name |
EPSON LM-C6000/LM-C5000/LM-C4000/AM-C6000/AM-C5000/AM-C4000 with FAX1.00 |
NetApp Storage Encryption (NSE) Running ONTAP 9.14.1 |
category |
Multi-Function Devices |
Other Devices and Systems |
scheme |
JP |
US |
status |
active |
active |
not_valid_after |
14.12.2028 |
18.11.2026 |
not_valid_before |
14.12.2023 |
18.11.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11477-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11477-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11477-st.pdf |
manufacturer |
SEIKO EPSON CORPORATION |
NetApp, Inc. |
manufacturer_web |
https://www.epson.com/ |
https://www.netapp.com/ |
security_level |
EAL2, ALC_FLR.2 |
{} |
dgst |
f6aad6ac7a2f5f2d |
ebcbec6fc7d39ca6 |
heuristics/cert_id |
JISEC-CC-CRP-C0803-01-2023 |
CCEVS-VR-VID-11477-2024 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2024-38475, CVE-2024-6119, CVE-2024-26458, CVE-2024-26461, CVE-2022-42915, CVE-2023-27535 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ALC_DEL.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 |
ALC_CMS.1, ASE_CCL.1, AGD_PRE.1, ADV_FSP.1, ASE_INT.1, AVA_VAN.1, ASE_OBJ.1, ASE_ECD.1, ASE_SPD.1, ATE_FUN.1, ATE_IND.1, ASE_TSS.1, ASE_REQ.1, ALC_CMC.1, AGD_OPE.1 |
heuristics/extracted_versions |
1.00 |
9.14.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0803
- certification_date: 01.12.2023
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0803
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE security functionality The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
- evaluation_facility: Information Technology Security Center, Evaluation Department
- product: EPSON LM-C6000/LM-C5000/LM-C4000/ AM-C6000/AM-C5000/AM-C4000 with FAX
- product_type: Multifunction Peripheral
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_est.pdf
- toe_version: 1.00
- vendor: SEIKO EPSON CORPORATION
- expiration_date:
- supplier: SEIKO EPSON CORPORATION
- toe_japan_name: EPSON LM-C6000 / LM-C5000 / LM-C4000 / AM-C6000 / AM-C5000 / AM-C4000 with FAX 1.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0803_it2837.html
- toe_overseas_name: EPSON LM-C6000 / LM-C5000 / LM-C4000 / AM-C6000 / AM-C5000 / AM-C4000 with FAX 1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
43ce79b420f23a00 |
52d782dbb1cd05bd |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_AA_V2.0E.pdf |
pdf_data/cert_filename |
c0803_eimg.pdf |
st_vid11477-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0803-01-2023: 1
|
- US:
- CCEVS-VR-VID11477-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20240118104935+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20240118105338+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20240118014904
- /Subject:
- /Title:
- pdf_file_size_bytes: 234774
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /Producer: WeasyPrint 62.3
- /Title: VID11477-FINAL CERT
- pdf_file_size_bytes: 136132
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0803_erpt.pdf |
st_vid11477-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID11477-2024
- cert_item: for NetApp Storage Encryption (NSE) Running ONTAP 9.14.1
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0803-01-2023: 1
|
- US:
- CCEVS-VR-VID11477-2024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- NIST:
- NIST SP 800-132: 1
- NIST SP 800-38F: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- not tested in the evaluated configuration. System Manager GUI The System Manager GUI is considered out of scope and all management is performed via the command line interface. VMware Virtualization VMware: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20240117103337+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20240117103448+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20240117012203
- pdf_file_size_bytes: 395424
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
|
pdf_data/st_filename |
c0803_est.pdf |
st_vid11477-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 12
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 24
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 2
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 12
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_AFA_EXT: 4
- FCS_AFA_EXT.1: 7
- FCS_AFA_EXT.1.1: 2
- FCS_AFA_EXT.2: 6
- FCS_AFA_EXT.2.1: 1
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_CKM_EXT.4: 16
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 45
- FCS_COP.1.1: 9
- FCS_KDF_EXT: 4
- FCS_KDF_EXT.1: 7
- FCS_KDF_EXT.1.1: 1
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 4
- FCS_KYC_EXT.1.1: 1
- FCS_KYC_EXT.1.2: 1
- FCS_KYC_EXT.2: 2
- FCS_PCC_EXT: 4
- FCS_PCC_EXT.1: 8
- FCS_PCC_EXT.1.1: 1
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 12
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SNI_EXT: 2
- FCS_SNI_EXT.1: 7
- FCS_SNI_EXT.1.1: 1
- FCS_SNI_EXT.1.2: 1
- FCS_SNI_EXT.1.3: 1
- FCS_VAL_EXT: 2
- FCS_VAL_EXT.1: 9
- FCS_VAL_EXT.1.1: 1
- FCS_VAL_EXT.1.2: 1
- FCS_VAL_EXT.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 4
- FPT_KYP_EXT.1: 5
- FPT_KYP_EXT.1.1: 2
- FPT_PWR_EXT: 8
- FPT_PWR_EXT.1: 8
- FPT_PWR_EXT.1.1: 1
- FPT_PWR_EXT.2: 4
- FPT_PWR_EXT.2.1: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 4
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 11
- D.DOC: 42
- D.FUNC: 26
- D.PROT: 8
- O:
- O.AUDIT: 5
- O.AUDIT_ACCESS: 4
- O.AUDIT_STORAGE: 4
- O.CONF: 10
- O.DOC: 10
- O.FUNC: 5
- O.INTERFACE: 5
- O.PROT: 5
- O.SOFTWARE: 5
- O.USER: 11
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHISICAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- OE:
- OE.INITIAL_DRIVE_STATE: 1
- OE.PASSPHRASE_STRENGTH: 1
- OE.PHYSICAL: 1
- OE.PLATFORM_STATE: 1
- OE.POWER_DOWN: 1
- OE.SINGLE_USE_ET: 1
- OE.STRONG_ENVIRONMENT_CRYPTO: 1
- OE.TRAINED_USERS: 1
- OE.TRUSTED_CHANNEL: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 8
- AES-128: 1
- AES-256: 5
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA2:
- SHA-256: 9
- SHA-384: 5
- SHA-512: 9
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 186-4: 2
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 18031:2011: 1
- ISO/IEC 18033-3: 1
- ISO/IEC 9796-2: 2
- NIST:
- NIST SP 800-132: 5
- NIST SP 800-38F: 2
- NIST SP 800-90A: 3
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- not tested in the evaluated configuration. System Manager GUI The System Manager GUI is considered out of scope and all management is performed via the command line interface. VMware Virtualization VMware: 1
- out of scope: 2
- to the security functional requirements specified in this Security Target. The features below are out of scope. Feature Description SnapLock NetApp SnapLock is the WORM (write once, read many) compliance: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20240111155300+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240111155300+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1539224
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |