NetApp Storage Encryption (NSE) Running ONTAP 9.14.1

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status active
Valid from 18.11.2024
Valid until 18.11.2026
Scheme 🇺🇸 US
Manufacturer NetApp, Inc.
Category Other Devices and Systems
Security level
Protection profiles

Heuristics summary

Certificate ID: CCEVS-VR-VID-11477-2024

Certificate

Extracted keywords

Certificates
CCEVS-VR-VID11477-2024
Evaluation facilities
Leidos

File metadata

Title VID11477-FINAL CERT
Pages 1
Producer WeasyPrint 62.3

Certification report

Extracted keywords

Protocols
SSH
Randomness
DRBG, RBG

Vendor
Microsoft

Security Assurance Requirements (SAR)
ADV_FSP.1, ALC_CMC.1, ALC_CMS.1, ATE_FUN.1, AVA_VAN.1
Certificates
CCEVS-VR-VID11477-2024
Evaluation facilities
Leidos

Certification process
out of scope, not tested in the evaluated configuration. System Manager GUI The System Manager GUI is considered out of scope and all management is performed via the command line interface. VMware Virtualization VMware

Standards
NIST SP 800-132, NIST SP 800-38F

File metadata

Author Leidos CCTL
Creation date D:20241125105424-05'00'
Modification date D:20241125105424-05'00'
Pages 23
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Frontpage

Certificate ID CCEVS-VR-VID11477-2024
Certified item for NetApp Storage Encryption (NSE) Running ONTAP 9.14.1
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES-128, HMAC, HMAC-SHA-512
Asymmetric Algorithms
RSA 3072, ECDSA, ECC
Hash functions
SHA-256, SHA-384, SHA-512, PBKDF2
Schemes
MAC
Protocols
SSH
Randomness
DRBG, RNG, RBG
Libraries
Crypto Library v2.24, OpenSSL
Block cipher modes
CBC, GCM, CCM, XEX, XTS

Claims
OE.TRUSTED_CHANNEL, OE.INITIAL_DRIVE_STATE, OE.PASSPHRASE_STRENGTH, OE.POWER_DOWN, OE.SINGLE_USE_ET, OE.STRONG_ENVIRONMENT_CRYPTO, OE.TRAINED_USERS, OE.PLATFORM_STATE, OE.PHYSICAL
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_AFA_EXT.1, FCS_AFA_EXT.2, FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.4, FCS_COP.1, FCS_KDF_EXT.1, FCS_KYC_EXT.1, FCS_PCC_EXT.1, FCS_RBG_EXT.1, FCS_SNI_EXT.1, FCS_VAL_EXT.1, FCS_AFA_EXT, FCS_KDF_EXT, FCS_KYC_EXT, FCS_PCC_EXT, FCS_SNI_EXT.1.3, FCS_AFA_EXT.1.1, FCS_KYC_EXT.2, FCS_SNI_EXT, FCS_VAL_EXT, FCS_AFA_EXT.2.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_CKM_EXT.4.1, FCS_COP.1.1, FCS_KDF_EXT.1.1, FCS_KYC_EXT.1.1, FCS_KYC_EXT.1.2, FCS_PCC_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SNI_EXT.1.1, FCS_SNI_EXT.1.2, FCS_VAL_EXT.1.1, FCS_VAL_EXT.1.2, FCS_VAL_EXT.1.3, FCS_RBG_EXT, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_SMF, FMT_SMR, FMT_SMF.1.1, FMT_MOF, FMT_MOF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_KYP_EXT.1, FPT_PWR_EXT.1, FPT_PWR_EXT.2, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_KYP_EXT, FPT_PWR_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_KYP_EXT.1.1, FPT_PWR_EXT.2.1, FPT_PWR_EXT.1.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3

Certification process
out of scope, to the security functional requirements specified in this Security Target. The features below are out of scope. Feature Description SnapLock NetApp SnapLock is the WORM (write once, read many) compliance, not tested in the evaluated configuration. System Manager GUI The System Manager GUI is considered out of scope and all management is performed via the command line interface. VMware Virtualization VMware

Standards
FIPS PUB 186-4, FIPS 186-4, NIST SP 800-38F, NIST SP 800-132, NIST SP 800-90A, PKCS #1, ISO/IEC 9796-2, ISO/IEC 10118, ISO/IEC 18033-3, ISO/IEC 18031:2011

File metadata

Subject Security Target
Author Beaver, Gregory P. [US-US]
Creation date D:20241125110213-05'00'
Modification date D:20241125110213-05'00'
Pages 57
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-11477-2024

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_FUN.1, ATE_IND.1, AVA_VAN.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2022-42915
C N
HIGH 8.1 5.9 29.10.2022
CVE-2023-27535
C N
MEDIUM 5.9 3.6 30.03.2023
CVE-2024-26458
C N
MEDIUM 5.3 1.4 29.02.2024
CVE-2024-26461
C N
HIGH 7.5 3.6 29.02.2024
CVE-2024-38475
C N
CRITICAL 9.1 5.2 01.07.2024
CVE-2024-53580
C N
HIGH 7.5 3.6 18.12.2024
CVE-2024-6119
C N
HIGH 7.5 3.6 03.09.2024
Showing 5 out of 7.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11477-ci.pdf",
  "dgst": "ebcbec6fc7d39ca6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-11477-2024",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.14.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "52d782dbb1cd05bd"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2024-26458",
        "CVE-2024-53580",
        "CVE-2022-42915",
        "CVE-2024-26461",
        "CVE-2024-6119",
        "CVE-2024-38475",
        "CVE-2023-27535"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NetApp, Inc.",
  "manufacturer_web": "https://www.netapp.com/",
  "name": "NetApp Storage Encryption (NSE) Running ONTAP 9.14.1",
  "not_valid_after": "2026-11-18",
  "not_valid_before": "2024-11-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid11477-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11477-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Producer": "WeasyPrint 62.3",
      "/Title": "VID11477-FINAL CERT",
      "pdf_file_size_bytes": 136132,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid11477-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID11477-2024",
        "cert_item": "for NetApp Storage Encryption (NSE) Running ONTAP 9.14.1",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11477-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ATE": {
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "not tested in the evaluated configuration. System Manager GUI The System Manager GUI is considered out of scope and all management is performed via the command line interface. VMware Virtualization VMware": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 5
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 6
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "RNG": {
          "RBG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "NIST": {
          "NIST SP 800-132": 1,
          "NIST SP 800-38F": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Leidos CCTL",
      "/CreationDate": "D:20241125105424-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20241125105424-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 396859,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.openssl.org/news/fips-cve.html",
          "https://nvd.nist.gov/",
          "https://cve.mitre.org/cve/search_cve_list.html",
          "http://www.kb.cert.org/vuls/html/search"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "st_vid11477-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "RSA": {
          "RSA 3072": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.INITIAL_DRIVE_STATE": 1,
          "OE.PASSPHRASE_STRENGTH": 1,
          "OE.PHYSICAL": 1,
          "OE.PLATFORM_STATE": 1,
          "OE.POWER_DOWN": 1,
          "OE.SINGLE_USE_ET": 1,
          "OE.STRONG_ENVIRONMENT_CRYPTO": 1,
          "OE.TRAINED_USERS": 1,
          "OE.TRUSTED_CHANNEL": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 11
        },
        "AGD": {
          "AGD_OPE.1": 12,
          "AGD_PRE.1": 8
        },
        "ALC": {
          "ALC_CMC.1": 6,
          "ALC_CMS.1": 7
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_IND.1": 7
        },
        "AVA": {
          "AVA_VAN.1": 8
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FCS": {
          "FCS_AFA_EXT": 4,
          "FCS_AFA_EXT.1": 7,
          "FCS_AFA_EXT.1.1": 2,
          "FCS_AFA_EXT.2": 6,
          "FCS_AFA_EXT.2.1": 1,
          "FCS_CKM.1": 9,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 2,
          "FCS_CKM_EXT.4": 16,
          "FCS_CKM_EXT.4.1": 2,
          "FCS_COP.1": 45,
          "FCS_COP.1.1": 9,
          "FCS_KDF_EXT": 4,
          "FCS_KDF_EXT.1": 7,
          "FCS_KDF_EXT.1.1": 1,
          "FCS_KYC_EXT": 4,
          "FCS_KYC_EXT.1": 4,
          "FCS_KYC_EXT.1.1": 1,
          "FCS_KYC_EXT.1.2": 1,
          "FCS_KYC_EXT.2": 2,
          "FCS_PCC_EXT": 4,
          "FCS_PCC_EXT.1": 8,
          "FCS_PCC_EXT.1.1": 1,
          "FCS_RBG_EXT": 1,
          "FCS_RBG_EXT.1": 12,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 1,
          "FCS_SNI_EXT": 2,
          "FCS_SNI_EXT.1": 7,
          "FCS_SNI_EXT.1.1": 1,
          "FCS_SNI_EXT.1.2": 1,
          "FCS_SNI_EXT.1.3": 1,
          "FCS_VAL_EXT": 2,
          "FCS_VAL_EXT.1": 9,
          "FCS_VAL_EXT.1.1": 1,
          "FCS_VAL_EXT.1.2": 1,
          "FCS_VAL_EXT.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_SMF": 4,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 3,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_KYP_EXT": 4,
          "FPT_KYP_EXT.1": 5,
          "FPT_KYP_EXT.1.1": 2,
          "FPT_PWR_EXT": 8,
          "FPT_PWR_EXT.1": 8,
          "FPT_PWR_EXT.1.1": 1,
          "FPT_PWR_EXT.2": 4,
          "FPT_PWR_EXT.2.1": 1,
          "FPT_TST_EXT": 4,
          "FPT_TST_EXT.1": 6,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TUD_EXT": 4,
          "FPT_TUD_EXT.1": 4,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "not tested in the evaluated configuration. System Manager GUI The System Manager GUI is considered out of scope and all management is performed via the command line interface. VMware Virtualization VMware": 1,
          "out of scope": 2,
          "to the security functional requirements specified in this Security Target. The features below are out of scope. Feature Description SnapLock NetApp SnapLock is the WORM (write once, read many) compliance": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CCM": {
          "CCM": 1
        },
        "GCM": {
          "GCM": 1
        },
        "XEX": {
          "XEX": 1
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library v2.24": 1
        },
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "PBKDF": {
          "PBKDF2": 5
        },
        "SHA": {
          "SHA2": {
            "SHA-256": 9,
            "SHA-384": 5,
            "SHA-512": 9
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19
        },
        "RNG": {
          "RBG": 4,
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 186-4": 1,
          "FIPS PUB 186-4": 2
        },
        "ISO": {
          "ISO/IEC 10118": 2,
          "ISO/IEC 18031:2011": 1,
          "ISO/IEC 18033-3": 1,
          "ISO/IEC 9796-2": 2
        },
        "NIST": {
          "NIST SP 800-132": 5,
          "NIST SP 800-38F": 2,
          "NIST SP 800-90A": 3
        },
        "PKCS": {
          "PKCS #1": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8,
            "AES-128": 1,
            "AES-256": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 5,
            "HMAC-SHA-512": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Beaver, Gregory P. [US-US]",
      "/CreationDate": "D:20241125110213-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20241125110213-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Subject": "Security Target",
      "pdf_file_size_bytes": 649477,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0760",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0458",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0764",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0765",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0606",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0769",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0766",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0759",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0767"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 57
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_AA_V2.0E.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11477-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11477-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "183ac9dce7eaa1f00fc7bc8bf24c6df2229e3229f05b3bdccbb3ec0f4931f3ca",
      "txt_hash": "c8f17b970bc62d69a3fcdd42b52cecdcc66afc0e6611170fa3dae1a5f9e8cd3c"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d250cf8e3c9f352520212624cfb006ee5ad15ffad9b1011a2cd203ee154ad1af",
      "txt_hash": "4b32d4a7921363295a05bc6e31ca247a1327a163833ce26042a92684595c268a"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ab33fb1aff4dd4bc1ed4074be917c667b71aa8003342416203cccf2c0cd70272",
      "txt_hash": "1e09d530b3ab9afcec53bea750d0f9d3c1687c4cddfb7c35a570c9309d98ce05"
    }
  },
  "status": "active"
}