This page was not yet optimized for use on mobile devices.
RSA Archer GRC Platform version 6.1
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | archived |
---|---|
Valid from | 14.09.2016 |
Valid until | 14.09.2021 |
Scheme | 🇲🇾 MY |
Manufacturer | RSA, The Security Division of EMC |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2+, ALC_FLR.2 |
Heuristics summary ?
Certificate ID: ISCB-3-RPT-C073-CR-v1
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL 2+, EAL2+Security Assurance Requirements (SAR)
ALC_FLR.2Certificates
ISCB-3-RPT-C073-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
Title | C073 Certification Report |
---|---|
Subject | RSA Archer GRC Platform v6.1 |
Keywords | MyCB_TMP_002 |
Author | ISCB Department |
Creation date | D:20160919032647Z |
Modification date | D:20160919115230+08'00' |
Pages | 30 |
Creator | Microsoft Word |
Security target ?
Extracted keywords
Vendor
MicrosoftSecurity level
EAL2, EAL 2, EAL 2 augmentedClaims
O.ACCESS_CONTROL, O.AUDIT, O.AUDIT_REVIEW, O.I_AND_A, O.LOGON_BANNER, O.PASSWORD_CONTROLS, O.SECURITY_MANAGEMENT, O.SESSION_LIMITATION, O.SESSION_TERMINATION, O.THROTTLE, O.SECURITY_MANAGE, T.BRUTE_FORCE, T.DATA_COMPROMISE, T.INAPPROPRIATE_USE, T.NO_ACCOUNTABILITY, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, T.UNAUTHORIZED_ACTIVIT, T.INAPPRORIATE_USE, A.MANAGE, A.PROTECT, A.SECURE_COMMS, A.TIME, OE.PHYSICAL, OE.PERSONNEL, OE.SECURE_COMMS, OE.TIMESecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_FLR.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MSA, FMT_MTD, FMT_REV, FMT_SMF, FMT_SMR, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_REV.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL, FTA_TAB, FTA_TSE, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTA_TAB.1, FTA_TAB.1.1, FTA_TSE.1, FTA_TSE.1.1File metadata
Title | RSA Archer GRC |
---|---|
Subject | Security Target |
Author | Apted, Tony J. [RA] |
Creation date | D:20160919034256+00'00' |
Modification date | D:20160919034256+00'00' |
Pages | 41 |
Creator | Microsoft Word |
Heuristics ?
Certificate ID: ISCB-3-RPT-C073-CR-v1
Extracted SARs
ASE_CCL.1, AGD_PRE.1, ASE_REQ.2, ASE_TSS.1, ATE_COV.1, ATE_IND.2, ADV_FSP.2, ASE_ECD.1, ALC_CMS.2, ASE_SPD.1, ALC_DEL.1, ALC_FLR.2, ADV_TDS.1, ASE_INT.1, ALC_CMC.2, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2017-14369 | MEDIUM | 4.3 | 1.4 | 11.10.2017 19:29 | ||
CVE-2017-14370 | MEDIUM | 5.4 | 2.7 | 11.10.2017 19:29 | ||
CVE-2017-14371 | MEDIUM | 6.1 | 2.7 | 11.10.2017 19:29 | ||
CVE-2017-14372 | MEDIUM | 6.1 | 2.7 | 11.10.2017 19:29 | ||
CVE-2018-11059 | MEDIUM | 5.4 | 2.7 | 24.07.2018 19:29 | ||
CVE-2018-11060 | HIGH | 8.8 | 5.9 | 24.07.2018 19:29 | ||
CVE-2018-11065 | MEDIUM | 4.3 | 1.4 | 24.08.2018 15:29 | ||
CVE-2018-15780 | MEDIUM | 6.5 | 3.6 | 03.01.2019 21:29 | ||
CVE-2019-3715 | MEDIUM | 5.5 | 3.6 | 13.03.2019 21:29 | ||
CVE-2019-3716 | HIGH | 7.8 | 5.9 | 13.03.2019 21:29 | ||
CVE-2019-3756 | MEDIUM | 6.5 | 3.6 | 18.09.2019 23:15 | ||
CVE-2019-3758 | CRITICAL | 9.8 | 5.9 | 18.09.2019 23:15 | ||
CVE-2020-5331 | MEDIUM | 5.5 | 3.6 | 04.05.2020 19:15 | ||
CVE-2020-5332 | HIGH | 7.2 | 5.9 | 04.05.2020 19:15 | ||
CVE-2020-5333 | MEDIUM | 4.3 | 1.4 | 04.05.2020 19:15 | ||
CVE-2020-5334 | MEDIUM | 6.1 | 2.7 | 04.05.2020 19:15 | ||
CVE-2020-5335 | HIGH | 8.8 | 5.9 | 04.05.2020 19:15 | ||
CVE-2020-5336 | MEDIUM | 6.1 | 2.7 | 04.05.2020 19:15 | ||
CVE-2020-5337 | MEDIUM | 6.1 | 2.7 | 04.05.2020 19:15 | ||
CVE-2021-33615 | HIGH | 7.5 | 5.9 | 02.06.2022 14:15 | ||
CVE-2021-33616 | MEDIUM | 5.4 | 2.7 | 04.04.2022 12:15 | ||
CVE-2021-38362 | MEDIUM | 6.5 | 3.6 | 30.03.2022 22:15 | ||
CVE-2021-41594 | MEDIUM | 6.5 | 3.6 | 30.03.2022 00:15 | ||
CVE-2022-26947 | MEDIUM | 5.4 | 2.7 | 30.03.2022 00:15 | ||
CVE-2022-26948 | HIGH | 7.5 | 3.6 | 30.03.2022 00:15 | ||
CVE-2022-26949 | MEDIUM | 6.5 | 3.6 | 30.03.2022 00:15 | ||
CVE-2022-26950 | MEDIUM | 6.1 | 2.7 | 30.03.2022 00:15 | ||
CVE-2022-26951 | MEDIUM | 6.1 | 2.7 | 30.03.2022 00:15 | ||
CVE-2022-37317 | MEDIUM | 5.4 | 2.7 | 25.08.2022 23:15 |
Scheme data ?
Cert No | 2016-003-C073 | |
---|---|---|
Developer | RSA Security LLC | |
Level | EAL2+ ALC_FLR.2 | |
Product | RSA Archer GRC Platform version 6.1 | |
Certification Date | 14-09-2016 | |
Expiration Date | 14-09-2021 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/114 | |
Enhanced | ||
Cert Id | C073 | |
Product | RSA Archer GRC Platform version 6.1 | |
Developer | Jon L. GoodwinManager, Federal ProgramsRSA Security LLC10700 Parkridge Blvd.Suite 600Reston, VA 20191 URL: www.rsa.comEmail: jon.goodwin@rsa.comCell: 469-855-5658 | |
Category | Network and Network-Related Devices and Systems | |
Type | Network and Network related Devices and Systems | |
Scope | It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls. The following security functions are implemented by the TOE: Security Audit User Data Protection Identification adn Authentication Security Management TOE Access | |
Assurance Level | EAL2+ ALC_FLR.2 | |
Certification Date | 14-09-2016 | |
Expiration Date | 14-09-2021 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/RSA%20Archer%20ST%20v1.0%20-clean.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/ISCB-5-RPT-C073-CR-v1.pdf | |
Status | Archive |
References ?
No references are available for this certificate.
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name RSA Archer GRC Platform version 6.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "71ffe2f11819ba1d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-3-RPT-C073-CR-v1",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:rsa:archer_grc_platform:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:archer:6.1.0.0:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.1"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2022-37317",
"CVE-2022-26951",
"CVE-2020-5333",
"CVE-2022-26949",
"CVE-2017-14370",
"CVE-2018-15780",
"CVE-2020-5332",
"CVE-2020-5337",
"CVE-2019-3758",
"CVE-2018-11059",
"CVE-2019-3716",
"CVE-2017-14369",
"CVE-2018-11060",
"CVE-2021-33616",
"CVE-2019-3715",
"CVE-2019-3756",
"CVE-2018-11065",
"CVE-2017-14371",
"CVE-2022-26948",
"CVE-2022-26947",
"CVE-2022-26950",
"CVE-2020-5331",
"CVE-2020-5335",
"CVE-2020-5334",
"CVE-2021-33615",
"CVE-2017-14372",
"CVE-2021-38362",
"CVE-2020-5336",
"CVE-2021-41594"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2016-003-C073",
"certification_date": "14-09-2016",
"developer": "RSA Security LLC",
"enhanced": {
"assurance_level": "EAL2+ ALC_FLR.2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C073",
"certification_date": "14-09-2016",
"developer": "Jon L. GoodwinManager, Federal ProgramsRSA Security LLC10700 Parkridge Blvd.Suite 600Reston, VA 20191\nURL: www.rsa.comEmail: jon.goodwin@rsa.comCell: 469-855-5658",
"expiration_date": "14-09-2021",
"mutual_recognition": "CCRA",
"product": "RSA Archer GRC Platform version 6.1",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/ISCB-5-RPT-C073-CR-v1.pdf",
"scope": "It enables organizations to build an efficient, collaborative enterprise GRC program across IT, finance, operations and legal domains. It supports organizations in managing risk, demonstrating compliance, automating business processes, and gaining visibility into corporate risk and security controls.\nThe following security functions are implemented by the TOE:\n\nSecurity Audit\nUser Data Protection\nIdentification adn Authentication\nSecurity Management\nTOE Access",
"status": "Archive",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C073/RSA%20Archer%20ST%20v1.0%20-clean.pdf",
"type": "Network and Network related Devices and Systems"
},
"expiration_date": "14-09-2021",
"level": "EAL2+ ALC_FLR.2",
"product": "RSA Archer GRC Platform version 6.1",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/114"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "RSA, The Security Division of EMC",
"manufacturer_web": "https://www.rsa.com/",
"name": "RSA Archer GRC Platform version 6.1",
"not_valid_after": "2021-09-14",
"not_valid_before": "2016-09-14",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C073-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-3-RPT-C073-CR-v1": 28
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 2+": 7,
"EAL2+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/CreationDate": "D:20160919032647Z",
"/Creator": "Microsoft Word",
"/Keywords": "MyCB_TMP_002",
"/ModDate": "D:20160919115230+08\u002700\u0027",
"/Subject": "RSA Archer GRC Platform v6.1",
"/Title": "C073 Certification Report",
"pdf_file_size_bytes": 656895,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cybersecurity.my/mycc",
"mailto:mycc@cybersecurity.my"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
},
"st_filename": "RSA Archer ST v1.0 -clean.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MANAGE": 2,
"A.PROTECT": 2,
"A.SECURE_COMMS": 3,
"A.TIME": 2
},
"O": {
"O.ACCESS_CONTROL": 5,
"O.AUDIT": 4,
"O.AUDIT_REVIEW": 5,
"O.I_AND_A": 3,
"O.LOGON_BANNER": 5,
"O.PASSWORD_CONTROLS": 3,
"O.SECURITY_MANAGE": 2,
"O.SECURITY_MANAGEMENT": 3,
"O.SESSION_LIMITATION": 5,
"O.SESSION_TERMINATION": 3,
"O.THROTTLE": 5
},
"OE": {
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2,
"OE.SECURE_COMMS": 2,
"OE.TIME": 3
},
"T": {
"T.BRUTE_FORCE": 3,
"T.DATA_COMPROMISE": 2,
"T.INAPPROPRIATE_USE": 2,
"T.INAPPRORIATE_USE": 1,
"T.NO_ACCOUNTABILITY": 2,
"T.UNATTENDED_SESSION": 3,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_ACTIVIT": 1,
"T.UNAUTHORIZED_ACTIVITY": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.2": 11,
"ADV_TDS": 1,
"ADV_TDS.1": 11
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.2": 8,
"ALC_CMS": 1,
"ALC_CMS.2": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 15
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 14,
"ASE_ECD": 1,
"ASE_ECD.1": 10,
"ASE_INT": 1,
"ASE_INT.1": 12,
"ASE_OBJ": 1,
"ASE_OBJ.2": 10,
"ASE_REQ": 1,
"ASE_REQ.2": 13,
"ASE_SPD": 1,
"ASE_SPD.1": 7,
"ASE_TSS": 1,
"ASE_TSS.1": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3,
"EAL 2 augmented": 2,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 6,
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR": 9,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 4,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1
},
"FCS": {
"FCS_COP.1": 2,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 10,
"FDP_ACC.1.1": 1,
"FDP_ACF": 3,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS": 3,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU": 6,
"FIA_UAU.1": 1,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.6": 5,
"FIA_UAU.6.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA": 5,
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 6,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 2,
"FMT_REV": 3,
"FMT_REV.1": 4,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMF": 2,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 2
},
"FTA": {
"FTA_SSL": 6,
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1,
"FTA_TAB": 3,
"FTA_TAB.1": 5,
"FTA_TAB.1.1": 1,
"FTA_TSE": 3,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Apted, Tony J. [RA]",
"/CreationDate": "D:20160919034256+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20160919034256+00\u002700\u0027",
"/Subject": "Security Target",
"/Title": "RSA Archer GRC",
"pdf_file_size_bytes": 1185222,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 41
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/ISCB-5-RPT-C073-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/RSA%20Archer%20ST%20v1.0%20-clean.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f493566f85e002e83324295aff98c227155123cea46ff73d9b92868685644059",
"txt_hash": "512fed3b69e4ecda51c3b41d6df2bc804833229db3d89125729673e6f4c9b57c"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "43f6befb48745f5208bd6286469b1b35f5b1a2e6038ceac83f2277b0c640fc2b",
"txt_hash": "ae27d1e37f140bfbd680ec5f7151ca3be372120166ab540c516c6272a1b664ab"
}
},
"status": "archived"
}