This page was not yet optimized for use on mobile
devices.
MOzART Command Center Web Portal v1.1
CSV information
| Status | active |
|---|---|
| Valid from | 26.07.2021 |
| Valid until | 26.07.2026 |
| Scheme | đ˛đž MY |
| Manufacturer | Certis CISCO Security Pte Ltd (Certis) |
| Category | Other Devices and Systems |
| Security level | EAL2 |
Heuristics summary
Certificate ID: ISCB-5-RPT-C117-CR-v1
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL2Certification report
Extracted keywords
Protocols
TLSv1.2Security level
EAL2, EAL 2Claims
A.ADMINISTRATOR, A.TIMESTAMP, A.PHYSICAL_ENVIRONMENT, A.MALWARE, A.DDOS, A.THIRDPARTYSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FDP_ACC.1, FDP_ACF.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.5, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FTP_TRP.1Certificates
ISCB-5-RPT-C117-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
| Creation date | D:20210805054112Z00'00' |
|---|---|
| Modification date | D:20210805054112Z00'00' |
| Pages | 38 |
| Creator | Word |
| Producer | macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext |
Security target
Extracted keywords
Protocols
SSL, TLS, TLSv1.2, TLS 1.2Vendor
MicrosoftSecurity level
EAL 2, EAL2Claims
O.SEC_ACCESS, O.SEC_AUTHENTICATE, O.SEC_COMMUNICATION, T.BROKEN_AUTH, T.UNAUTHORIZED_ACCESS, T.INTERCEPTION, A.ADMINISTRATOR, A.TIMESTAMP, A.PHYSICAL_ENVIRONMENT, A.MALWARE, A.DDOS, A.THIRDPARTY, OE.ADMINISTRATOR, OE.SYN_TIMESTAMP, OE.SAFE_PHYSICAL_ENV, OE.ANTI_MALWARE, OE.ANTI_DDOS, OE.THIRDPARTYSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_ECD.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECDSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_AFL.1, FIA_UAU.1, FIA_ATD.1, FIA_SOS.1, FIA_UID.1, FIA_UAU.5, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.3, FPT_STM.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certification process
out of scope, to the integrated thirdâparty APIs which feeds data to the TOE. The following are categorized as out of scope from the selected TOE: Database server web application server application server The table, physical scope of the TOE boxed in dotted lines. Both Video Stream and API Services are deemed as out of scope. All hardware appliances/devices, software components and integrated thirdâparty physical securityFile metadata
| Creation date | D:20210630170155+08'00' |
|---|---|
| Modification date | D:20210721081156+08'00' |
| Pages | 44 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 10.1.16 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-5-RPT-C117-CR-v1Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data
| Cert No | 2021-006-C117 | |
|---|---|---|
| Developer | Certis CISCO Security Pte Ltd | |
| Level | EAL2 | |
| Product | MOzART Command Center Web Portal v1.1 | |
| Certification Date | 26.07.2021 | |
| Expiration Date | 26.07.2026 | |
| Recognition | CCRA | |
| Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/129 | |
| Enhanced | ||
| Developer | 20 Jalan AfifiSingapore 409179 T: +65 6747 2888F: +65 6744 0039Email: [email protected]: +65 6856 8799 https://www.certisgroup.com | |
| Status | Valid | |
| Scope | The Target of Evaluation (TOE) is a web-based application portal called the MOzART Command Center Web Portal (MOzART CC) which provides TOE users means of monitoring, operating, managing and administering physical security incidents through the Intranet (private network). The MOzART CC allows consumers to have a âone-to-allâ control over many integrated physical security appliances such as fire alarm triggers, surveillance cameras, parameter sensors and entry alarm triggers around a designated premise. All modules/functions on the same private network related to the querying of live data, feeds by the third-party APIs (supporting non-TOE software) and displayed by the TOE will not require Internet connection. The MOzART CC is a highly sophisticated Command Center, acting as the user interface for TOE users (in their respective roles as an operator, supervisor or administrator) to monitor events, operate cases, manage cases, and administer the MOzART CC itself. | |
| Cert Id | C117 | |
| Category | Other Devices and Systems | |
| Assurance Level | EAL2 | |
| Product | MOzART Command Center Web Portal v1.1 | |
| Certification Date | 26.07.2021 | |
| Expiration Date | 26.07.2026 | |
| Mutual Recognition | CCRA | |
| Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C117/Mozart_Command_Center_Web_Portal_Security_Target_v1.26.pdf | |
| Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C117/ISCB-5-RPT-C117-CR-v1.pdf | |
| Type | A collection of appliances that form a security infrastructure for an enterprise network | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C117-CERTIFICATE-V1_.pdf",
"dgst": "d297d3b91330b408",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C117-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2021-006-C117",
"certification_date": "2021-07-26",
"developer": "Certis CISCO Security Pte Ltd",
"enhanced": {
"assurance_level": "EAL2",
"category": "Other Devices and Systems",
"cert_id": "C117",
"certification_date": "2021-07-26",
"developer": "20 Jalan AfifiSingapore 409179 T: +65 6747 2888F: +65 6744 0039Email: [email protected]: +65 6856 8799 https://www.certisgroup.com",
"expiration_date": "2026-07-26",
"mutual_recognition": "CCRA",
"product": "MOzART Command Center Web Portal v1.1",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C117/ISCB-5-RPT-C117-CR-v1.pdf",
"scope": "The Target of Evaluation (TOE) is a web-based application portal called the MOzART Command Center Web Portal (MOzART CC) which provides TOE users means of monitoring, operating, managing and administering physical security incidents through the Intranet (private network). The MOzART CC allows consumers to have a \u201cone-to-all\u201d control over many integrated physical security appliances such as fire alarm triggers, surveillance cameras, parameter sensors and entry alarm triggers around a designated premise. All modules/functions on the same private network related to the querying of live data, feeds by the third-party APIs (supporting non-TOE software) and displayed by the TOE will not require Internet connection. The MOzART CC is a highly sophisticated Command Center, acting as the user interface for TOE users (in their respective roles as an operator, supervisor or administrator) to monitor events, operate cases, manage cases, and administer the MOzART CC itself.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C117/Mozart_Command_Center_Web_Portal_Security_Target_v1.26.pdf",
"type": "A collection of appliances that form a security infrastructure for an enterprise network"
},
"expiration_date": "2026-07-26",
"level": "EAL2",
"product": "MOzART Command Center Web Portal v1.1",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/129"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Certis CISCO Security Pte Ltd (Certis)",
"manufacturer_web": "https://www.certisgroup.com/",
"name": "MOzART Command Center Web Portal v1.1",
"not_valid_after": "2026-07-26",
"not_valid_before": "2021-07-26",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "ISCB-5-CERT-C117-CERTIFICATE-V1_.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C117-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C117-CR-v1": 37
}
},
"cc_claims": {
"A": {
"A.ADMINISTRATOR": 1,
"A.DDOS": 1,
"A.MALWARE": 1,
"A.PHYSICAL_ENVIRONMENT": 1,
"A.THIRDPARTY": 1,
"A.TIMESTAMP": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 5,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 36,
"FAU_GEN.2": 10
},
"FDP": {
"FDP_ACC.1": 26,
"FDP_ACF.1": 8
},
"FIA": {
"FIA_AFL.1": 3,
"FIA_ATD.1": 8,
"FIA_SOS.1": 5,
"FIA_UAU.1": 1,
"FIA_UAU.5": 3,
"FIA_UID.1": 1
},
"FTP": {
"FTP_TRP.1": 39
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLSv1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210805054112Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210805054112Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 901437,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "Mozart Command Center Web Portal Security Target v1.26.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMINISTRATOR": 4,
"A.DDOS": 4,
"A.MALWARE": 3,
"A.PHYSICAL_ENVIRONMENT": 4,
"A.THIRDPARTY": 3,
"A.TIMESTAMP": 3
},
"O": {
"O.SEC_ACCESS": 5,
"O.SEC_AUTHENTICATE": 5,
"O.SEC_COMMUNICATION": 5
},
"OE": {
"OE.ADMINISTRATOR": 3,
"OE.ANTI_DDOS": 3,
"OE.ANTI_MALWARE": 3,
"OE.SAFE_PHYSICAL_ENV": 3,
"OE.SYN_TIMESTAMP": 3,
"OE.THIRDPARTY": 3
},
"T": {
"T.BROKEN_AUTH": 4,
"T.INTERCEPTION": 4,
"T.UNAUTHORIZED_ACCESS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD": 1,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 5,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2,
"EAL2": 22
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1
},
"FDP": {
"FDP_ACC.1": 8,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.3": 2
},
"FPT": {
"FPT_STM.1": 2
},
"FTP": {
"FTP_TRP.1": 7,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 2,
"physical scope of the TOE boxed in dotted lines. Both Video Stream and API Services are deemed as out of scope. All hardware appliances/devices, software components and integrated third\u2010party physical security": 1,
"to the integrated third\u2010party APIs which feeds data to the TOE. The following are categorized as out of scope from the selected TOE: Database server web application server application server The table": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 2,
"TLS 1.2": 4,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20210630170155+08\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20210721081156+08\u002700\u0027",
"/Producer": "Acrobat Distiller 10.1.16 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 955878,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 44
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C117-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Mozart%20Command%20Center%20Web%20Portal%20Security%20Target%20v1.26.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "52db58401c641d748ea414a153dda167048bf29e801c3a913169a157a1554dd8",
"txt_hash": "7f44c41fdd943d19b7c015df98edcd43093df285d2c1056047f77e1c47b79f36"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "aa823d9e9017bafab7bb76bb12ce32a4af03f56ef0cca4c0fb8105d420281f3a",
"txt_hash": "95734d719cef301ff8a592cff415af9830c0b373855da7f64a57cfe070d7b1d2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "51bd5258ffb62124bfb3a545dbf0496f771f169e8ecc79b5d32a6df9ef089467",
"txt_hash": "bd2fe25917ce7b5e5cbde4d8b29025c450093e32792c8ee5ca1d6cf8a3aff305"
}
},
"status": "active"
}