| name |
Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM) v6.9.1c |
NC2.VPN+ v2.1.9 |
| category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
MY |
MY |
| status |
archived |
active |
| not_valid_after |
14.12.2021 |
13.09.2026 |
| not_valid_before |
14.12.2016 |
13.09.2021 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C121-CERTIFICATE-v1.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C076-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C121-CR-v1.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HPE%20ArcSight%20ESM%20ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SCS%20NC2.vpn+%20Security%20Target%20v1.0.pdf |
| manufacturer |
Hewlett Packard Enterprise |
System Consultancy Services Sdn. Bhd. |
| manufacturer_web |
https://www.hpe.com/ |
https://www.scs.my/ |
| security_level |
EAL2 |
EAL2 |
| dgst |
e77512aeb71ff153 |
b25e9c1d52bcd897 |
| heuristics/cert_id |
ISCB-5-RPT-C076-CR-v1 |
ISCB-5-RPT-C121-CR-v1 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p1:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p3:*:*:*:*:*:*, cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p2:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2017-13986, CVE-2017-14356, CVE-2017-13990, CVE-2017-13988, CVE-2017-13987, CVE-2017-14357, CVE-2017-14358, CVE-2017-13991, CVE-2017-13989 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
6.9.1 |
2.1.9 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2016-005-C076
- certification_date: 14.12.2016
- developer: Hewlett Packard Enterprise (HPE)
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C076
- certification_date: 14.12.2016
- developer: Lee IvyEngineering Director, ArcSightHewlett Packard Enterprise Security Products [email protected]: 650-265-3457Mobile: 408-386-17001160 Enterprise Way (Moffett Towers Building G, 7th Floor),Sunnyvale CA 94089
- expiration_date: 14.12.2021
- mutual_recognition: CCRA
- product: Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/ISCB-5-RPT-C076-CR-v1.pdf
- scope: ArcSight ESM is a Security Information and Event Management (SIEM) solution that combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early. It is able to concentrate, normalize, analyze, and report the results of its analysis of security event data generated by various Intrusion Detection System (IDS) sensors and scanners in the operational environment. ArcSight ESM provides authorized users with capabilities to monitor events, correlate events for in-depth investigation and analysis, and resolve events with automated escalation procedures and actions. The following security functions are implemented by the TOE: Security Audit Identification adn Authentication Security Management Protection of the TSF Trusted Path/Channels Intrusion Detection System
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C076/HPE%20ArcSight%20ESM%20ST.pdf
- type: Security Information and Event Management (SIEM)
- expiration_date: 14.12.2021
- level: EAL2
- product: Hewlett Packard Enterprise ArcSight Enterprise Security Manager (ESM)
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/110
|
- cert_no: 2021-008-C121
- certification_date: 13.09.2021
- developer: System Consultancy Services Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C121
- certification_date: 13.09.2021
- developer: No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my
- expiration_date: 13.09.2026
- mutual_recognition: CCRA
- product: NC2.vpn+ v2.1.9
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/ISCB-5-RPT-C121-CR-v1.pdf
- scope: The TOE (NC2.vpn+ version 2.1.9) a self-contained box (security appliance) consisting of hardware and software that provides security functionality such as Stateful Traffic Filter Firewall, Virtual Private Network (VPN), Cryptographic Support, Security Audit, Identification and Authentication, Security Management, Secure Communication. From the stateful inspection firewall to the inline intrusion detection & prevention system, various features are built-in to enhance network performance and protect your network from numerous cyber security threats. The TOE resides between one or more internal networks (that the TOE is protecting) and an external network such as the Internet. All information transferred between the internal and external networks shall pass through the TOE. Network packets are inspected in real-time as they pass through the TOE (inbound and outbound protection). Malicious network packets are filtered before they have a chance to reach inside the protected network.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/SCS_NC2.vpn_Security_Target_v1.0.pdf
- type: Network and Network-Related Devices and Systems
- expiration_date: 13.09.2026
- level: EAL2
- product: NC2.vpn+ v2.1.9
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/102
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
ISCB-5-CERT-C121-CERTIFICATE-v1.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20210917005316Z00'00'
- /Creator: Word
- /ModDate: D:20210917005316Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext
- pdf_file_size_bytes: 704807
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ISCB-5-RPT-C076-CR-v1.pdf |
ISCB-5-RPT-C121-CR-v1.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C076-CR-v1: 29
|
- MY:
- ISCB-5-RPT-C121-CR-v1: 34
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2.1: 1
- FAU_SAR.3.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FIA:
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTP:
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.PHYSICAL: 1
- A.SINGLE_CONNECTION: 1
- A.TRUSTED_ADMIN: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS v1.0: 1
- TLS v1.1: 1
- TLS v1.2: 1
|
- IPsec:
- TLS:
- TLS:
- TLS: 1
- TLS v1.2: 1
- TLS v1.3: 1
- VPN:
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /CreationDate: D:20210918094333Z00'00'
- /Creator: Word
- /ModDate: D:20210918094333Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext
- pdf_file_size_bytes: 809947
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
| pdf_data/st_filename |
HPE ArcSight ESM ST.pdf |
SCS NC2.vpn Security Target v1.0.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.2: 11
- ADV_TDS: 1
- ADV_TDS.1: 11
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 8
- ALC_CMS: 1
- ALC_CMS.2: 6
- ALC_DEL: 1
- ALC_DEL.1: 5
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 14
- ASE_ECD: 1
- ASE_ECD.1: 10
- ASE_INT: 1
- ASE_INT.1: 12
- ASE_OBJ: 1
- ASE_OBJ.2: 10
- ASE_REQ: 1
- ASE_REQ.2: 13
- ASE_SPD: 1
- ASE_SPD.1: 7
- ASE_TSS: 1
- ASE_TSS.1: 5
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 8
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 3
- ASE_INT.1: 4
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 9
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG: 3
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 2
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 3
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_STM.1: 3
- FTA:
- FTA_SSL: 3
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.MANAGE: 2
- A.PLATFORM: 2
- A.PROTECT: 3
- O:
- O.ANALYZER: 7
- O.AUDIT: 5
- O.AUDIT_REVIEW: 4
- O.I_AND_A: 4
- O.PASSWORD_CONTROLS: 4
- O.PROTECTED: 1
- O.PROTECTED_COMMS: 2
- O.RESPONSE: 4
- O.REVIEW: 3
- O.SECURITY_MANAGEMENT: 4
- O.STORAGE: 3
- O.THROTTLE: 4
- OE:
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- OE.PLATFORM: 2
- OE.SENSORS: 3
- OE.TIME: 3
- T:
- T.BRUTE_FORCE: 3
- T.INTEGRITY_COMPROMISE: 2
- T.NETWORK_COMPROMISE: 3
- T.NO_ACCOUNTABILITY: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_ACTIVITY: 3
- T.UNDETECTED_THREATS: 2
|
- A:
- A.PHYSICAL: 3
- A.SINGLE_CONNECTION: 2
- A.TRUSTED_ADMIN: 3
- O:
- O.DATA_FLOW_CONTROL: 4
- O.ENCRYPT: 3
- O.LOGGING: 3
- O.PROTECTED_MANAGEMENT: 4
- O.TOECOM: 4
- OE:
- OE.PHYSICAL: 4
- OE.SINGLE_CONNECTION: 2
- OE.TRUSTED_ADMIN: 5
- T:
- T.READ_MODIFY_DATA: 2
- T.TOECOM: 3
- T.UNAUTHORIZED_ACCESS: 3
- T.UNAUTHORIZED_DATA: 3
- T.UNDETECTED_ACTIONS: 2
|
| pdf_data/st_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 6
- TLS v1.0: 4
- TLS v1.1: 4
- TLS v1.2: 2
|
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 5
- TLS v1.2: 3
- TLS v1.3: 3
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Apted, Tony J. [RA]
- /CreationDate: D:20161215092549+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20161215092549+00'00'
- /Subject: Security Target
- /Title: HPE ArcSight ESM
- pdf_file_size_bytes: 1391138
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: Securelytics
- /CreationDate: D:20210730035619+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20210730035619+00'00'
- /Subject: SCS Sdn Bhd
- /Title: SCS NC2.vpn+ Security Target
- pdf_file_size_bytes: 844757
- pdf_hyperlinks: http://www.commonriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |