name |
Kaspersky Endpoint Security 10 for Windows with Kaspersky Full Disk Encryption 3.0 version 10.3.0.6294 AES256 |
Trend Micro Deep Discovery Inspector 3.2, build 1118 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
ES |
CA |
status |
archived |
archived |
not_valid_after |
24.04.2023 |
21.01.2019 |
not_valid_before |
24.04.2018 |
21.01.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-CCRA.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-252%20cert%20v0.2e.doc |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-INF-2261%20v3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-252%20CR%20v1.0e.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-252%20ST%20v2.2.pdf |
manufacturer |
Kaspersky Lab UK Ltd. |
Trend Micro Inc. |
manufacturer_web |
https://www.kaspersky.co.uk/ |
https://www.trendmicro.com |
security_level |
EAL2+, ALC_FLR.1 |
EAL2+, ALC_FLR.2 |
dgst |
f44160f29ebcdda3 |
3b2ea6be5be132f4 |
heuristics/cert_id |
2014-40-INF-2261 |
383-4-252 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_ARV.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions |
10.3.0.6294, 3.0 |
3.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
44cdd911811b36d2 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
pdf_data/cert_filename |
2014-40-CCRA.pdf |
383-4-252 cert v0.2e.doc |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL2 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180426105026+02'00'
- pdf_file_size_bytes: 841525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2014-40-INF-2261 v3.pdf |
383-4-252 CR v1.0e.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-252-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 6
- ITSEC:
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL 2+: 1
- EAL2+: 2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP.1: 4
- FDP:
- FDP_ACC.1: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 4
- FMT_MSA.3: 4
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: cpclark
- /CCEF: CygnaCom Solutions
- /CR date: 21 January 2014
- /CR version: 1.0
- /Certificate date: 21 January 2014
- /Company: CSEC-CSTC
- /CreationDate: D:20140203121008-05'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: Trend Micro Incorporated
- /Document number: 383-4-252-CR
- /ETR title, version, date: Evaluation Technical Report Deep Discovery Inspector v3.2, v1.0, 31 December 2013
- /Evaluation completion date: 31 December 2013
- /Keywords:
- /ModDate: D:20140203121011-05'00'
- /Producer: Adobe PDF Library 10.0
- /ST Title: Trend Micro Deep Discovery Inspector 3.2 Security Target (EAL2+) v2.0
- /ST date: 20 January 2014
- /ST version: v2.2
- /SourceModified: D:20140130133133
- /Sponsor: Trend Micro Incorporated
- /Subject:
- /TOE Version: v3.2, build 1118
- /TOE name and version: Trend Micro Deep Discovery Inspector 3.2, build 1118
- /TOE short name: Trend Micro DDI v3.2
- /Title: EAL 2 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 98725
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
2014-40-ST.pdf |
383-4-252 ST v2.2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2+: 1
- EAL2: 7
- EAL2 augmented: 3
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 23
- ADV_ARV.1: 1
- ADV_FSP.2: 14
- ADV_TDS.1: 14
- AGD:
- AGD_OPE.1: 13
- AGD_PRE.1: 9
- ALC:
- ALC_CMC.2: 11
- ALC_CMS.2: 9
- ALC_DEL.1: 8
- ALC_FLR.2: 18
- ATE:
- ATE_COV.1: 7
- ATE_FUN.1: 11
- ATE_IND.2: 10
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 25
- FCS_CKM.2: 2
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 33
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 37
- FDP_ACF.1: 35
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FIA:
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 40
- FMT_MSA.3: 42
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.2: 12
- FAU_STG.2.1: 1
- FAU_STG.2.2: 3
- FAU_STG.2.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 7
- FIA_UAU.2.1: 1
- FIA_UAU.2.2: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.2: 1
- FPT_ITT.1: 2
- FPT_STM: 1
- FPT_STM.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHORISED_USER: 4
- A.PROTECT_ACCESS: 4
- A.PROTECT_PASSWD: 4
- A.SECURE_OPER: 4
- A.SECURE_SERVER: 4
- A.TRUST_ADMIN: 4
- O:
- O.ACCESS_: 1
- O.ACCESS_DV: 5
- O.LAUNCH: 5
- O.SECURE_: 2
- O.SECURE_DATA: 7
- O.SECURE_MANAGEMENT: 2
- O.VIRUS: 5
- O.WEBACC: 6
- OE:
- OE.AUTHORISED_USER: 4
- OE.PROTECT_ACCESS: 5
- OE.PROTECT_PASSWD: 3
- OE.SECURE_OPER: 3
- OE.SECURE_SERVER: 6
- OE.TRUST_ADMIN: 3
- T:
- T.ACCESS_CD: 3
- T.ACCESS_DD: 4
- T.ACCESS_KD: 3
- T.KEY_DISCLOSURE: 4
|
- A:
- A.ACCESS: 3
- A.ASCOPE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.NOTRST: 2
- A.NOTRUST: 1
- A.PROTCT: 3
- O:
- O.ACCESS: 13
- O.AUDITS: 8
- O.AUDIT_SORT: 6
- O.EADMIN: 4
- O.IDANLZ: 6
- O.IDAUTH: 19
- O.IDSCAN: 8
- O.IDSENS: 12
- O.INTEGR: 9
- O.OFLOWS: 8
- O.PROTCT: 12
- O.RESPON: 7
- O.VIRUS: 3
- OE:
- OE.AUDIT_PROTECTION: 5
- OE.CREDEN: 6
- OE.INSTAL: 6
- OE.INTROP: 6
- OE.PERSON: 5
- OE.PHYCAL: 6
- OE.TIME: 8
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.FACCNT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 3
- T.IMPCON: 3
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MISACT: 4
- T.MISUSE: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.SCNCFG: 3
- T.SCNMLC: 3
- T.SCNVUL: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38E: 1
- NIST SP 800-90A: 2
- SP 800-132: 1
- PKCS:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- By content categories and types of data. Two above mentioned checks together (this rule type is out of scope of evaluation). Multiple rules can be defined with relative priority, they will be applied based on: 1
- out of scope: 3
- path, application properties, application`s digital signature parameters, application category (out of scope of evalutation), active user. P a g e | 43 This metadata then are compared to active Application: 1
- the one selected in the rule. Content categories are described in User Manual (this rule type is out of scope of evaluation). By type of data. When object is being downloaded from network its source URL is: 1
- this rule type is out of scope of evaluation: 2
|
|
pdf_data/st_metadata |
- /Author: test
- /CreationDate: D:20180220122537+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180426102848+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 985996
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: [email protected]
- /Company: Third Brigade
- /ContentTypeId: 0x010100AEFBA9613DB4594DAD72C8DA1BAB26D9
- /CreationDate: D:20140207112617-05'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20140207112627-05'00'
- /Producer: Adobe PDF Library 9.0
- /SourceModified: D:20140203123523
- pdf_file_size_bytes: 640046
- pdf_hyperlinks:
|