: 2
- ADV_IMP.2: 2
- ADV_INT.3: 2
- ADV_SPM.1: 2
- ADV_TDS.6: 2
- ALC:
- ALC_CMC.5: 2
- ALC_DVS.2: 2
- ALC_LCD.2: 2
- ALC_TAT.3: 2
- ATE:
- ATE_COV.3: 2
- ATE_DPT.4: 2
- ATE_FUN.2: 2
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 9
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG: 3
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 2
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 3
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_STM.1: 3
- FTA:
- FTA_SSL: 3
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 4
- FAU_ARP.1.1: 1
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 4
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 9
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 3
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 4
- FRU_RSA.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.MANAGE: 2
- A.PLATFORM: 2
- A.PROTECT: 3
- O:
- O.ANALYZER: 7
- O.AUDIT: 5
- O.AUDIT_REVIEW: 4
- O.I_AND_A: 4
- O.PASSWORD_CONTROLS: 4
- O.PROTECTED: 1
- O.PROTECTED_COMMS: 2
- O.RESPONSE: 4
- O.REVIEW: 3
- O.SECURITY_MANAGEMENT: 4
- O.STORAGE: 3
- O.THROTTLE: 4
- OE:
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- OE.PLATFORM: 2
- OE.SENSORS: 3
- OE.TIME: 3
- T:
- T.BRUTE_FORCE: 3
- T.INTEGRITY_COMPROMISE: 2
- T.NETWORK_COMPROMISE: 3
- T.NO_ACCOUNTABILITY: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACTIVITY: 3
- T.UNDETECTED_THREATS: 2
|
- A:
- A.APPLI_CONT: 1
- A.CIPHER: 1
- A.CLON: 1
- A.DECIPHER: 1
- A.DIS_MEMORY: 1
- A.LOAD: 2
- A.MOD_MEMORY: 1
- A.OPERATE: 1
- A.REMOVE: 1
- A.SECURITY: 2
- A.SIDE: 1
- A.TAMPER_ES: 2
- O:
- O.APPLI_DEV: 3
- O.CIPHER: 1
- O.DECIPHER: 1
- O.DEV_DIS_ES: 4
- O.DLV_DATA: 4
- O.EFECT_REMOVE: 1
- O.EFFECT_LOAD: 3
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_ACS: 3
- O.LOAD: 2
- O.REMOVE: 1
- O.RESOURCE: 3
- O.RND: 1
- O.ROLLBACK: 2
- O.SAMPLE_ACS: 1
- O.SECURITY: 1
- O.SEGREGATE: 3
- O.SIDE: 3
- O.TAMPER_ES: 5
- OSP:
- OSP.CIPHER: 1
- OSP.CONF-ALU: 1
- T:
- T.APP_CORR: 3
- T.APP_DISC: 3
- T.APP_MOD: 4
- T.APP_READ: 3
- T.APP_REMOVE: 4
- T.DEL_REMOVE: 4
- T.DIS_DATA: 6
- T.DIS_TEST_ES: 2
- T.ERR_REMOVE: 3
- T.LOAD_APP: 4
- T.LOAD_MAN: 2
- T.LOAD_MOD: 2
- T.LOAD_OTHER: 2
- T.MOD: 2
- T.MOD_DATA: 4
- T.MOD_EXE: 4
- T.MOD_LOAD: 2
- T.MOD_SHARE: 2
- T.MOD_TSF: 3
- T.RESOURCES: 2
- T.RND: 1
- T.T_CMD: 4
- T.T_ES: 2
- T.T_TOOLS: 2
|
| pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies: 5
- Thales:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 6
- TLS v1.0: 4
- TLS v1.1: 4
- TLS v1.2: 2
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.5.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
- out of scope: 3
- the other subsystems of the MULTOS OS and some following ROMed applications (these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA) v1.0: 1
- these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
|
| pdf_data/st_metadata |
- /Author: Apted, Tony J. [RA]
- /CreationDate: D:20161215092549+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20161215092549+00'00'
- /Subject: Security Target
- /Title: HPE ArcSight ESM
- pdf_file_size_bytes: 1391138
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |