Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
CCEVS-VR-VID-10443-2012
name - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
category Data Protection Detection Devices and Systems
not_valid_before 2014-11-07 2012-10-01
not_valid_after 2019-11-08 2014-11-01
scheme DE US
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf
manufacturer Kanguru Solutions Tenable Network Security, Inc.
manufacturer_web https://www.kanguru.com https://www.tenable.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile Intrusion Detection System - System for Basic Robustness Environme...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'})
state/report/pdf_hash 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57 6bbe4e39fb1e3e1496edb10118d6519fe521fc80f7080eb44d7404caa0dbfbb4
state/report/txt_hash 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82 0cc9c7cf65c4283fa42658cbdbdf224629263190e3e25cbfe0a0fd5d7e8152ce
state/st/pdf_hash 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d 3b767d5258133c0eb3601092a8cf7081b94bf08c654a872c21fb6c7e48566775
state/st/txt_hash 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147 ac95bdcc32b3b1fa5fb3cb004f461c884649a1e12a831f99e30019259a8b5792
heuristics/cert_id BSI-DSZ-CC-0772-2014 CCEVS-VR-VID-10443-2012
heuristics/cert_lab BSI US
heuristics/cpe_matches None cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*
heuristics/extracted_versions 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 5.0.1, 2.0.1, 4.4, 2.1, 3.6
heuristics/related_cves None CVE-2018-1141, CVE-2022-22827, CVE-2017-18214, CVE-2017-5179, CVE-2018-20843, CVE-2022-22824, CVE-2016-1000029, CVE-2022-23852, CVE-2020-5774, CVE-2019-3923, CVE-2024-0971, CVE-2018-1148, CVE-2022-28291, CVE-2021-20079, CVE-2022-22825, CVE-2023-6062, CVE-2022-32973, CVE-2019-3962, CVE-2023-3252, CVE-2021-3449, CVE-2023-3251, CVE-2021-3450, CVE-2018-5407, CVE-2021-20106, CVE-2021-46143, CVE-2022-33757, CVE-2016-9260, CVE-2020-5765, CVE-2022-22826, CVE-2022-22822, CVE-2022-23990, CVE-2019-3982, CVE-2016-4055, CVE-2019-3961, CVE-2022-0778, CVE-2019-1559, CVE-2022-22823, CVE-2021-45960, CVE-2023-3253, CVE-2022-3499, CVE-2024-0955, CVE-2023-6178, CVE-2022-4313, CVE-2018-1147, CVE-2021-20135, CVE-2022-32974, CVE-2016-1000028
heuristics/scheme_data None
  • product: Log Correlation Engine 6.0.6
  • id: CCEVS-VR-VID11065
  • url: https://www.niap-ccevs.org/product/11065
  • certification_date: 2020-12-08T00:00:00Z
  • expiration_date: 2022-12-08T00:00:00Z
  • category: Application Software
  • vendor: Tenable, Inc
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • scheme: US
pdf_data/report_filename 0772a_pdf.pdf st_vid10443-vr.pdf
pdf_data/report_frontpage
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • developer: Kanguru Solutions
    • cert_lab: BSI
  • US:
    • cert_id: CCEVS-VR-VID10443-2012
    • cert_item: Tenable SecurityCenter 4 and Components
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
  • US:
    • CCEVS-VR-VID10443-2012: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.COMINT: 1
    • T.COMDIS: 1
    • T.LOSSOF: 1
    • T.NOHALT: 1
    • T.PRIVIL: 1
    • T.IMPCON: 1
    • T.INFLUX: 1
    • T.FACCNT: 1
    • T.SCNCFG: 1
    • T.SCNMLC: 1
    • T.SCNVUL: 1
    • T.FALACT: 1
    • T.FALREC: 1
    • T.FALASC: 1
    • T.MISUSE: 1
    • T.INADVE: 1
    • T.MISACT: 1
  • A:
    • A.WKSTN: 1
    • A.OS: 1
    • A.LOCATE: 1
    • A.PROTCT: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.NOTRST: 1
    • A.ACCESS: 1
    • A.ASCOPE: 1
    • A.DYNMIC: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ALC:
    • ALC_FLR.2: 5
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_DVS.2: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_FLR.2: 5
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.2 1 5
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 8
    • EAL 1: 7
    • EAL 4: 7
    • EAL2: 2
    • EAL 3: 4
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL 2 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 2: 4
    • EAL 4: 1
    • EAL2: 1
    • EAL2+: 3
    • EAL 2 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
  • EAL 2: 4
  • EAL 4: 1
  • EAL2: 1
  • EAL2+: 3
  • EAL 2 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 8 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 7 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 2 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis/FI
  • physical tampering: 2
  • malfunction: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
      • AES: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI 7138: 2
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/vendor/Microsoft/Microsoft 1 2
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik Evaluation Team
pdf_data/report_metadata//CreationDate D:20141121083051+01'00' D:20121024103543
pdf_data/report_metadata//Creator Writer Microsoft® Office Word 2007
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender" VR
pdf_data/report_metadata//ModDate D:20141121113713+01'00' D:20121024103543
pdf_data/report_metadata//Producer LibreOffice 4.2 Microsoft® Office Word 2007
pdf_data/report_metadata//Subject Common Criteria Certification Validator Report
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0772-2014 Validation Report for IronPort Messaging Gateway
pdf_data/report_metadata/pdf_file_size_bytes 1643286 441073
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata/pdf_number_of_pages 42 25
pdf_data/st_filename 0772b_pdf.pdf st_vid10443-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.PROTCT: 11
    • O.IDSCAN: 7
    • O.IDSENS: 7
    • O.IDANLZ: 5
    • O.RESPON: 5
    • O.EADMIN: 5
    • O.ACCESS: 12
    • O.IDAUTH: 20
    • O.OFLOWS: 6
    • O.AUDITS: 5
    • O.INTEGR: 7
    • O.EXPORT: 3
  • T:
    • T.COMINT: 3
    • T.COMDIS: 3
    • T.LOSSOF: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.IMPCON: 3
    • T.INFLUX: 3
    • T.FACCNT: 3
    • T.SCNCFG: 3
    • T.SCNMLC: 3
    • T.SCNVUL: 3
    • T.FALACT: 3
    • T.FALREC: 3
    • T.FALASC: 3
    • T.MISUSE: 3
    • T.INADVE: 3
    • T.MISACT: 3
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.LOCATE: 3
    • A.PROTCT: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.NOTRST: 3
  • OE:
    • OE.INSTAL: 7
    • OE.PHYCAL: 6
    • OE.CREDEN: 6
    • OE.TIME: 4
    • OE.INTROP: 5
    • OE.PERSON: 5
    • OE.AUDIT_PROTECTION: 4
    • OE.AUDIT_SORT: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025: 6
    • BSI-PP- 0025: 13
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_SPM.1: 2
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_ARC.1: 22
    • ADV_FSP.2: 12
    • ADV_TDS.1: 12
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 7
  • ALC:
    • ALC_FLR.2: 22
    • ALC_CMS.2: 8
    • ALC_DEL.1: 6
    • ALC_CMC.2: 8
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
pdf_data/st_keywords/cc_sar/ADV
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_ARC.1: 22
  • ADV_FSP.2: 12
  • ADV_TDS.1: 12
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 22
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 1 12
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.1 1 12
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 11
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 7
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR.2: 22
  • ALC_CMS.2: 8
  • ALC_DEL.1: 6
  • ALC_CMC.2: 8
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.2 1 8
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.2 1 8
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 1 6
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 1 5
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 9
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 8
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 1 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2: 9
  • EAL 2: 1
  • EAL2 augmented: 4
  • EAL 2 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL2 4 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_SAR: 6
    • FAU_SEL: 2
    • FAU_STG: 4
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 5
    • FAU_SAR.2: 6
    • FAU_SEL.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FIA:
    • FIA_UAU.2: 8
    • FIA_AFL: 2
    • FIA_ATD: 2
    • FIA_UAU: 2
    • FIA_UID: 2
    • FIA_UID.2: 7
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 1
    • FIA_UAU.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMR: 2
    • FMT_MOF.1: 7
    • FMT_MDT.1: 1
    • FMT_SMR.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_ITA.1: 2
    • FPT_ITC.1: 2
    • FPT_ITI.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_GEN: 2
  • FAU_SAR: 6
  • FAU_SEL: 2
  • FAU_STG: 4
  • FAU_GEN.1: 7
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_SAR.1: 5
  • FAU_SAR.2: 6
  • FAU_SEL.1: 5
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_SAR.3: 4
  • FAU_SAR.3.1: 1
  • FAU_SEL.1.1: 1
  • FAU_STG.2: 9
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_STG.4: 5
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN 1 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
  • FIA_UAU.2: 8
  • FIA_AFL: 2
  • FIA_ATD: 2
  • FIA_UAU: 2
  • FIA_UID: 2
  • FIA_UID.2: 7
  • FIA_AFL.1: 2
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 4
  • FIA_ATD.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 1
  • FIA_UAU.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 7 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 9 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 10 7
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
  • FMT_MOF: 2
  • FMT_MTD: 2
  • FMT_SMF: 2
  • FMT_SMR: 2
  • FMT_MOF.1: 7
  • FMT_MDT.1: 1
  • FMT_SMR.1: 5
  • FMT_MOF.1.1: 1
  • FMT_MTD.1: 7
  • FMT_MTD.1.1: 1
  • FMT_SMF.1: 9
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 12 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 3 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 20 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 12 5
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_ITT: 2
  • FPT_STM.1: 6
  • FPT_STM.1.1: 1
  • FPT_ITT.1: 9
  • FPT_ITT.1.1: 1
  • FPT_STM: 1
  • FPT_ITA.1: 2
  • FPT_ITC.1: 2
  • FPT_ITI.1: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Out of scope: 2
    • 11 1.5.4.3 Out of scope : 1
    • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
    • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 18
  • TLS:
    • SSL:
      • SSL: 20
  • VPN:
    • VPN: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 14
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 3
  • malfunction: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_metadata
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
  • pdf_file_size_bytes: 1188447
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
  • /Author: ktodd
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20121024103427
  • /ModDate: D:20121024103427
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks: http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/
pdf_data/st_metadata//Author Andreas Siegert (generated by CCTool version 2.8) ktodd
pdf_data/st_metadata//CreationDate D:20141006150157Z D:20121024103427
pdf_data/st_metadata//Creator Unknown Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20141006150157Z D:20121024103427
pdf_data/st_metadata//Producer XEP 4.23 Microsoft® Office Word 2007
pdf_data/st_metadata/pdf_file_size_bytes 704587 1188447
pdf_data/st_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/
pdf_data/st_metadata/pdf_number_of_pages 41 59
dgst eda06ca3c208ebd0 7a9d9dd29e76bfba