Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BitRaser Drive Eraser V3.0.0.6
IC3S/KOL01/STELLAR/EAL2/0221/0028
VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
CCEVS-VR-VID-11155-2021
name BitRaser Drive Eraser V3.0.0.6 VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
category Data Protection Other Devices and Systems
scheme IN US
status active archived
not_valid_after 10.12.2028 28.07.2023
not_valid_before 11.12.2023 28.07.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/BitRaser_Driver_CC_Certificate.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-BitRaser_Drive_Eraser_3_0_0_6_EAL2-version-1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security-Target-v11.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-st.pdf
manufacturer Stellar Information Technology Pvt. Ltd. VMware Inc.
manufacturer_web https://www.stellarinfo.com/ https://www.vmware.com
security_level EAL2 {}
dgst f5c97e7550204b32 8129b9e38f61ae35
heuristics/cert_id IC3S/KOL01/STELLAR/EAL2/0221/0028 CCEVS-VR-VID-11155-2021
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions 3.0.0.6 7.2
heuristics/scheme_data
  • category: Application Software
  • certification_date: 28.07.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 28.07.2023
  • id: CCEVS-VR-VID11155
  • product: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11155
  • vendor: VMware, LLC
heuristics/protection_profiles {} a1cc4a4e079f4d1f
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf
pdf_data/cert_filename BitRaser_Driver_CC_Certificate.pdf st_vid11155-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • IN:
    • IC3S/KOLO1/STELLAR/EAL2/0221/0028: 1
  • US:
    • CCEVS-VR-VID11155-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 1
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/eval_facility
  • ERTL:
    • Common Criteria Test Laboratory, ERTL: 2
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/cert_metadata
  • /ModDate: D:20231211091029Z
  • /Producer: iLovePDF
  • pdf_file_size_bytes: 696666
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 3
  • /CreationDate: D:20210803124126-04'00'
  • /ModDate: D:20210803124126-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename CR-BitRaser_Drive_Eraser_3_0_0_6_EAL2-version-1.0.pdf st_vid11155-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID11155-2021
    • cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • IN:
    • IC3S/KOL01/STELLAR/EAL2/0221/0028/CR: 15
  • US:
    • CCEVS-VR-VID11155-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 4: 3
    • EAL2: 4
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_PRE: 2
  • ALC:
    • ALC_TSU_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_USE: 1
  • OP:
    • OP.CLEAN: 1
    • OP.ERASE: 1
    • OP.PDF: 1
    • OP.RAID: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/report_keywords/eval_facility
  • ERTL:
    • Common Criteria Test Laboratory, ERTL: 4
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
      • TLS v1.2: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /Author: Tapas Bandopadhyay
  • /CreationDate: D:20231129100220+05'30'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20231129100220+05'30'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 698607
  • pdf_hyperlinks: http://www.commoncriteria-india.gov.in/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename Security-Target-v11.pdf st_vid11155-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 2
    • FCS_COP: 2
    • FCS_COP.1: 5
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FPT:
    • FPT_STM.1: 3
    • FPT_TEE: 1
    • FPT_TEE.1: 4
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FCS:
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DEC_EXT.1: 5
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT.1: 5
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 4
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 6
    • FTP_DIT_EXT.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 5
    • A.PROPER_USE: 7
  • O:
    • O.COMPLETE_ERASURE: 6
    • O.LEGIT_USE: 4
  • OE:
    • OE.PLATFORM: 5
    • OE.PROPER_USE: 3
  • OP:
    • OP.CLEAN: 5
    • OP.ERASE: 6
    • OP.PDF: 5
    • OP.RAID: 5
  • T:
    • T.INCOMPLETE_ERASURE: 5
    • T.UNAUTH_USER: 4
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 9
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 1
      • AES-: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
  • bcrypt:
    • bcrypt: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.2: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 1321: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • RFC:
    • RFC 5280: 3
    • RFC 6960: 2
  • X509:
    • X.509: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • in the claimed Protection Profile. Therefore, the following product functionality is considered out of scope as there are no SFRs that can be mapped to this functionality: • The functionality of collecting: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Amit Shukla
  • /CreationDate: D:20230519112100+05'30'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20230519112100+05'30'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 990141
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different