| name |
Strong Customer Authentication for Apple Pay on Mac mini with M4 running macOS Sequoia 15.4, paired with Magic keyboard with Touch ID(macOS Sequoia 15.4 (build 24E248)) (ANSSI-CC-2025/36) |
Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3running macOS Sequoia 15.4 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
| scheme |
FR |
ES |
| status |
active |
active |
| not_valid_after |
23.10.2030 |
16.01.2031 |
| not_valid_before |
23.10.2025 |
16.01.2026 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_36fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_Certificado.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_36fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_INF-4674.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_36en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_ST.pdf |
| manufacturer |
Apple Inc. |
Apple Inc. |
| manufacturer_web |
https://www.apple.com/ |
https://www.apple.com/ |
| security_level |
ADV_FSP.3, ALC_FLR.3, EAL2+ |
ADV_FSP.3, ALC_FLR.3, EAL2+ |
| dgst |
f6a3a902436a298c |
c2e0d23f0b5f4231 |
| heuristics/cert_id |
ANSSI-CC-2025/36 |
2025-11-INF-4674 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
cpe:2.3:o:apple:macos:15.4:*:*:*:*:*:*:* |
cpe:2.3:o:apple:macos:15.4:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2025-43539, CVE-2025-43535, CVE-2025-43328, CVE-2025-31256, CVE-2025-43253, CVE-2025-43340, CVE-2025-43396, CVE-2025-43314, CVE-2025-43357, CVE-2025-43284, CVE-2025-43317, CVE-2025-43266, CVE-2025-43303, CVE-2025-43213, CVE-2025-46287, CVE-2025-31246, CVE-2026-20680, CVE-2025-43287, CVE-2025-43274, CVE-2026-20630, CVE-2025-31279, CVE-2025-46297, CVE-2025-43285, CVE-2026-20636, CVE-2025-43337, CVE-2025-31219, CVE-2025-31201, CVE-2026-20620, CVE-2025-43250, CVE-2025-43364, CVE-2025-43262, CVE-2025-43247, CVE-2025-43327, CVE-2025-46305, CVE-2025-43209, CVE-2026-20625, CVE-2025-43428, CVE-2025-31206, CVE-2025-43461, CVE-2025-43346, CVE-2025-31212, CVE-2025-46288, CVE-2025-43268, CVE-2025-31257, CVE-2025-43374, CVE-2026-20653, CVE-2026-20673, CVE-2025-43330, CVE-2025-43390, CVE-2025-43304, CVE-2025-31269, CVE-2025-46289, CVE-2025-43334, CVE-2026-20671, CVE-2025-43227, CVE-2025-43372, CVE-2025-43381, CVE-2025-31215, CVE-2026-20647, CVE-2025-31273, CVE-2025-43400, CVE-2025-43206, CVE-2026-20614, CVE-2025-43473, CVE-2025-43499, CVE-2025-43532, CVE-2025-31213, CVE-2025-43329, CVE-2026-20601, CVE-2025-43522, CVE-2025-43394, CVE-2025-43391, CVE-2025-46306, CVE-2025-31278, CVE-2025-43448, CVE-2025-31275, CVE-2025-43211, CVE-2025-46310, CVE-2025-43312, CVE-2025-43224, CVE-2025-43326, CVE-2025-46290, CVE-2025-43367, CVE-2025-46303, CVE-2025-43519, CVE-2025-43214, CVE-2025-43332, CVE-2025-43404, CVE-2025-43232, CVE-2025-43351, CVE-2025-43331, CVE-2025-43344, CVE-2025-43542, CVE-2025-46300, CVE-2025-43384, CVE-2025-43466, CVE-2025-43313, CVE-2025-43353, CVE-2025-31222, CVE-2025-43239, CVE-2025-31258, CVE-2025-43474, CVE-2026-20624, CVE-2025-43196, CVE-2025-43403, CVE-2025-46304, CVE-2025-31259, CVE-2025-43533, CVE-2025-43468, CVE-2025-43275, CVE-2025-31220, CVE-2026-20628, CVE-2025-46291, CVE-2025-31237, CVE-2025-43523, CVE-2025-43356, CVE-2026-20675, CVE-2025-43197, CVE-2026-20646, CVE-2025-43223, CVE-2025-43541, CVE-2025-24197, CVE-2025-30440, CVE-2025-43347, CVE-2025-43192, CVE-2025-43207, CVE-2025-31249, CVE-2025-43361, CVE-2025-43315, CVE-2025-43193, CVE-2025-43359, CVE-2025-31200, CVE-2025-43369, CVE-2026-20641, CVE-2026-20606, CVE-2025-43345, CVE-2025-43244, CVE-2025-43335, CVE-2025-43379, CVE-2026-20644, CVE-2025-43283, CVE-2025-31232, CVE-2025-43510, CVE-2025-43299, CVE-2025-43267, CVE-2025-31244, CVE-2025-43297, CVE-2025-43298, CVE-2025-43518, CVE-2025-43377, CVE-2025-43245, CVE-2025-43397, CVE-2025-43215, CVE-2025-43411, CVE-2025-31233, CVE-2025-43189, CVE-2025-31266, CVE-2025-31238, CVE-2025-31271, CVE-2025-46299, CVE-2025-43234, CVE-2025-43383, CVE-2025-43310, CVE-2025-43393, CVE-2025-43316, CVE-2025-43387, CVE-2025-31209, CVE-2026-20635, CVE-2025-31280, CVE-2025-43222, CVE-2025-43241, CVE-2025-43249, CVE-2025-43296, CVE-2026-20621, CVE-2025-31205, CVE-2025-43382, CVE-2025-43512, CVE-2025-43288, CVE-2025-24274, CVE-2025-31223, CVE-2025-43380, CVE-2025-43305, CVE-2025-43301, CVE-2025-43481, CVE-2025-43212, CVE-2025-46276, CVE-2025-46298, CVE-2025-43190, CVE-2025-43307, CVE-2025-43405, CVE-2026-20654, CVE-2026-20603, CVE-2025-31208, CVE-2025-43420, CVE-2025-43423, CVE-2025-43513, CVE-2025-24142, CVE-2025-43529, CVE-2025-43246, CVE-2026-20648, CVE-2025-31234, CVE-2025-43463, CVE-2025-43220, CVE-2025-43261, CVE-2025-43233, CVE-2025-31224, CVE-2025-46302, CVE-2025-43185, CVE-2025-24088, CVE-2025-43482, CVE-2026-20611, CVE-2025-43479, CVE-2025-43240, CVE-2026-20623, CVE-2025-31240, CVE-2025-43470, CVE-2025-43368, CVE-2025-43260, CVE-2026-20666, CVE-2025-43477, CVE-2025-43527, CVE-2025-43216, CVE-2026-20618, CVE-2025-43188, CVE-2025-43254, CVE-2026-20676, CVE-2025-43265, CVE-2025-43465, CVE-2026-20681, CVE-2025-43373, CVE-2025-43286, CVE-2026-20626, CVE-2025-43471, CVE-2025-46285, CVE-2025-43343, CVE-2025-43204, CVE-2026-20608, CVE-2025-43255, CVE-2025-43333, CVE-2025-43399, CVE-2026-20650, CVE-2026-20610, CVE-2025-43514, CVE-2025-43237, CVE-2025-43291, CVE-2025-24223, CVE-2025-43218, CVE-2025-31255, CVE-2025-43198, CVE-2025-14174, CVE-2025-43187, CVE-2025-43410, CVE-2025-43251, CVE-2025-43354, CVE-2025-46301, CVE-2025-46279, CVE-2025-43378, CVE-2025-43467, CVE-2025-31243, CVE-2025-43358, CVE-2025-43476, CVE-2025-24222, CVE-2025-43498, CVE-2025-43445, CVE-2025-43194, CVE-2025-43446, CVE-2026-20605, CVE-2025-43279, CVE-2025-31251, CVE-2025-43226, CVE-2025-31241, CVE-2025-43526, CVE-2025-43398, CVE-2025-43336, CVE-2025-43229, CVE-2025-43509, CVE-2025-31247, CVE-2025-43412, CVE-2026-20612, CVE-2025-43321, CVE-2025-46282, CVE-2025-43308, CVE-2025-31239, CVE-2025-31270, CVE-2025-43416, CVE-2025-43409, CVE-2026-20602, CVE-2025-31218, CVE-2025-43311, CVE-2025-31250, CVE-2025-43401, CVE-2025-43472, CVE-2025-43320, CVE-2025-6558, CVE-2025-31221, CVE-2025-43496, CVE-2025-43276, CVE-2025-43302, CVE-2025-43501, CVE-2025-43385, CVE-2025-46277, CVE-2025-43531, CVE-2025-43413, CVE-2025-31245, CVE-2025-43478, CVE-2025-43259, CVE-2025-46278, CVE-2026-20662, CVE-2025-43325, CVE-2025-43281, CVE-2026-20629, CVE-2025-31242, CVE-2025-43282, CVE-2025-43322, CVE-2025-43341, CVE-2025-43516, CVE-2025-31260, CVE-2026-20619, CVE-2025-43319, CVE-2026-20609, CVE-2025-43235, CVE-2025-43407, CVE-2025-43252, CVE-2025-43349, CVE-2025-43243, CVE-2025-46316, CVE-2025-43530, CVE-2025-43395, CVE-2025-43355, CVE-2025-43248, CVE-2025-43342, CVE-2025-24188, CVE-2025-31204, CVE-2025-31235, CVE-2025-43497, CVE-2025-43208, CVE-2025-31236, CVE-2025-43520, CVE-2025-43464, CVE-2025-43414, CVE-2026-20649, CVE-2025-43294, CVE-2026-20669, CVE-2025-43402, CVE-2025-43270, CVE-2025-43406, CVE-2025-43272, CVE-2025-43389, CVE-2025-43366, CVE-2025-43348, CVE-2025-43292, CVE-2025-31248, CVE-2025-31268, CVE-2025-43506, CVE-2026-20656, CVE-2025-43256, CVE-2025-31281, CVE-2025-43186, CVE-2025-43521, CVE-2025-31217, CVE-2025-24224, CVE-2025-31277, CVE-2025-43195, CVE-2025-46283, CVE-2026-20700, CVE-2025-31226, CVE-2025-43469, CVE-2025-43199, CVE-2025-46281, CVE-2026-20667, CVE-2025-43318, CVE-2025-43293, CVE-2025-43388, CVE-2025-43494, CVE-2025-43230, CVE-2026-20634, CVE-2025-43221, CVE-2025-43191, CVE-2025-43225, CVE-2026-20652, CVE-2025-43536, CVE-2025-43295, CVE-2025-43408, CVE-2025-43517 |
CVE-2025-43539, CVE-2025-43535, CVE-2025-43328, CVE-2025-31256, CVE-2025-43253, CVE-2025-43340, CVE-2025-43396, CVE-2025-43314, CVE-2025-43357, CVE-2025-43284, CVE-2025-43317, CVE-2025-43266, CVE-2025-43303, CVE-2025-43213, CVE-2025-46287, CVE-2025-31246, CVE-2026-20680, CVE-2025-43287, CVE-2025-43274, CVE-2026-20630, CVE-2025-31279, CVE-2025-46297, CVE-2025-43285, CVE-2026-20636, CVE-2025-43337, CVE-2025-31219, CVE-2025-31201, CVE-2026-20620, CVE-2025-43250, CVE-2025-43364, CVE-2025-43262, CVE-2025-43247, CVE-2025-43327, CVE-2025-46305, CVE-2025-43209, CVE-2026-20625, CVE-2025-43428, CVE-2025-31206, CVE-2025-43461, CVE-2025-43346, CVE-2025-31212, CVE-2025-46288, CVE-2025-43268, CVE-2025-31257, CVE-2025-43374, CVE-2026-20653, CVE-2026-20673, CVE-2025-43330, CVE-2025-43390, CVE-2025-43304, CVE-2025-31269, CVE-2025-46289, CVE-2025-43334, CVE-2026-20671, CVE-2025-43227, CVE-2025-43372, CVE-2025-43381, CVE-2025-31215, CVE-2026-20647, CVE-2025-31273, CVE-2025-43400, CVE-2025-43206, CVE-2026-20614, CVE-2025-43473, CVE-2025-43499, CVE-2025-43532, CVE-2025-31213, CVE-2025-43329, CVE-2026-20601, CVE-2025-43522, CVE-2025-43394, CVE-2025-43391, CVE-2025-46306, CVE-2025-31278, CVE-2025-43448, CVE-2025-31275, CVE-2025-43211, CVE-2025-46310, CVE-2025-43312, CVE-2025-43224, CVE-2025-43326, CVE-2025-46290, CVE-2025-43367, CVE-2025-46303, CVE-2025-43519, CVE-2025-43214, CVE-2025-43332, CVE-2025-43404, CVE-2025-43232, CVE-2025-43351, CVE-2025-43331, CVE-2025-43344, CVE-2025-43542, CVE-2025-46300, CVE-2025-43384, CVE-2025-43466, CVE-2025-43313, CVE-2025-43353, CVE-2025-31222, CVE-2025-43239, CVE-2025-31258, CVE-2025-43474, CVE-2026-20624, CVE-2025-43196, CVE-2025-43403, CVE-2025-46304, CVE-2025-31259, CVE-2025-43533, CVE-2025-43468, CVE-2025-43275, CVE-2025-31220, CVE-2026-20628, CVE-2025-46291, CVE-2025-31237, CVE-2025-43523, CVE-2025-43356, CVE-2026-20675, CVE-2025-43197, CVE-2026-20646, CVE-2025-43223, CVE-2025-43541, CVE-2025-24197, CVE-2025-30440, CVE-2025-43347, CVE-2025-43192, CVE-2025-43207, CVE-2025-31249, CVE-2025-43361, CVE-2025-43315, CVE-2025-43193, CVE-2025-43359, CVE-2025-31200, CVE-2025-43369, CVE-2026-20641, CVE-2026-20606, CVE-2025-43345, CVE-2025-43244, CVE-2025-43335, CVE-2025-43379, CVE-2026-20644, CVE-2025-43283, CVE-2025-31232, CVE-2025-43510, CVE-2025-43299, CVE-2025-43267, CVE-2025-31244, CVE-2025-43297, CVE-2025-43298, CVE-2025-43518, CVE-2025-43377, CVE-2025-43245, CVE-2025-43397, CVE-2025-43215, CVE-2025-43411, CVE-2025-31233, CVE-2025-43189, CVE-2025-31266, CVE-2025-31238, CVE-2025-31271, CVE-2025-46299, CVE-2025-43234, CVE-2025-43383, CVE-2025-43310, CVE-2025-43393, CVE-2025-43316, CVE-2025-43387, CVE-2025-31209, CVE-2026-20635, CVE-2025-31280, CVE-2025-43222, CVE-2025-43241, CVE-2025-43249, CVE-2025-43296, CVE-2026-20621, CVE-2025-31205, CVE-2025-43382, CVE-2025-43512, CVE-2025-43288, CVE-2025-24274, CVE-2025-31223, CVE-2025-43380, CVE-2025-43305, CVE-2025-43301, CVE-2025-43481, CVE-2025-43212, CVE-2025-46276, CVE-2025-46298, CVE-2025-43190, CVE-2025-43307, CVE-2025-43405, CVE-2026-20654, CVE-2026-20603, CVE-2025-31208, CVE-2025-43420, CVE-2025-43423, CVE-2025-43513, CVE-2025-24142, CVE-2025-43529, CVE-2025-43246, CVE-2026-20648, CVE-2025-31234, CVE-2025-43463, CVE-2025-43220, CVE-2025-43261, CVE-2025-43233, CVE-2025-31224, CVE-2025-46302, CVE-2025-43185, CVE-2025-24088, CVE-2025-43482, CVE-2026-20611, CVE-2025-43479, CVE-2025-43240, CVE-2026-20623, CVE-2025-31240, CVE-2025-43470, CVE-2025-43368, CVE-2025-43260, CVE-2026-20666, CVE-2025-43477, CVE-2025-43527, CVE-2025-43216, CVE-2026-20618, CVE-2025-43188, CVE-2025-43254, CVE-2026-20676, CVE-2025-43265, CVE-2025-43465, CVE-2026-20681, CVE-2025-43373, CVE-2025-43286, CVE-2026-20626, CVE-2025-43471, CVE-2025-46285, CVE-2025-43343, CVE-2025-43204, CVE-2026-20608, CVE-2025-43255, CVE-2025-43333, CVE-2025-43399, CVE-2026-20650, CVE-2026-20610, CVE-2025-43514, CVE-2025-43237, CVE-2025-43291, CVE-2025-24223, CVE-2025-43218, CVE-2025-31255, CVE-2025-43198, CVE-2025-14174, CVE-2025-43187, CVE-2025-43410, CVE-2025-43251, CVE-2025-43354, CVE-2025-46301, CVE-2025-46279, CVE-2025-43378, CVE-2025-43467, CVE-2025-31243, CVE-2025-43358, CVE-2025-43476, CVE-2025-24222, CVE-2025-43498, CVE-2025-43445, CVE-2025-43194, CVE-2025-43446, CVE-2026-20605, CVE-2025-43279, CVE-2025-31251, CVE-2025-43226, CVE-2025-31241, CVE-2025-43526, CVE-2025-43398, CVE-2025-43336, CVE-2025-43229, CVE-2025-43509, CVE-2025-31247, CVE-2025-43412, CVE-2026-20612, CVE-2025-43321, CVE-2025-46282, CVE-2025-43308, CVE-2025-31239, CVE-2025-31270, CVE-2025-43416, CVE-2025-43409, CVE-2026-20602, CVE-2025-31218, CVE-2025-43311, CVE-2025-31250, CVE-2025-43401, CVE-2025-43472, CVE-2025-43320, CVE-2025-6558, CVE-2025-31221, CVE-2025-43496, CVE-2025-43276, CVE-2025-43302, CVE-2025-43501, CVE-2025-43385, CVE-2025-46277, CVE-2025-43531, CVE-2025-43413, CVE-2025-31245, CVE-2025-43478, CVE-2025-43259, CVE-2025-46278, CVE-2026-20662, CVE-2025-43325, CVE-2025-43281, CVE-2026-20629, CVE-2025-31242, CVE-2025-43282, CVE-2025-43322, CVE-2025-43341, CVE-2025-43516, CVE-2025-31260, CVE-2026-20619, CVE-2025-43319, CVE-2026-20609, CVE-2025-43235, CVE-2025-43407, CVE-2025-43252, CVE-2025-43349, CVE-2025-43243, CVE-2025-46316, CVE-2025-43530, CVE-2025-43395, CVE-2025-43355, CVE-2025-43248, CVE-2025-43342, CVE-2025-24188, CVE-2025-31204, CVE-2025-31235, CVE-2025-43497, CVE-2025-43208, CVE-2025-31236, CVE-2025-43520, CVE-2025-43464, CVE-2025-43414, CVE-2026-20649, CVE-2025-43294, CVE-2026-20669, CVE-2025-43402, CVE-2025-43270, CVE-2025-43406, CVE-2025-43272, CVE-2025-43389, CVE-2025-43366, CVE-2025-43348, CVE-2025-43292, CVE-2025-31248, CVE-2025-31268, CVE-2025-43506, CVE-2026-20656, CVE-2025-43256, CVE-2025-31281, CVE-2025-43186, CVE-2025-43521, CVE-2025-31217, CVE-2025-24224, CVE-2025-31277, CVE-2025-43195, CVE-2025-46283, CVE-2026-20700, CVE-2025-31226, CVE-2025-43469, CVE-2025-43199, CVE-2025-46281, CVE-2026-20667, CVE-2025-43318, CVE-2025-43293, CVE-2025-43388, CVE-2025-43494, CVE-2025-43230, CVE-2026-20634, CVE-2025-43221, CVE-2025-43191, CVE-2025-43225, CVE-2026-20652, CVE-2025-43536, CVE-2025-43295, CVE-2025-43408, CVE-2025-43517 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_CMS.2, ATE_COV.1, AGD_OPE.1, AVA_VAN.2, ASE_ECD.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_CMC.2, ADV_FSP.3, ALC_FLR.3, AGD_PRE.1, ADV_TDS.1, ATE_IND.2, ATE_FUN.1, ASE_CCL.1 |
ALC_CMS.2, ATE_COV.1, AGD_OPE.1, AVA_VAN.2, ASE_ECD.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_CMC.2, ADV_FSP.3, ALC_FLR.3, AGD_PRE.1, ADV_TDS.1, ATE_IND.2, ATE_FUN.1, ASE_CCL.1 |
| heuristics/extracted_versions |
15.4 |
15.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- category: Otras herramientas
- certification_date: 16.01.2026
- enhanced:
- category: Otras herramientas
- cc_version: CC/CEM:2022 Release 1
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2447
- certification_date: 16.01.2026
- description: The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. MacOS also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions.
- evaluation_facility: Applus Laboratories
- level: EAL2 + ADV_FSP.3, ALC_FLR.3
- manufacturer: Apple Inc.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2448
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2446
- type: Product
- manufacturer: Apple Inc.
- product: Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sequoia 15.4
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1084-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sequoia-15-4
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
Certificat-ANSSI-CC-2025_36fr.pdf |
2025-11_Certificado.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2+: 1
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ANSSI-CC-2025_36fr.pdf |
2025-11_INF-4674.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 8
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 8
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.3: 8
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_ACC: 3
- FDP_ACF: 3
- FDP_DAU.1: 1
- FDP_ETC: 1
- FDP_ITC.1: 1
- FDP_ITT.1: 1
- FDP_RIP.1: 1
- FDP_UCT: 2
- FDP_UIT: 2
- FIA:
- FIA_AFL: 2
- FIA_ATD.1: 1
- FIA_UAU.5: 1
- FIA_UAU.6: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMR.1: 1
- FPR:
- FPT:
- FTP:
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- ISO:
- ISO/IEC 15408-: 1
- ISO/IEC 18045:2022: 1
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 446270
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
| pdf_data/st_filename |
ANSSI-Cible-CC-2025_36en.pdf |
2025-11_ST.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 2
- ADV_FSP.2: 4
- ADV_FSP.3: 3
- ADV_TDS.1: 4
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR: 1
- ALC_FLR.3: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 12
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 23
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 10
- FDP_ITC.1: 4
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT: 8
- FDP_ITT.1.1: 2
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 1
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 2
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 17
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 10
- FPT_RPL.1: 4
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 10
- FDP_ACC.2: 4
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 23
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 4
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ETC: 8
- FDP_ETC.2: 2
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC.1: 9
- FDP_ITC.1: 4
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 4
- FDP_ITT.1.1: 1
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FDP_SDI.1: 9
- FDP_SDI.1.1: 1
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 1
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 2
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 16
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITC.1: 4
- FPT_ITC.1.1: 1
- FPT_RPL: 8
- FPT_RPL.1: 6
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.DEVICE_AUTH: 3
- A.NO_EVIL_ROOT_USER: 2
- A.PERSO: 4
- A.WATCH_USER: 4
- D:
- T:
- T.COR-: 1
- T.CORRUPT: 3
- T.PHYSI-: 1
- T.PHYSICAL: 1
- T.RE-: 1
- T.RECOVER: 3
- T.REPLAY: 2
- T.SILENT: 3
- T.SKIM-: 1
- T.SKIMMING: 2
- T.USURP: 4
|
- A:
- A.DEVICE_AUTH: 3
- A.NO_EVIL_ROOT_USER: 3
- A.NO_EXTERNAL_KEY-: 1
- A.NO_EXTERNAL_KEYBOARD: 1
- A.PERSO: 4
- A.WATCH_USER: 4
- D:
- T:
- T.CORRUPT: 4
- T.PHYSICAL: 2
- T.RECOVER: 4
- T.REPLAY: 2
- T.SILENT: 3
- T.SKIM-: 1
- T.SKIMMING: 2
- T.USURP: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* T.RE- COVER: 1
|
- OutOfScope:
- Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
- out of scope: 2
- pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong Customer: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20250812181208Z
- /Creator: Word
- /ModDate: D:20250812191229+01'00'
- /Producer: Adobe Mac PDF Plug-in
- /Title: Microsoft Word - [ST] Macmini_M4_Keyboard_macOS15_SecurityTarget_v1.4.docx
- pdf_file_size_bytes: 2944602
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 1053984
- pdf_hyperlinks: https://support.apple.com/HT201371, https://support.apple.com/en-us/HT204587, https://support.apple.com/HT201260, https://support.apple.com/HT201221, https://support.apple.com/HT201222, https://lists.apple.com/mailman/listinfo/security-announce/, https://support.apple.com/HT201541, https://support.apple.com/HT204899, https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0, https://developer.apple.com/documentation/security/, https://support.apple.com/HT201220, https://support.apple.com/102633, https://support.apple.com/HT206995, https://www.apple.com/, https://support.apple.com/guide/macbook-air, https://support.apple.com/en-us/HT201581, https://support.apple.com/apple-pay, https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web, https://support.apple.com/102664, https://support.apple.com/HT201862, https://www.apple.com/legal/sla/docs/macOSSequoia.pdf, https://support.apple.com/guide/security/welcome/web, https://privacy.apple.com/, https://support.apple.com/HT212225, https://checkcoverage.apple.com/, https://developer.apple.com/documentation/bundleresources/entitlements/com.apple.developer.in-app-payments, https://support.apple.com/guide/mac-help/welcome/mac, https://apply.applecard.apple/
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |