Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A)
JISEC-CC-CRP-C0315
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
JISEC-CC-CRP-C0514
name Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A) Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
not_valid_before 2011-09-30 2016-06-06
not_valid_after 2016-10-03 2021-06-06
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf
security_level EAL2 ALC_FLR.1, EAL2+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf
state/report/pdf_hash 7910fa810cd9502746be78793d14e72383e0989ee95fcf2b2edae3ea04068320 93a52189ac3baf26ac00310474d1b238aa438951331d1f5b6f10ceb65c03d5a7
state/report/txt_hash 09e84f380f6c4280996ba24c5edcc16300f45109113f5abbb00632ac97721f48 3af7b5bf795117fd27bedb5264d03826302b23ac65df033e4afdf09040e1fcd0
state/st/pdf_hash c38eda89a86dd5d4bd4ffc8d16634f3b14ad3ebc8cff8e16e89902c6e0568d89 d4924797a53b58c23d0fce46516f98abc901c012f6caca39f69cc5a41200ba41
state/st/txt_hash ba0d62c8c43144c84519dfc3226855aab8458e47f5931aacf4e04f4ba6968689 8f4a9a82c5a3b00ee7ff8044c894a6a53acc5759c4f381948ab6ab714960598a
heuristics/cert_id JISEC-CC-CRP-C0315 JISEC-CC-CRP-C0514
heuristics/scheme_data
  • cert_id: C0315
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2016-10
  • claim: EAL2
  • certification_date: 2011-09
  • toe_overseas_link: None
  • toe_japan_name: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program 70-02-05-00/00(R7-02-06A)
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0315_it0313.html
  • enhanced:
    • product: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program
    • toe_version: 70-02-05-00/00(R7-02-06A)
    • product_type: Control Program for storage system
    • certification_date: 2011-09-30
    • cc_version: 3.1
    • assurance_level: EAL2
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • report_link: https://www.ipa.go.jp/en/security/c0315_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0315_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging
  • cert_id: C0514
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
  • expiration_date: 2021-07
  • claim: EAL2+ALC_FLR.1
  • certification_date: 2016-06
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
  • toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
  • enhanced:
    • product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
    • toe_version: 80-01-25-00/00(R8-01A-06_Z)
    • product_type: Control Program for storage system
    • certification_date: 2016-06-06
    • cc_version: 3.1 Release4
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
heuristics/scheme_data/cert_id C0315 C0514
heuristics/scheme_data/certification_date 2011-09 2016-06
heuristics/scheme_data/claim EAL2 EAL2+ALC_FLR.1
heuristics/scheme_data/enhanced
  • product: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program
  • toe_version: 70-02-05-00/00(R7-02-06A)
  • product_type: Control Program for storage system
  • certification_date: 2011-09-30
  • cc_version: 3.1
  • assurance_level: EAL2
  • vendor: Hitachi, Ltd.
  • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
  • report_link: https://www.ipa.go.jp/en/security/c0315_erpt.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0315_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging
  • product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
  • toe_version: 80-01-25-00/00(R8-01A-06_Z)
  • product_type: Control Program for storage system
  • certification_date: 2016-06-06
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.1
  • vendor: Hitachi, Ltd.
  • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
  • report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
heuristics/scheme_data/enhanced/assurance_level EAL2 EAL2 Augmented with ALC_FLR.1
heuristics/scheme_data/enhanced/cc_version 3.1 3.1 Release4
heuristics/scheme_data/enhanced/certification_date 2011-09-30 2016-06-06
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
heuristics/scheme_data/enhanced/evaluation_facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
heuristics/scheme_data/enhanced/product Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0315_erpt.pdf https://www.ipa.go.jp/en/security/c0514_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0315_est.pdf https://www.ipa.go.jp/en/security/c0514_est.pdf
heuristics/scheme_data/enhanced/toe_version 70-02-05-00/00(R7-02-06A) 80-01-25-00/00(R8-01A-06_Z)
heuristics/scheme_data/expiration_date 2016-10 2021-07
heuristics/scheme_data/toe_japan_name Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program 70-02-05-00/00(R7-02-06A) Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
heuristics/scheme_data/toe_overseas_link None https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
heuristics/scheme_data/toe_overseas_name ----- Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
pdf_data/report_filename c0315_erpt.pdf c0514_erpt.pdf
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0315-01: 1
  • Certification No. C0315: 1
  • CRP-C0514-01: 1
  • Certification No. C0514: 1
pdf_data/report_keywords/cc_claims/A
  • A.NOEVIL: 1
  • A.NOEVIL_MNT: 1
  • A.PHYSICAL_SEC: 1
  • A.MANAGE_SECRET: 1
  • A.MANAGEMENT_PC: 1
  • A.CONNECT_STORAGE: 1
  • A.EXTERNAL_SERVER: 2
  • A.NOEVIL: 1
  • A.PHYSICAL_SEC: 1
  • A.MANAGE_SECRET: 1
  • A.MANAGEMENT_PC: 1
  • A.MAINTENCE_PC: 1
  • A.CONNECT_STORAGE: 1
  • A.EXTERNAL_SERVER: 1
pdf_data/report_keywords/cc_claims/A/A.EXTERNAL_SERVER 2 1
pdf_data/report_keywords/cc_claims/T
  • T.ILLEGAL_XCNTL: 1
  • T.TSF_COMP: 1
  • T.LP_LEAK: 1
  • T.CHG_CONFIG: 1
  • T.HDD_THEFT: 1
  • T.HDD_REUSE: 1
  • T.TSF_COMP: 1
  • T.LP_LEAK: 1
  • T.CHG_CONFIG: 1
  • T.HDD_THEFT: 1
  • T.HDD_REUSE: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2: 4
  • EAL2 augmented: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/crypto_protocol/TLS/SSL/SSL 7 1
pdf_data/report_keywords/crypto_protocol/TLS/TLS/TLS 2 8
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 3
pdf_data/report_metadata//CreationDate D:20111222113805+09'00' D:20160906162354+09'00'
pdf_data/report_metadata//ModDate D:20111222113848+09'00' D:20160906162432+09'00'
pdf_data/report_metadata/pdf_file_size_bytes 474751 473024
pdf_data/st_filename c0315_est.pdf c0514_est.pdf
pdf_data/st_keywords/cc_claims/A
  • A.NOEVIL: 3
  • A.NOEVIL_MNT: 3
  • A.PHYSICAL_SEC: 3
  • A.MANAGE_SECRET: 3
  • A.MANAGEMENT_PC: 3
  • A.CONNECT_STORAGE: 3
  • A.EXTERNAL_SERVER: 3
  • A.NOEVIL: 3
  • A.PHYSICAL_SEC: 3
  • A.MANAGE_SECRET: 3
  • A.MANAGEMENT_PC: 3
  • A.MAINTENANCE_PC: 3
  • A.CONNECT_STORAGE: 3
  • A.EXTERNAL_SERVER: 3
pdf_data/st_keywords/cc_claims/O
  • O.ADM_AUTH: 9
  • O.ADM_ROLE: 5
  • O.SEC_COMM: 8
  • O.HOST_AUTH: 5
  • O.HOST_ACCESS: 8
  • O.HDD_ENC: 6
  • O.HDD_SHRED: 3
  • O.AUD_GEN: 8
  • O.HDD_: 2
  • O.ADM_AUTH: 8
  • O.ADM_ROLE: 5
  • O.SEC_COMM: 8
  • O.SWITCH_AUTH: 6
  • O.HOST_ACCESS: 8
  • O.HDD_ENC: 6
  • O.HDD_SHRED: 3
  • O.AUD_GEN: 7
  • O.HDD_: 2
pdf_data/st_keywords/cc_claims/O/O.ADM_AUTH 9 8
pdf_data/st_keywords/cc_claims/O/O.AUD_GEN 8 7
pdf_data/st_keywords/cc_claims/OE
  • OE.NOEVIL: 2
  • OE.NOEVIL-MNT: 1
  • OE.PHYSICAL_SEC: 4
  • OE.MANAGE_SECRET: 2
  • OE.MANAGEMENT_PC: 3
  • OE.CONNECT_STORAGE: 2
  • OE.EXTERNAL_SERVER: 3
  • OE.FC-SP_HBA: 3
  • OE.HDD_ENC: 2
  • OE.NOEVIL_MNT: 1
  • OE.NOEVIL: 2
  • OE.PHYSICAL_SEC: 3
  • OE.MANAGE_SECRET: 3
  • OE.MANAGEMENT_PC: 2
  • OE.MAINTENANCE_PC: 3
  • OE.CONNECT_STORAGE: 2
  • OE.EXTERNAL_SERVER: 3
  • OE.FC-SP_HBA: 2
  • OE.HDD_ENC: 2
  • OE.FC-: 1
pdf_data/st_keywords/cc_claims/OE/OE.FC-SP_HBA 3 2
pdf_data/st_keywords/cc_claims/OE/OE.MANAGEMENT_PC 3 2
pdf_data/st_keywords/cc_claims/OE/OE.MANAGE_SECRET 2 3
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL_SEC 4 3
pdf_data/st_keywords/cc_claims/T
  • T.ILLEGAL_XCNTL: 3
  • T.TSF_COMP: 3
  • T.LP_LEAK: 3
  • T.CHG_CONFIG: 3
  • T.HDD_THEFT: 3
  • T.HDD_REUSE: 3
  • T.TSF_COMP: 3
  • T.LP_LEAK: 3
  • T.CHG_CONFIG: 3
  • T.HDD_THEFT: 3
  • T.HDD_REUSE: 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR.1: 4
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 10
  • FIA_ATD: 19
  • FIA_SOS: 20
  • FIA_UAU.1: 15
  • FIA_UAU.2: 11
  • FIA_UID.2: 16
  • FIA_USB: 18
  • FIA_UID.1: 8
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 6
  • FIA_SOS.1: 2
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 6
  • FIA_AFL.1: 10
  • FIA_ATD: 19
  • FIA_SOS: 20
  • FIA_UAU.2: 18
  • FIA_UID.2: 18
  • FIA_USB: 19
  • FIA_UID.1: 6
  • FIA_UAU.1: 2
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 6
  • FIA_SOS.1: 2
  • FIA_UAU: 1
  • FIA_UID: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 15 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 11 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 16 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB 18 19
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/crypto_protocol/TLS/SSL
  • SSL: 8
  • SSLv3.0: 2
  • SSL: 8
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-2: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-2: 1
  • RFC:
    • RFC2865: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/st_metadata
  • pdf_file_size_bytes: 1094064
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
  • /Title: VSP ST
  • /Subject: CC EAL2 Security Target
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20111221190410
  • /ModDate: D:20111221190410
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1477873
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
  • /Title: USP_V ST
  • /Author: 八木
  • /Subject: CC EAL2 Security Target
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20160901154400+09'00'
  • /ModDate: D:20160901154400+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20111221190410 D:20160901154400+09'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2010
pdf_data/st_metadata//ModDate D:20111221190410 D:20160901154400+09'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2010
pdf_data/st_metadata//Title VSP ST USP_V ST
pdf_data/st_metadata/pdf_file_size_bytes 1094064 1477873
pdf_data/st_metadata/pdf_number_of_pages 77 78
dgst eecf16a3a9948989 4b794daffbae517d