Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S- 6000, S-6000DNS, S-6000DDoS and microDefender appliances
CSV information ?
Status | active |
---|---|
Valid from | 16.04.2020 |
Valid until | 16.04.2025 |
Scheme | 🇲🇾 MY |
Manufacturer | Invisiron Pte Ltd |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2File metadata
Title | Microsoft Word - ISCB-5-CERT-C111-CERTIFICATE-v1.docx |
---|---|
Creation date | D:20200423022656Z00'00' |
Modification date | D:20200423022656Z00'00' |
Pages | 1 |
Creator | Word |
Producer | macOS Version 10.15.3 (Build 19D76) Quartz PDFContext |
Certification report ?
Extracted keywords
Schemes
MACProtocols
SSH, SSL, TLS v1.2Security level
EAL2, EAL 2Claims
A.NOEVIL, A.PHYSEC, A.SINGENSecurity Functional Requirements (SFR)
FAU_GEN.1, FDP_ACC.1, FIA_UID.2, FIA_ATD.1, FIA_SOS.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.3, FMT_MOF.1, FPT_STM.1, FTP_TRP.1Certificates
ISCB-5-RPT-C111-CR-v1aStandards
ISO/IEC15408, ISO/IEC 18045File metadata
Title | ISCB-3-LTR-M012-TERMINATE_Logrhythm_v7.4-v1 |
---|---|
Author | HZ |
Creation date | D:20200422114328Z00'00' |
Modification date | D:20200422114328Z00'00' |
Pages | 34 |
Creator | Word |
Producer | macOS Version 10.15.3 (Build 19D76) Quartz PDFContext |
Security target ?
Extracted keywords
Schemes
MACProtocols
SSH, SSL, TLS v1.2Vendor
STM, MicrosoftSecurity level
EAL2Claims
O.ACCOUN, O.AUDREC, O.IDAUTH, O.MEDIAT, O.SECFUN, O.SECSTA, O.SINUSE, O.TOECOM, O.SENSOR, O.ANALYZER, O.RESPONSE, O.REVIEW, O.STORAGE, T.AUDACC, T.AUDFUL, T.MEDIAT, T.NOAUTH, T.OLDINF, T.REPLAY, T.SELPRO, T.TOECOM, T.TUSAGE, T.MISUSE, T.INFLUX, T.MALICE, A.NOEVIL, A.PHYSEC, A.SINGEN, OE.ADMTRA, OE.GUIDAN, OE.PHYSEC, OE.SINGENSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UID.2, FIA_SOS.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FIA_SOS.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
malfunctionFile metadata
Title | Microsoft Word - Invisiron CDP Security Target v1.0.docx |
---|---|
Creation date | D:20200318172827Z00'00' |
Modification date | D:20200318172827Z00'00' |
Pages | 45 |
Creator | Word |
Producer | macOS Version 10.15.3 (Build 19D76) Quartz PDFContext |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2Scheme data ?
Cert No | 2020-002-C111 | |
---|---|---|
Developer | Invisiron Pte Ltd | |
Level | EAL2 | |
Product | Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S-6000, S-6000DNS, S-6000DDoS and microDefender appliances | |
Certification Date | 16.04.2020 | |
Expiration Date | 16.04.2025 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/106 | |
Enhanced | ||
Cert Id | C111 | |
Product | Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S-6000, S-6000DNS, S-6000DDoS and microDefender appliances | |
Developer | 1 Pemimpin Drive #08-03, One Pemimpin, Singapore 576151 | |
Category | Network and Network-Related Devices and Systems | |
Type | Network and Network-Related Devices and Systems | |
Scope | The TOE is a software and hardware appliance. Each appliance model operate using an identical software image with identical functionality. The TOE is used as a network monitoring and incident management platform. They implement an intrusion and prevention system and reputation based detection. In addition to the security engines the TOE also provides security event logging and packet capture. This data is stored in files which can be exported out from the platforms. The TOE physical boundary defines all hardware and software that is required to support the TOE’s logical boundary as well as the TOE’s security functionality. | |
Assurance Level | EAL2 | |
Certification Date | 16.04.2020 | |
Expiration Date | 16.04.2025 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C111/Invisiron_CDP_Security_Target_v10.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C111/ISCB-5-RPT-C111-CR-v1a.pdf | |
Status | Valid |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2020-04-16', 'expiration_date': '2025-04-16', 'enhanced': {'__update__': {'certification_date': '2020-04-16', 'expiration_date': '2025-04-16'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd34850d4d01c4f52d4d9a932afeddec38fd150b8852d6e63a65655dde08a3b7f', 'txt_hash': '2aba35ab2e8b2ebfc57bfcdd2fd4450e1208fb281723cbdf8faff44586e2b473'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0ee9ef2cb62d8349a4e64b39818812f7ee4a0f4bda28289d01c0c65b3a78950d', 'txt_hash': '1dc459f028e44d59824ce52783aa7a2900f96e254acdc771d1a81846c8d0f245'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 3592417, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/Title': 'Microsoft Word - Invisiron CDP Security Target v1.0.docx', '/Producer': 'macOS Version 10.15.3 (Build 19D76) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200318172827Z00'00'", '/ModDate': "D:20200318172827Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 267175, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'Microsoft Word - ISCB-5-CERT-C111-CERTIFICATE-v1.docx', '/Producer': 'macOS Version 10.15.3 (Build 19D76) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200423022656Z00'00'", '/ModDate': "D:20200423022656Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 4, 'ASE_SPD.1': 4, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_TSS.1': 4, 'ASE_ECD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_SAR.1': 6, 'FAU_GEN.1.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FDP': {'FDP_ACC.1': 10, 'FDP_ACF.1': 4, 'FDP_IFF': 2, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_AFL.1': 5, 'FIA_UAU.2': 6, 'FIA_UID.2': 5, 'FIA_SOS.1': 6, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 5, 'FIA_UID.2.1': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.3': 11, 'FMT_MTD.1': 8, 'FMT_MOF.1': 7, 'FMT_SMF.1': 10, 'FMT_SMR.1': 15, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 7, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_TRP.1': 6, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCOUN': 4, 'O.AUDREC': 4, 'O.IDAUTH': 4, 'O.MEDIAT': 4, 'O.SECFUN': 4, 'O.SECSTA': 4, 'O.SINUSE': 4, 'O.TOECOM': 4, 'O.SENSOR': 4, 'O.ANALYZER': 4, 'O.RESPONSE': 4, 'O.REVIEW': 4, 'O.STORAGE': 4}, 'T': {'T.AUDACC': 4, 'T.AUDFUL': 2, 'T.MEDIAT': 3, 'T.NOAUTH': 2, 'T.OLDINF': 3, 'T.REPLAY': 3, 'T.SELPRO': 2, 'T.TOECOM': 2, 'T.TUSAGE': 4, 'T.MISUSE': 8, 'T.INFLUX': 2, 'T.MALICE': 4}, 'A': {'A.NOEVIL': 3, 'A.PHYSEC': 2, 'A.SINGEN': 3}, 'OE': {'OE.ADMTRA': 3, 'OE.GUIDAN': 3, 'OE.PHYSEC': 3, 'OE.SINGEN': 3}}, 'vendor': {'STMicroelectronics': {'STM': 2}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'SSH': {'SSH': 6}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS v1.2': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Invisiron CDP Security Target v1.0.pdf
. - The cert_filename property was set to
ISCB-5-CERT-C111-CERTIFICATE-v1.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5b8d80c017bc3cb3e57a242efdea9ff5af4461ca73de0425fa78361755b5b861', 'txt_hash': 'c5ac7aeccb40e72e065f2f04fdc90752422023e6795a48617ace67054c6dc858'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1284643, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 34, '/Title': 'ISCB-3-LTR-M012-TERMINATE_Logrhythm_v7.4-v1', '/Producer': 'macOS Version 10.15.3 (Build 19D76) Quartz PDFContext', '/Author': 'HZ', '/Creator': 'Word', '/CreationDate': "D:20200422114328Z00'00'", '/ModDate': "D:20200422114328Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C111-CR-v1a': 34}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2, 'EAL 2': 4}}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}, 'FDP': {'FDP_ACC.1': 1}, 'FIA': {'FIA_UID.2': 1, 'FIA_ATD.1': 1, 'FIA_SOS.1': 1}, 'FMT': {'FMT_SMR.1': 1, 'FMT_SMF.1': 1, 'FMT_MSA.3': 1, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 1}, 'FTP': {'FTP_TRP.1': 1}}, 'cc_claims': {'A': {'A.NOEVIL': 1, 'A.PHYSEC': 1, 'A.SINGEN': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'SSL': {'SSL': 4}, 'TLS': {'TLS v1.2': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C111-CR-v1a.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C111-CR-v1a
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C111-CR-v1a.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Invisiron%20CDP%20Security%20Target%20v1.0.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S- 6000, S-6000DNS, S-6000DDoS and microDefender appliances was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C111-CERTIFICATE-v1.pdf",
"dgst": "e575168e537a9fe0",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C111-CR-v1a",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2020-002-C111",
"certification_date": "2020-04-16",
"developer": "Invisiron Pte Ltd",
"enhanced": {
"assurance_level": "EAL2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C111",
"certification_date": "2020-04-16",
"developer": "1 Pemimpin Drive #08-03, One Pemimpin, Singapore 576151",
"expiration_date": "2025-04-16",
"mutual_recognition": "CCRA",
"product": "Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S-6000, S-6000DNS, S-6000DDoS and microDefender appliances",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C111/ISCB-5-RPT-C111-CR-v1a.pdf",
"scope": "The TOE is a software and hardware appliance. Each appliance model operate using an identical software image with identical functionality. The TOE is used as a network monitoring and incident management platform. They implement an intrusion and prevention system and reputation based detection. In addition to the security engines the TOE also provides security event logging and packet capture. This data is stored in files which can be exported out from the platforms. The TOE physical boundary defines all hardware and software that is required to support the TOE\u2019s logical boundary as well as the TOE\u2019s security functionality.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C111/Invisiron_CDP_Security_Target_v10.pdf",
"type": "Network and Network-Related Devices and Systems"
},
"expiration_date": "2025-04-16",
"level": "EAL2",
"product": "Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S-6000, S-6000DNS, S-6000DDoS and microDefender appliances",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/106"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Invisiron Pte Ltd",
"manufacturer_web": "https://invisiron.com",
"name": "Invisiron Cyber Defence Platform 3.1.0 executing on S-1000, S-2000, S-4000, S- 6000, S-6000DNS, S-6000DDoS and microDefender appliances",
"not_valid_after": "2025-04-16",
"not_valid_before": "2020-04-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C111-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20200423022656Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20200423022656Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.3 (Build 19D76) Quartz PDFContext",
"/Title": "Microsoft Word - ISCB-5-CERT-C111-CERTIFICATE-v1.docx",
"pdf_file_size_bytes": 267175,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C111-CR-v1a.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C111-CR-v1a": 34
}
},
"cc_claims": {
"A": {
"A.NOEVIL": 1,
"A.PHYSEC": 1,
"A.SINGEN": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 4,
"EAL2": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1
},
"FDP": {
"FDP_ACC.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_SOS.1": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MSA.3": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_STM.1": 1
},
"FTP": {
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
},
"TLS": {
"SSL": {
"SSL": 4
},
"TLS": {
"TLS v1.2": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "HZ",
"/CreationDate": "D:20200422114328Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20200422114328Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.3 (Build 19D76) Quartz PDFContext",
"/Title": "ISCB-3-LTR-M012-TERMINATE_Logrhythm_v7.4-v1",
"pdf_file_size_bytes": 1284643,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
},
"st_filename": "Invisiron CDP Security Target v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NOEVIL": 3,
"A.PHYSEC": 2,
"A.SINGEN": 3
},
"O": {
"O.ACCOUN": 4,
"O.ANALYZER": 4,
"O.AUDREC": 4,
"O.IDAUTH": 4,
"O.MEDIAT": 4,
"O.RESPONSE": 4,
"O.REVIEW": 4,
"O.SECFUN": 4,
"O.SECSTA": 4,
"O.SENSOR": 4,
"O.SINUSE": 4,
"O.STORAGE": 4,
"O.TOECOM": 4
},
"OE": {
"OE.ADMTRA": 3,
"OE.GUIDAN": 3,
"OE.PHYSEC": 3,
"OE.SINGEN": 3
},
"T": {
"T.AUDACC": 4,
"T.AUDFUL": 2,
"T.INFLUX": 2,
"T.MALICE": 4,
"T.MEDIAT": 3,
"T.MISUSE": 8,
"T.NOAUTH": 2,
"T.OLDINF": 3,
"T.REPLAY": 3,
"T.SELPRO": 2,
"T.TOECOM": 2,
"T.TUSAGE": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 4,
"ASE_ECD.1": 1,
"ASE_INT.1": 4,
"ASE_OBJ.2": 4,
"ASE_REQ.2": 4,
"ASE_SPD.1": 4,
"ASE_TSS.1": 4
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 7
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FDP": {
"FDP_ACC.1": 10,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 4,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1,
"FDP_IFF": 2
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 6,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 5,
"FIA_UID.2": 5,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 7,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 6
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS v1.2": 3
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"STMicroelectronics": {
"STM": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20200318172827Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20200318172827Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.3 (Build 19D76) Quartz PDFContext",
"/Title": "Microsoft Word - Invisiron CDP Security Target v1.0.docx",
"pdf_file_size_bytes": 3592417,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C111-CR-v1a.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Invisiron%20CDP%20Security%20Target%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0ee9ef2cb62d8349a4e64b39818812f7ee4a0f4bda28289d01c0c65b3a78950d",
"txt_hash": "1dc459f028e44d59824ce52783aa7a2900f96e254acdc771d1a81846c8d0f245"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5b8d80c017bc3cb3e57a242efdea9ff5af4461ca73de0425fa78361755b5b861",
"txt_hash": "c5ac7aeccb40e72e065f2f04fdc90752422023e6795a48617ace67054c6dc858"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d34850d4d01c4f52d4d9a932afeddec38fd150b8852d6e63a65655dde08a3b7f",
"txt_hash": "2aba35ab2e8b2ebfc57bfcdd2fd4450e1208fb281723cbdf8faff44586e2b473"
}
},
"status": "active"
}