{"_id": "eb21447ac76f2965", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "eb21447ac76f2965", "status": "archived", "category": "Operating Systems", "name": "Red Hat Enterprise Linux Version 6.2 on IBM Hardware for Power and System z Architectures", "manufacturer": "Red Hat, Inc.", "scheme": "DE", "security_level": {"_type": "Set", "elements": ["ALC_FLR.3", "EAL4+"]}, "not_valid_before": "2012-10-23", "not_valid_after": "2019-09-01", "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0848a_pdf.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0848b_pdf.pdf", "cert_link": null, "manufacturer_web": "https://www.redhat.com", "protection_profile_links": {"_type": "Set", "elements": ["https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf"]}, "maintenance_updates": {"_type": "Set", "elements": []}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "da3818546cba51565626604dce1d10dba60e76af9365d230b8a4f818524cc9ec", "txt_hash": "1ef2a362c390281dee91fa2a594eb7f539ac76e1bde3c0cd3db509bc4d1cebf9", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "b7ad6ff4e6f54c8dbcbb55863ff8b1f1aef46d3eed0149c5db03d3cd98be8c56", "txt_hash": "9c6db918c342827a07d1884b9700e0003a6f9dd560c2f2531e6db282b6bf79d4", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null, "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 956655, "pdf_is_encrypted": false, "pdf_number_of_pages": 40, "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "/CreationDate": "D:20121026111748+02'00'", "/Creator": "Writer", "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, OSPP, Linux, Red Hat Enterprise Linux 6.2\"", "/ModDate": "D:20121029114318+01'00'", "/Producer": "LibreOffice 3.5", "/Title": "Certification Report BSI-DSZ-CC-0848-2012", "pdf_hyperlinks": {"_type": "Set", "elements": ["https://www.bsi.bund.de/zertifizierung", "http://www.commoncriteriaportal.org/", "https://www.bsi.bund.de/"]}}, "st_metadata": {"pdf_file_size_bytes": 1191983, "pdf_is_encrypted": false, "pdf_number_of_pages": 117, "/Keywords": "Security Target, Common Criteria, Linux Distribution, Embedded Linux", "/Subject": "", "/Title": "Red Hat Enterprise Linux, Version 6.2 on IBM Hardware for Power and System z Architectures (version 1.8 as of 2012-10-08 )", "/Creator": "Unknown", "/Author": "Stephan Mueller", "/Producer": "XEP 4.18 build 20100322", "/Trapped": "/False", "/CreationDate": "D:20121008174807Z", "/ModDate": "D:20121008174807Z", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf", "http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf", "http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf"]}}, "cert_metadata": null, "report_frontpage": {"DE": {"match_rules": ["(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"], "cert_id": "BSI-DSZ-CC-0848-2012", "cert_item": "Red Hat Enterprise Linux, Version 6.2 on IBM Hardware for Power and System z Architectures", "developer": "Red Hat, Inc", "cert_lab": "BSI"}}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {"DE": {"BSI-DSZ-CC-0848-2012": 21, "BSI-DSZ-CC-0754-2012": 3}}, "cc_protection_profile_id": {"BSI": {"BSI-CC-PP-0067-2010": 1, "BSI-CC-PP-0067-": 2}}, "cc_security_level": {"EAL": {"EAL 4": 6, "EAL1": 7, "EAL4": 8, "EAL3": 4, "EAL5": 6, "EAL7": 4, "EAL2": 3, "EAL6": 3, "EAL 4 augmented": 3}, "ITSEC": {"ITSEC Evaluation": 1}}, "cc_sar": {"ADV": {"ADV_ARC.1": 1, "ADV_FSP.1": 1, "ADV_FSP.2": 1, "ADV_FSP.3": 1, "ADV_FSP.4": 1, "ADV_FSP.5": 1, "ADV_FSP.6": 1, "ADV_IMP.1": 1, "ADV_IMP.2": 1, "ADV_INT.1": 1, "ADV_INT.2": 1, "ADV_INT.3": 1, "ADV_SPM.1": 1, "ADV_TDS.1": 1, "ADV_TDS.2": 1, "ADV_TDS.3": 1, "ADV_TDS.4": 1, "ADV_TDS.5": 1, "ADV_TDS.6": 1, "ADV_ARC": 1, "ADV_FSP": 1, "ADV_IMP": 1, "ADV_INT": 1, "ADV_SPM": 1, "ADV_TDS": 1}, "AGD": {"AGD_OPE.1": 1, "AGD_PRE.1": 1, "AGD_OPE": 1, "AGD_PRE": 1}, "ALC": {"ALC_FLR.3": 5, "ALC_CMC.1": 1, "ALC_CMC.2": 1, "ALC_CMC.3": 1, "ALC_CMC.4": 1, "ALC_CMC.5": 1, "ALC_CMS.1": 1, "ALC_CMS.2": 1, "ALC_CMS.3": 1, "ALC_CMS.4": 1, "ALC_CMS.5": 1, "ALC_DEL.1": 1, "ALC_DVS.1": 1, "ALC_DVS.2": 1, "ALC_FLR.1": 1, "ALC_FLR.2": 1, "ALC_LCD.1": 1, "ALC_LCD.2": 1, "ALC_TAT.1": 1, "ALC_TAT.2": 1, "ALC_TAT.3": 1, "ALC_CMC": 1, "ALC_CMS": 1, "ALC_DEL": 1, "ALC_DVS": 1, "ALC_FLR": 1, "ALC_TAT": 1}, "ATE": {"ATE_COV.1": 1, "ATE_COV.2": 1, "ATE_COV.3": 1, "ATE_DPT.1": 1, "ATE_DPT.2": 1, "ATE_DPT.3": 1, "ATE_DPT.4": 1, "ATE_FUN.1": 1, "ATE_FUN.2": 1, "ATE_IND.1": 1, "ATE_IND.2": 1, "ATE_IND.3": 1, "ATE_COV": 1, "ATE_DPT": 1, "ATE_FUN": 1, "ATE_IND": 1}, "AVA": {"AVA_VAN.1": 1, "AVA_VAN.2": 1, "AVA_VAN.3": 1, "AVA_VAN.4": 1, "AVA_VAN.5": 1, "AVA_VAN": 2}, "APE": {"APE_INT.1": 1, "APE_CCL.1": 1, "APE_SPD.1": 1, "APE_OBJ.1": 1, "APE_OBJ.2": 1, "APE_ECD.1": 1, "APE_REQ.1": 1, "APE_REQ.2": 1}, "ASE": {"ASE_INT.1": 1, "ASE_CCL.1": 1, "ASE_SPD.1": 1, "ASE_OBJ.1": 1, "ASE_OBJ.2": 1, "ASE_ECD.1": 1, "ASE_REQ.1": 1, "ASE_REQ.2": 1, "ASE_TSS.1": 1, "ASE_TSS.2": 1, "ASE_CCL": 1, "ASE_ECD": 1, "ASE_INT": 1, "ASE_OBJ": 1, "ASE_SPD": 1, "ASE_TSS": 1}}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": {"atsec": {"atsec": 3}}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 1}, "Twofish": {"Twofish": 1}, "Serpent": {"Serpent": 1}}, "DES": {"3DES": {"TDES": 1}}}, "asymmetric_crypto": {"RSA": {"RSA 1024": 1}, "FF": {"DSA": {"DSA": 1}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 1}, "SHA2": {"SHA-256": 3, "SHA512": 1, "SHA-2": 4}}}, "crypto_scheme": {"MAC": {"MAC": 1}, "KEX": {"Key Exchange": 2}}, "crypto_protocol": {"SSH": {"SSHv2": 1, "SSH": 7}, "PGP": {"PGP": 1}}, "randomness": {"RNG": {"RNG": 1}}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {"BSI": {"BSI 7125": 2, "BSI 7148": 1}}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS PUB 186-3": 2, "FIPS 180-3": 2}, "BSI": {"AIS 20": 2, "AIS 32": 1, "AIS 38": 1}, "RFC": {"RFC 4253": 2}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"ConfidentialDocument": {"Version 4, October 9th 2012, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [10] Configuration lists for the TOE: CI list of CC evidence, test cases, test plans, man pages": 1, "9th 2012), CI list from CVS showing zipl bootmanager for zSeries platform (August 9th 2012), (all confidential documents) [11] Technical Specification zArchitecture Principles of Operation, Ninth edition, August 2010": 1}}}, "st_keywords": {"cc_cert_id": {"DE": {"BSI-DSZ-CC-0848": 1}}, "cc_protection_profile_id": {}, "cc_security_level": {"EAL": {"EAL4": 3, "EAL4 augmented": 1}}, "cc_sar": {"ADV": {"ADV_ARC.1": 1, "ADV_FSP.4": 1, "ADV_IMP.1": 1, "ADV_TDS.3": 1}, "AGD": {"AGD_OPE.1": 1, "AGD_PRE.1": 1}, "ALC": {"ALC_FLR.3": 4, "ALC_CMC.4": 1, "ALC_CMS.4": 1, "ALC_DEL.1": 1, "ALC_DVS.1": 1, "ALC_LCD.1": 1, "ALC_TAT.1": 1}, "ATE": {"ATE_COV.2": 1, "ATE_DPT.1": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1}, "AVA": {"AVA_VAN.3": 1}, "ASE": {"ASE_INT.1": 1, "ASE_CCL.1": 1, "ASE_SPD.1": 1, "ASE_OBJ.2": 1, "ASE_ECD.1": 1, "ASE_REQ.2": 1, "ASE_TSS.1": 1}}, "cc_sfr": {"FAU": {"FAU_GEN.1": 11, "FAU_GEN.2": 6, "FAU_SAR.1": 9, "FAU_SAR.2": 6, "FAU_SAR.3": 7, "FAU_SEL.1": 9, "FAU_STG.1": 12, "FAU_STG.3": 8, "FAU_STG.4": 9, "FAU_GEN": 2, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_GEN.2.1": 1, "FAU_SAR.1.1": 1, "FAU_SAR.1.2": 1, "FAU_SAR.2.1": 1, "FAU_SAR.3.1": 1, "FAU_SEL.1.1": 1, "FAU_STG.1.1": 1, "FAU_STG.1.2": 1, "FAU_STG.3.1": 1, "FAU_STG.4.1": 1}, "FCS": {"FCS_RNG.1": 45, "FCS_CKM.1": 32, "FCS_CKM.2": 10, "FCS_CKM.4": 13, "FCS_COP.1": 21, "FCS_RNG": 2, "FCS_RNG.1.1": 6, "FCS_RNG.1.2": 7, "FCS_CKM.1.1": 3, "FCS_CKM.2.1": 1, "FCS_CKM.4.1": 1, "FCS_COP.1.1": 2}, "FDP": {"FDP_CDP": 5, "FDP_CDP.1": 14, "FDP_ACC.1": 37, "FDP_ACF.1": 30, "FDP_IFC.2": 21, "FDP_IFF.1": 22, "FDP_ITC.2": 21, "FDP_RIP.2": 13, "FDP_RIP.3": 13, "FDP_ACC.2": 9, "FDP_ETC.2": 8, "FDP_IFF.2": 7, "FDP_ITC.1": 13, "FDP_IFC.1": 14, "FDP_CDP.1.1": 2, "FDP_UCT": 1, "FDP_ACC.1.1": 2, "FDP_ACF.1.1": 3, "FDP_ACF.1.2": 3, "FDP_ACF.1.3": 3, "FDP_ACF.1.4": 3, "FDP_IFC.2.1": 2, "FDP_IFC.2.2": 2, "FDP_IFF.1.1": 2, "FDP_IFF.1.2": 2, "FDP_IFF.1.3": 2, "FDP_IFF.1.4": 2, "FDP_IFF.1.5": 2, "FDP_ITC.2.1": 2, "FDP_ITC.2.2": 2, "FDP_ITC.2.3": 2, "FDP_ITC.2.4": 2, "FDP_ITC.2.5": 2, "FDP_RIP.2.1": 1, "FDP_RIP.3.1": 1, "FDP_ACC.2.1": 1, "FDP_ACC.2.2": 1, "FDP_ETC.2.1": 1, "FDP_ETC.2.2": 1, "FDP_ETC.2.3": 1, "FDP_ETC.2.4": 1, "FDP_IFF.2.1": 1, "FDP_IFF.2.2": 1, "FDP_IFF.2.3": 1, "FDP_IFF.2.4": 1, "FDP_IFF.2.5": 1, "FDP_IFF.2.6": 1, "FDP_ITC.1.1": 1, "FDP_ITC.1.2": 1, "FDP_ITC.1.3": 1, "FDP_TDC.1": 1}, "FIA": {"FIA_AFL.1": 9, "FIA_ATD.1": 22, "FIA_SOS.1": 8, "FIA_UAU.1": 12, "FIA_UAU.5": 10, "FIA_UAU.7": 6, "FIA_UID.1": 14, "FIA_USB.2": 10, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_ATD.1.1": 2, "FIA_SOS.1.1": 1, "FIA_UAU.1.1": 1, "FIA_UAU.1.2": 1, "FIA_UAU.5.1": 1, "FIA_UAU.5.2": 1, "FIA_UAU.7.1": 1, "FIA_UID.1.1": 1, "FIA_UID.1.2": 1, "FIA_USB.2.1": 1, "FIA_USB.1": 1, "FIA_USB.2.2": 1, "FIA_USB.2.3": 1, "FIA_USB.2.4": 1}, "FMT": {"FMT_MSA.1": 37, "FMT_MSA.3": 40, "FMT_MSA.4": 6, "FMT_MTD.1": 133, "FMT_REV.1": 12, "FMT_SMF.1": 30, "FMT_SMR.2": 37, "FMT_MSA.1.1": 4, "FMT_MSA.3.1": 5, "FMT_MSA.3.2": 5, "FMT_MSA.4.1": 1, "FMT_MTD.1.1": 20, "FMT_REV.1.1": 2, "FMT_REV.1.2": 2, "FMT_SMF.1.1": 1, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1, "FMT_SMR.1": 1}, "FPT": {"FPT_FLS.1": 16, "FPT_STM.1": 8, "FPT_TDC.1": 21, "FPT_FLS.1.1": 2, "FPT_STM.1.1": 1, "FPT_TDC.1.1": 2, "FPT_TDC.1.2": 2}, "FTA": {"FTA_SSL.1": 7, "FTA_SSL.2": 7, "FTA_SSL.1.1": 1, "FTA_SSL.1.2": 1, "FTA_SSL.2.1": 1, "FTA_SSL.2.2": 1}, "FTP": {"FTP_ITC.1": 11, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 2}}, "cc_claims": {"O": {"O.AUDITING": 15, "O.CRYPTO": 16, "O.DISCRETIONARY": 11, "O.NETWORK": 13, "O.SUBJECT": 11, "O.MANAGE": 26, "O.TRUSTED_CHANNEL": 5, "O.ROLE": 16, "O.REMOTE_AUDIT": 8, "O.ANALYZE_AUDIT": 5, "O.LS": 29, "O.CP": 19, "O.RUNTIME": 5}, "T": {"T.ACCESS": 21, "T.RESTRICT": 3, "T.IA": 6, "T.ROLE": 6, "T.UNOBSERVED_AUDIT": 4, "T.DATA_NOT_SEPARATED": 3}, "A": {"A.CONNECT": 5, "A.PHYSICAL": 4, "A.MANAGE": 5, "A.AUTHUSER": 3, "A.TRAINEDUSER": 3, "A.DETECT": 3, "A.PEER": 6}, "OE": {"OE.ADMIN": 5, "OE.INFO_PROTECT": 8, "OE.INSTALL": 4, "OE.MAINTENANCE": 3, "OE.PHYSICAL": 3, "OE.RECOVER": 4, "OE.TRUSTED": 5, "OE.REMOTE": 3}}, "vendor": {}, "eval_facility": {"atsec": {"atsec": 236}}, "symmetric_crypto": {"AES_competition": {"AES": {"AES128": 1, "AES256": 1, "AES": 5, "AES-128": 1}, "Twofish": {"Twofish": 2}, "Serpent": {"Serpent": 1}}, "DES": {"3DES": {"TDES": 1, "Triple-DES": 1}}}, "asymmetric_crypto": {"FF": {"DH": {"Diffie-Hellman": 2}, "DSA": {"DSA": 17}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 3}, "SHA2": {"SHA-224": 1, "SHA-256": 1, "SHA-384": 1, "SHA-512": 1}}}, "crypto_scheme": {"MAC": {"MAC": 8}}, "crypto_protocol": {"SSH": {"SSH": 45, "SSHv2": 5}, "TLS": {"SSL": {"SSL": 11}, "TLS": {"TLS": 3}}, "IPsec": {"IPsec": 3}, "VPN": {"VPN": 1}}, "randomness": {"RNG": {"RNG": 14}}, "cipher_mode": {"CBC": {"CBC": 4}, "CTR": {"CTR": 1}, "GCM": {"GCM": 3}, "XTS": {"XTS": 3}}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {"OpenSSL": {"OpenSSL": 7}, "libgcrypt": {"libgcrypt": 4}}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {"BSI": {"BSI TR-02102": 1}}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS 140-2": 15, "FIPS PUB 186-3": 4, "FIPS 186-3": 1, "FIPS140-2": 1}, "BSI": {"AIS 20": 1, "AIS 31": 1}, "RFC": {"RFC 2460": 1, "RFC 3484": 1, "RFC 3542": 1, "RFC 4213": 1, "RFC4253": 3, "RFC 4253": 10, "RFC 4252": 9, "RFC 791": 1, "RFC 793": 1, "RFC 768": 1, "RFC 792": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"OutOfScope": {"out of scope": 3, "PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation": 1, "as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also": 1, "DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store": 1}}}, "cert_keywords": null, "report_filename": "0848a_pdf.pdf", "st_filename": "0848b_pdf.pdf", "cert_filename": null}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["6.2"]}, "cpe_matches": {"_type": "Set", "elements": ["cpe:2.3:o:redhat:enterprise_linux:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*"]}, "verified_cpe_matches": null, "related_cves": null, "cert_lab": ["BSI"], "cert_id": "BSI-DSZ-CC-0848-2012", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0754-2012"]}, "indirectly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0754-2012"]}}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "APE_OBJ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_CCL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_SPD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_ECD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_FLR", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_SPM", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_INT", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_INT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_REQ", "level": 2}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null, "protection_profiles": {"_type": "Set", "elements": ["70cdc8b0cf910af7"]}, "eal": "EAL4+"}}