name |
Kaspersky Endpoint Security 10 for Windows with Kaspersky Full Disk Encryption 3.0 version 10.3.0.6294 AES256 |
Crunchy Certified PostgreSQL v9.5 |
category |
Other Devices and Systems |
Databases |
scheme |
ES |
TR |
status |
archived |
archived |
not_valid_after |
24.04.2023 |
09.06.2019 |
not_valid_before |
24.04.2018 |
09.06.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-CCRA.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-INF-2261%20v3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Crunchy.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target%20-%20Crunchy%20-%20Version%201.6%20-%2020160509.pdf |
manufacturer |
Kaspersky Lab UK Ltd. |
Crunchy Data Solutions Inc. |
manufacturer_web |
https://www.kaspersky.co.uk/ |
https://crunchydata.com/ |
security_level |
EAL2+, ALC_FLR.1 |
EAL2+, ALC_FLR.2 |
dgst |
f44160f29ebcdda3 |
1be0865a3af6b498 |
heuristics/cert_id |
2014-40-INF-2261 |
21.0.03/TSE-CCCS-33 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
10.3.0.6294, 3.0 |
9.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
3f6ac99252bbf14e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf |
pdf_data/cert_filename |
2014-40-CCRA.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL2 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180426105026+02'00'
- pdf_file_size_bytes: 841525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2014-40-INF-2261 v3.pdf |
Certification Report - Crunchy.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 6
- ITSEC:
|
- EAL:
- EAL 2+: 1
- EAL2+: 4
- EAL4: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL: 1
- ALC_FLR.2: 6
- ASE:
- ASE_INT.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP.1: 4
- FDP:
- FDP_ACC.1: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 4
- FMT_MSA.3: 4
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.AUTHUSER: 1
- A.CONNECT: 1
- A.MANAGE: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PEER: 1
- A.PHYSICAL: 1
- A.SUPPORT: 1
- A.TRAINEDUSER: 1
- T:
- T.ACCESS_TSFDATA: 1
- T.ACCESS_TSFFUNC: 1
- T.IA_MASQUERADE: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHORIZED_ACCESS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- Audit Extension e PostGIS Spatial Extensions 2.4.1.2 Components and Capabilities that are Out of Scope The following Crunchy Certified PostgreSQL 9.5 components are out of scope and thus not included in: 1
- Out of Scope: 1
- out of scope: 1
- platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: e Authenticator servers, if configured; and e Terminal emulator 2.4.2 Logical Scope of the TOE 2: 1
|
pdf_data/report_metadata |
|
- /CreationDate: D:20160715145628+02'00'
- /Creator: Canon iR-ADV C5240 PDF
- /Producer: Adobe PSL 1.2e for Canon
- pdf_file_size_bytes: 1639551
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
2014-40-ST.pdf |
Security Target - Crunchy - Version 1.6 - 20160509.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2+: 1
- EAL2: 7
- EAL2 augmented: 3
|
- EAL:
- EAL2: 3
- EAL2 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 25
- FCS_CKM.2: 2
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 33
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 37
- FDP_ACF.1: 35
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FIA:
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 40
- FMT_MSA.3: 42
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 4
- FAU_GEN.2.1: 3
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 3
- FIA_UAU.1: 4
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 2
- FIA_UID.1: 5
- FIA_UID.1.1: 3
- FIA_UID.1.2: 2
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 2
- FMT_MTD.1: 5
- FMT_MTD.1.1: 3
- FMT_REV.1: 13
- FMT_REV.1.1: 7
- FMT_REV.1.2: 8
- FMT_SMF.1: 5
- FMT_SMF.1.1: 2
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FPT:
- FPT_TRC.1: 7
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTA:
- FTA_MCS.1: 5
- FTA_MCS.1.1: 3
- FTA_MCS.1.2: 2
- FTA_TSE.1: 4
- FTA_TSE.1.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHORISED_USER: 4
- A.PROTECT_ACCESS: 4
- A.PROTECT_PASSWD: 4
- A.SECURE_OPER: 4
- A.SECURE_SERVER: 4
- A.TRUST_ADMIN: 4
- O:
- O.ACCESS_: 1
- O.ACCESS_DV: 5
- O.LAUNCH: 5
- O.SECURE_: 2
- O.SECURE_DATA: 7
- O.SECURE_MANAGEMENT: 2
- O.VIRUS: 5
- O.WEBACC: 6
- OE:
- OE.AUTHORISED_USER: 4
- OE.PROTECT_ACCESS: 5
- OE.PROTECT_PASSWD: 3
- OE.SECURE_OPER: 3
- OE.SECURE_SERVER: 6
- OE.TRUST_ADMIN: 3
- T:
- T.ACCESS_CD: 3
- T.ACCESS_DD: 4
- T.ACCESS_KD: 3
- T.KEY_DISCLOSURE: 4
|
- A:
- A.AUTHUSER: 2
- A.CONNECT: 2
- A.MANAGE: 2
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 2
- A.SUPPORT: 2
- A.TRAINEDUSER: 2
- O:
- O.ACCESS_HISTORY: 8
- O.ADMIN_ROLE: 8
- O.AUDIT_GENERATION: 6
- O.DISCRETIONARY_ACCESS: 6
- O.MANAGE: 10
- O.MEDIATE: 8
- O.RESIDUAL_INFORMATION: 8
- O.TOEACCESS: 1
- O.TOE_ACCESS: 17
- OE:
- OE.ADMIN: 11
- OE.INFO_PROTECT: 19
- OE.IT_REMOTE: 9
- OE.IT_TRUSTED_SYSTEM: 9
- OE.NO_GENERAL_PURPOSE: 7
- OE.PHYSICAL: 7
- T:
- T.ACCESS_TSFDATA: 2
- T.ACCESS_TSFFUNC: 2
- T.IA_MASQUERADE: 3
- T.IA_USER: 2
- T.RESIDUAL_DATA: 2
- T.TSF_COMPROMISE: 3
- T.UNAUTHORIZED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38E: 1
- NIST SP 800-90A: 2
- SP 800-132: 1
- PKCS:
|
- RFC:
- RFC 1321: 4
- RFC 1413: 2
- RFC 1964: 1
- RFC 2743: 1
- RFC 4510: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- By content categories and types of data. Two above mentioned checks together (this rule type is out of scope of evaluation). Multiple rules can be defined with relative priority, they will be applied based on: 1
- out of scope: 3
- path, application properties, application`s digital signature parameters, application category (out of scope of evalutation), active user. P a g e | 43 This metadata then are compared to active Application: 1
- the one selected in the rule. Content categories are described in User Manual (this rule type is out of scope of evaluation). By type of data. When object is being downloaded from network its source URL is: 1
- this rule type is out of scope of evaluation: 2
|
- OutOfScope:
- Audit Extension PostGIS Spatial Extensions 1.5.10.2 Components and Capabilities that are Out of Scope The following Crunchy Certified PostgreSQL 9.5 components are out of scope and thus not included in: 1
- Out of Scope: 3
- are prohibited in the evaluated configuration. See Section 1.5.10.2 for further details regarding Out of Scope Configuration Options. Note: The MD5 implementation is vendor developed to the RFC 1321: 1
- methods are outside the scope of this evaluation. 1.5.10.3 Configuration Options that are Out of Scope. 1.5.10.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is: 1
- out of scope: 1
- platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: Authenticator servers, if configured; and Terminal emulator 1.5.10.4.3 Functional Dependencies: 1
|
pdf_data/st_metadata |
- /Author: test
- /CreationDate: D:20180220122537+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180426102848+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 985996
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: Paul Laurence
- /CreationDate: D:20160715155933+03'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20160715155933+03'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 1528693
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
False |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |