| name |
Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) v6.9.1c |
Sm@rtCafé® Expert 7.0 C3 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
DE |
| status |
archived |
archived |
| not_valid_after |
14.12.2021 |
08.09.2022 |
| not_valid_before |
14.12.2016 |
08.09.2017 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C076-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1028a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HPE%20ArcSight%20ESM%20ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1028b_pdf.pdf |
| manufacturer |
Hewlett Packard Enterprise |
Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
| manufacturer_web |
https://www.hpe.com/ |
https://www.veridos.com |
| security_level |
EAL2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
e77512aeb71ff153 |
953eb4fe5ff4c446 |
| heuristics/cert_id |
ISCB-5-RPT-C076-CR-v1 |
BSI-DSZ-CC-1028-2017 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p1:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p3:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p2:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2017-13986, CVE-2017-14356, CVE-2017-13990, CVE-2017-13988, CVE-2017-13987, CVE-2017-14357, CVE-2017-14358, CVE-2017-13991, CVE-2017-13989 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ASE_INT.2, ATE_IND.3, ASE_ECD.1, ALC_FLR.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
6.9.1 |
7.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1091-2018, BSI-DSZ-CC-1092-2020, BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-1090-2018, BSI-DSZ-CC-1084-2019 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0868-2014, BSI-DSZ-CC-0951-2015 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1091-2018, BSI-DSZ-CC-1092-2020, BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-1090-2018, BSI-DSZ-CC-1084-2019 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0868-2014, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0951-2015 |
| heuristics/scheme_data |
- cert_no: 2016-005-C076
- certification_date: 14.12.2016
- developer: Hewlett Packard Enterprise (HPE)
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C076
- certification_date: 14.12.2016
- developer: Lee IvyEngineering Director, ArcSightHewlett Packard Enterprise Security Products [email protected]: 650-265-3457Mobile: 408-386-17001160 Enterprise Way (Moffett Towers Building G, 7th Floor),Sunnyvale CA 94089
- expiration_date: 14.12.2021
- mutual_recognition: CCRA
- product: Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/ISCB-5-RPT-C076-CR-v1.pdf
- scope: ArcSight ESM is a Security Information and Event Management (SIEM) solution that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early. It is able to concentrate, normalize, analyze, and report the results of its analysis of security event data generated by various Intrusion Detection System (IDS) sensors and scanners in the operational environment. ArcSight ESM provides authorized users with capabilities to monitor events, correlate events for in-depth investigation and analysis, and resolve events with automated escalation procedures and actions. The following security functions are implemented by the TOE: Security Audit Identification adn Authentication Security Management Protection of the TSF Trusted Path/Channels Intrusion Detection System
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/HPE%20ArcSight%20ESM%20ST.pdf
- type: Security Information and Event Management (SIEM)
- expiration_date: 14.12.2021
- level: EAL2
- product: Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/110
|
|
| heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1090-2018, BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-1091-2018 |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0951-2015 |
| heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-1091-2018, BSI-DSZ-CC-1090-2018 |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0951-2015 |
| heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C076-CR-v1.pdf |
1028a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1028-2017
- cert_item: Sm@rtCafé® Expert 7.0 C3
- cert_lab: BSI
- developer: Veridos GmbH - Identity Solutions by G&D BDR
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C076-CR-v1: 29
|
- DE:
- BSI-DSZ-CC-0868-2014: 1
- BSI-DSZ-CC-0868-2014-MA-01: 1
- BSI-DSZ-CC-0951-: 1
- BSI-DSZ-CC-0951-2015: 3
- BSI-DSZ-CC-0951-2015-RA-01: 2
- BSI-DSZ-CC-1028-2017: 27
- FR:
- ANSSI-CC-PP-2010/03-M01: 4
- NL:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 4
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 6
- EAL 3: 4
- EAL 4: 7
- EAL 5: 14
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 3
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 2
- ATE_COV.1: 1
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 2
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 3
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2.1: 1
- FAU_SAR.3.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FIA:
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTP:
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 11
- Giesecke & Devrient: 7
- Giesecke+Devrient: 4
- Infineon:
- Infineon: 4
- Infineon Technologies AG: 4
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
- TÜViT: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS v1.0: 1
- TLS v1.1: 1
- TLS v1.2: 1
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- malfunction: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
- BSI TR-02102-1: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- AIS 1: 1
- AIS 20: 2
- AIS 25: 3
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 7
- AIS 37: 1
- AIS 38: 1
- AIS 46: 2
- AIS 47: 1
- FIPS:
- FIPS 197: 5
- FIPS 46-3: 10
- FIPS PUB 180-4: 1
- FIPS180-4: 14
- FIPS197: 1
- FIPS46-3: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- ISO/IEC9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 3447: 15
- RFC 5639: 2
- RFC2409: 9
- RFC3447: 1
- RFC5639: 3
- SCP:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 1
- javacard.security: 1
- javacardx:
- javacardx.apdu: 1
- javacardx.crypto: 1
- org:
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 7.0 C3, Version 2.9, Date 16.08.17, BSI-DSZ- CC-1028-2017, Giesecke+Devrient Mobile Security GmbH (confidential document) [7] Security Target Lite Sm@rtCafé® Expert 7.0 C3, Version 2.9, Date 16.08.17, BSI-: 1
- 7.0 C3, Version 3, 2017-08-16, BSI-DSZ-CC-1028-2017, TÜViT GmbH (confidential document) [11] Configuration List SmartCafe Expert 7.0 C3, Version 2.2, 2017-07-18, Giesecke & Devrient GmbH: 1
- Report for Sm@rtCafé® Expert 7.0 C3, Version 2, 2017-08-16, BSI-DSZ-CC-1028-2017, TÜViT GmbH (confidential document) [10] Evaluation Technical Report for Composite Evaluation according to AIS 36 for Sm@rtCafé®: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [12] Preparative procedures Sm@rtCafé® Expert 7.0 C3, Version 3.6, 10.08.17, Giesecke & Devrient: 1
|
| pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20170908135818+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Java Card, BSI-DSZ-CC-1028-2017"
- /ModDate: D:20170921131202+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Common Crieria Certification
- /Title: Certification Report BSI-DSZ-CC-1028-2017
- pdf_file_size_bytes: 1403909
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/TR, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://tools.ietf.org/html/rfc5639
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
| pdf_data/st_filename |
HPE ArcSight ESM ST.pdf |
1028b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0951-2015: 4
- BSI-DSZ-CC-0951-2015-RA-01: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0035-2007: 1
- BSI-CC-PP-0084-2014: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL5: 4
- EAL5 augmented: 2
- EAL5+: 1
- EAL6+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.2: 11
- ADV_TDS: 1
- ADV_TDS.1: 11
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 8
- ALC_CMS: 1
- ALC_CMS.2: 6
- ALC_DEL: 1
- ALC_DEL.1: 5
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 14
- ASE_ECD: 1
- ASE_ECD.1: 10
- ASE_INT: 1
- ASE_INT.1: 12
- ASE_OBJ: 1
- ASE_OBJ.2: 10
- ASE_REQ: 1
- ASE_REQ.2: 13
- ASE_SPD: 1
- ASE_SPD.1: 7
- ASE_TSS: 1
- ASE_TSS.1: 5
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 8
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 6
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR.1: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 3
- ASE_INT.2: 2
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 9
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG: 3
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 2
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 3
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_STM.1: 3
- FTA:
- FTA_SSL: 3
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 20
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 53
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 7
- FCS_COP.1: 102
- FCS_RNG: 5
- FCS_RNG.1: 12
- FCS_RNG.1.1: 5
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 11
- FDP_ACC.2: 5
- FDP_ACF: 24
- FDP_ACF.1: 14
- FDP_IFC: 26
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 18
- FDP_IFF.1: 17
- FDP_ITC: 12
- FDP_ITC.1: 10
- FDP_ITC.2: 19
- FDP_RIP: 110
- FDP_RIP.1: 11
- FDP_ROL: 15
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI.1: 2
- FDP_SDI.2: 15
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 1
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UID: 15
- FIA_UID.1: 9
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 94
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 20
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 22
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 33
- FMT_SMR.1: 31
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 34
- FPT_FLS.1: 20
- FPT_FLS.1.1: 2
- FPT_ITT.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 3
- FPT_RCV: 12
- FPT_RCV.3: 10
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 2
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.MANAGE: 2
- A.PLATFORM: 2
- A.PROTECT: 3
- O:
- O.ANALYZER: 7
- O.AUDIT: 5
- O.AUDIT_REVIEW: 4
- O.I_AND_A: 4
- O.PASSWORD_CONTROLS: 4
- O.PROTECTED: 1
- O.PROTECTED_COMMS: 2
- O.RESPONSE: 4
- O.REVIEW: 3
- O.SECURITY_MANAGEMENT: 4
- O.STORAGE: 3
- O.THROTTLE: 4
- OE:
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- OE.PLATFORM: 2
- OE.SENSORS: 3
- OE.TIME: 3
- T:
- T.BRUTE_FORCE: 3
- T.INTEGRITY_COMPROMISE: 2
- T.NETWORK_COMPROMISE: 3
- T.NO_ACCOUNTABILITY: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACTIVITY: 3
- T.UNDETECTED_THREATS: 2
|
- A:
- A.APPLET: 4
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.APP_I_DATA: 2
- D.CRYPTO: 2
- D.PIN: 1
- D.SEC_DATA: 1
- O:
- O.ALARM: 23
- O.APPLET: 15
- O.CARD-: 7
- O.CARD-MANAGEMENT: 27
- O.CIPHER: 20
- O.CODE_PKG: 13
- O.DELETION: 17
- O.FIREWALL: 44
- O.GLOBAL_ARRAYS: 1
- O.GLOBAL_ARRAYS_CONFID: 19
- O.GLOBAL_ARRAYS_INTEG: 9
- O.INSTALL: 16
- O.JAVAOBJECT: 39
- O.KEY-: 8
- O.KEY-MNGT: 18
- O.LOAD: 18
- O.NATIVE: 14
- O.OBJ-DELETION: 9
- O.OPERATE: 37
- O.PIN-: 2
- O.PIN-MNGT: 22
- O.PINMNGT: 1
- O.REALLOCATION: 18
- O.REMOTE: 3
- O.RESOURCES: 23
- O.RND: 4
- O.SCP: 73
- O.SHA: 1
- O.SID: 34
- O.TDES: 1
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 9
- OE.CARD-MANAGEMENT: 5
- OE.CODE-: 6
- OE.CODE-EVIDENCE: 13
- OE.SCP: 13
- OE.VERIFICATION: 39
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 6
- OP.PUT: 5
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-: 8
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 16
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 4
- T.DELETION: 4
- T.EXE-CODE: 6
- T.EXE-CODE-REMOTE: 3
- T.EXECODE: 1
- T.INSTALL: 5
- T.INTEG-: 10
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 5
- T.INTEG-APPLI-DATA: 12
- T.INTEG-JCS-: 2
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 2
- T.INTEG-JCSCODE: 1
- T.INTEGAPPLI-CODE: 2
- T.INTEGAPPLI-DATA: 1
- T.INTEGJCS-DATA: 6
- T.NATIVE: 5
- T.OBJ-DELETION: 2
- T.OBJDELETION: 1
- T.PHYSICAL: 5
- T.RESOURCES: 7
- T.SECURE_DELETION: 8
- T.SID: 16
|
| pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 14
- Giesecke & Devrient: 2
- Giesecke+Devrient: 8
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 2
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 7
- 3DES: 3
- TDEA: 1
- TDES: 2
- Triple-DES: 7
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 3
- SHA-256: 3
- SHA-384: 3
- SHA-512: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 6
- TLS v1.0: 4
- TLS v1.1: 4
- TLS v1.2: 2
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- physical tampering: 5
- SCA:
- Leak-Inherent: 4
- physical probing: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 5
- AIS31: 2
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- FIPS:
- FIPS 140-2: 1
- FIPS 180-3: 2
- FIPS 186-3: 4
- FIPS 197: 6
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS180-4: 2
- FIPS46-3: 3
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS#3: 1
- PKCS1: 9
- PKCS3: 1
- PKCS5: 3
- RFC:
- RFC 2409: 3
- RFC 3447: 4
- RFC 4056: 1
- RFC 4493: 1
- RFC 5639: 1
- RFC2409: 2
- RFC2437: 4
- RFC4493: 1
- RFC5639: 4
- SCP:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 5
- javacard.framework.applet: 1
- javacard.security: 10
- javacardx:
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author: Apted, Tony J. [RA]
- /CreationDate: D:20161215092549+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20161215092549+00'00'
- /Subject: Security Target
- /Title: HPE ArcSight ESM
- pdf_file_size_bytes: 1391138
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: Giesecke+Devrient Mobile Security GmbH /stut
- /Category: Public
- /Chip: M5073 G11
- /Comments: Final
- /Company: GuD
- /CreationDate: D:20170816104040+02'00'
- /Creator: Acrobat PDFMaker 11 für Word
- /HWManufacturer: Infineon
- /Keywords: Common Criteria CCv3.1 EAL5 augmented (EAL5+)
- /ModDate: D:20170816110905+02'00'
- /Producer: Adobe PDF Library 11.0
- /ProductName: Sm@rtCafé® Expert 7.0 C3
- /SourceModified: D:20170816084029
- /Subject: Certificate BSI-DSZ-CC-1028-2017
- /TOE: Sm@rtCafé® Expert 7.0 C3
- /Title: Security Target Lite Sm@rtCafé® Expert 7.0 C3
- pdf_file_size_bytes: 1009080
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 126
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |