Cisco MDS 9000 Family SAN-OS Release 3.2(2c)

CSV information

Status archived
Valid from 25.09.2008
Valid until 20.07.2012
Scheme 🇺🇸 US
Manufacturer Cisco Systems, Inc.
Category Network and Network-Related Devices and Systems
Security level EAL3+, ALC_FLR.1
Maintenance updates Cisco MDS 9000 Family SAN-OS Release 3.2(2c) (11.01.2010) Certification report

Heuristics summary

Certificate ID: CCEVS-VR-VID-10015-2008

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
DES, Blowfish
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
SHA-1, MD5
Protocols
SSH

Vendor
Cisco

Security level
EAL3, EAL 3, EAL 3 augmented
Claims
T.USERATTACK, T.EXCEEDPRIV, T.VSANCOMPROMISE, T.ZONECOMPROMISE, T.SWITCHCOMPROMISE, T.NODETECT, A.NOEVIL, A.PHYSICAL, A.ZONECONNECT, A.NETPROTECT, A.PERSONNEL, A.TIMESOURCE, A.VSANTIMESYNC, A.MANAGEMENTLAN, A.PASSWORD, A.HOSTOS
Security Assurance Requirements (SAR)
AGD_USR, ALC_FLR.1, ATE_IND
Certificates
CCEVS-VR-VID10015-2008

File metadata

Title Microsoft Word - CCEVS-VR-VID10015-2008-v1.1.doc
Author dmh
Creation date D:20081023161422-04'00'
Modification date D:20081024085129-04'00'
Pages 25
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 7.0 (Windows)

Frontpage

Certificate ID CCEVS-VR-VID10015-2008
Certified item Cisco MDS 9000 Family with SAN-OS Release 3.2(2c
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
DES, Blowfish
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
SHA-1, MD5
Protocols
SSH, SSHv2

Vendor
Cisco Systems, Inc, Cisco, Cisco Systems

Security level
EAL 3, EAL3, EAL 3 augmented
Claims
O.SECUREOPERATE, O.MONITOR, O.VSANPROTECT, O.VSANACCESS, O.SWITCHACCESS, O.ZONEACCESS, O.PRIVILEGE, O.AUDIT, T.USERATTACK, T.EXCEEDPRIV, T.VSANCOMPROMISE, T.ZONECOMPROMISE, T.SWITCHCOMPROMISE, T.NODETECT, T.NORESPONSE, A.NOEVIL, A.PHYSICAL, A.ZONECONNECT, A.NETPROTECT, A.PERSONNEL, A.TIMESOURCE, A.VSANTIMESYNC, A.MANAGEMENTLAN, A.PASSWORD, A.HOSTOS, A.NOACCESS, OE.SECUREMANAGE, OE.TRAFFICPROTECT, OE.AAA, OE.TIME, OE.FMSTORAGE
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADO_IGS, ADV_SPM.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FIA_ATD.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.5.1, FIA_UAU.5.2, FMT_MTD.1.1, FMT_MTD.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_SMR.3, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR.3.1, FMT_MSA, FPT_SEP.1, FPT_RVM.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_RVM.1.1, FPT_TAB.1, FPT_STM.1, FTA_TSE.1, FTA_TSE.1.1, FTA_SSL.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Certification process
out of scope, the local password files. Determination of the strength of function for cryptographic functions is out of scope of the Common Criteria. Therefore, no SOF claim for these requirements (and their corresponding

Standards
FIPS PUB 46-3, PKCS#1, RFC 1321, CCIMB-2004-01-004

File metadata

Title MDS9000-EAL3-ST-v3 0 8_15_08as.fm
Author dmh
Creation date D:20080507115338Z
Modification date D:20081024085121-04'00'
Pages 102
Creator FrameMaker 7.2
Producer Acrobat Distiller 8.1.0 (Windows)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10015-2008

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1

Scheme data

Product Cisco MDS 9000 Family SAN-OS Release 3.2(2c)
Id CCEVS-VR-VID10015
Url https://www.niap-ccevs.org/products/10015
Api Url https://www.niap-ccevs.org/api/project/product/pcl_products/10015/
Certification Date 25.09.2008
Expiration Date None
Category Network Switch
Categories ['Network Switch', ' Router']
Vendor Cisco Systems, Inc.
Evaluation Facility Arca CCTL
Scheme US

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "f1ec28b08e5fd6b3",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10015-2008",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "api_url": "https://www.niap-ccevs.org/api/project/product/pcl_products/10015/",
      "categories": [
        "Network Switch",
        " Router"
      ],
      "category": "Network Switch",
      "certification_date": "2008-09-25",
      "evaluation_facility": "Arca CCTL",
      "expiration_date": null,
      "id": "CCEVS-VR-VID10015",
      "product": "Cisco MDS 9000 Family SAN-OS Release 3.2(2c)",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/products/10015",
      "vendor": "Cisco Systems, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2010-01-11",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10015-add1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Cisco MDS 9000 Family SAN-OS Release 3.2(2c)"
      }
    ]
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco MDS 9000 Family SAN-OS Release 3.2(2c)",
  "not_valid_after": "2012-07-20",
  "not_valid_before": "2008-09-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10015-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10015-2008",
        "cert_item": "Cisco MDS 9000 Family with SAN-OS Release 3.2(2c",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10015-2008": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.HOSTOS": 1,
          "A.MANAGEMENTLAN": 1,
          "A.NETPROTECT": 1,
          "A.NOEVIL": 1,
          "A.PASSWORD": 1,
          "A.PERSONNEL": 1,
          "A.PHYSICAL": 1,
          "A.TIMESOURCE": 1,
          "A.VSANTIMESYNC": 1,
          "A.ZONECONNECT": 1
        },
        "T": {
          "T.EXCEEDPRIV": 1,
          "T.NODETECT": 1,
          "T.SWITCHCOMPROMISE": 1,
          "T.USERATTACK": 1,
          "T.VSANCOMPROMISE": 1,
          "T.ZONECOMPROMISE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AGD": {
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_FLR.1": 1
        },
        "ATE": {
          "ATE_IND": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 1,
          "EAL 3 augmented": 1,
          "EAL3": 5
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 14
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 106
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "dmh",
      "/CreationDate": "D:20081023161422-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20081024085129-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/Title": "Microsoft Word - CCEVS-VR-VID10015-2008-v1.1.doc",
      "pdf_file_size_bytes": 193834,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "st_vid10015-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 3
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.HOSTOS": 5,
          "A.MANAGEMENTLAN": 1,
          "A.NETPROTECT": 5,
          "A.NOACCESS": 1,
          "A.NOEVIL": 8,
          "A.PASSWORD": 7,
          "A.PERSONNEL": 8,
          "A.PHYSICAL": 5,
          "A.TIMESOURCE": 5,
          "A.VSANTIMESYNC": 1,
          "A.ZONECONNECT": 5
        },
        "O": {
          "O.AUDIT": 16,
          "O.MONITOR": 19,
          "O.PRIVILEGE": 23,
          "O.SECUREOPERATE": 40,
          "O.SWITCHACCESS": 22,
          "O.VSANACCESS": 26,
          "O.VSANPROTECT": 12,
          "O.ZONEACCESS": 23
        },
        "OE": {
          "OE.AAA": 12,
          "OE.FMSTORAGE": 9,
          "OE.SECUREMANAGE": 21,
          "OE.TIME": 4,
          "OE.TRAFFICPROTECT": 11
        },
        "T": {
          "T.EXCEEDPRIV": 4,
          "T.NODETECT": 4,
          "T.NORESPONSE": 1,
          "T.SWITCHCOMPROMISE": 6,
          "T.USERATTACK": 10,
          "T.VSANCOMPROMISE": 6,
          "T.ZONECOMPROMISE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 19,
          "ACM_SCP.1": 7
        },
        "ADO": {
          "ADO_DEL.1": 7,
          "ADO_IGS": 1,
          "ADO_IGS.1": 8
        },
        "ADV": {
          "ADV_FSP.1": 24,
          "ADV_HLD.1": 6,
          "ADV_HLD.2": 14,
          "ADV_RCR.1": 8,
          "ADV_SPM.1": 4
        },
        "AGD": {
          "AGD_ADM.1": 18,
          "AGD_USR.1": 18
        },
        "ALC": {
          "ALC_DVS.1": 9,
          "ALC_FLR.1": 13
        },
        "ATE": {
          "ATE_COV.2": 7,
          "ATE_DPT.1": 6,
          "ATE_FUN.1": 17,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_MSU.1": 9,
          "AVA_SOF.1": 7,
          "AVA_VLA.1": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 2,
          "EAL 3 augmented": 1,
          "EAL3": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 18,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 13,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 4,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 4,
          "FCS_CKM.1": 29,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.4": 21,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 50,
          "FCS_COP.1.1": 5
        },
        "FDP": {
          "FDP_IFC.1": 57,
          "FDP_IFC.1.1": 3,
          "FDP_IFF.1": 47,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 3,
          "FDP_IFF.1.3": 3,
          "FDP_IFF.1.4": 3,
          "FDP_IFF.1.5": 3,
          "FDP_IFF.1.6": 3
        },
        "FIA": {
          "FIA_ATD.1": 20,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 21,
          "FIA_UAU.5": 26,
          "FIA_UAU.5.1": 2,
          "FIA_UAU.5.2": 3,
          "FIA_UID.1": 5,
          "FIA_UID.2": 26
        },
        "FMT": {
          "FMT_MOF.1": 24,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 5,
          "FMT_MSA.1": 27,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 36,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 27,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 20,
          "FMT_MTD.1.1": 3,
          "FMT_SAE.1": 13,
          "FMT_SAE.1.2": 1,
          "FMT_SMF.1": 26,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 26,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_SMR.3": 18,
          "FMT_SMR.3.1": 1
        },
        "FPT": {
          "FPT_RVM.1": 19,
          "FPT_RVM.1.1": 2,
          "FPT_SEP.1": 19,
          "FPT_SEP.1.1": 2,
          "FPT_SEP.1.2": 2,
          "FPT_STM.1": 2,
          "FPT_TAB.1": 1
        },
        "FTA": {
          "FTA_SSL.1": 1,
          "FTA_TSE.1": 23,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 15,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the local password files. Determination of the strength of function for cryptographic functions is out of scope of the Common Criteria. Therefore, no SOF claim for these requirements (and their corresponding": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 42,
          "SSHv2": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 10
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-2004-01-004": 1
        },
        "FIPS": {
          "FIPS PUB 46-3": 2
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 1321": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 8
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 8
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 206,
          "Cisco Systems": 3,
          "Cisco Systems, Inc": 4
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "dmh",
      "/CreationDate": "D:20080507115338Z",
      "/Creator": "FrameMaker 7.2",
      "/ModDate": "D:20081024085121-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/Title": "MDS9000-EAL3-ST-v3 0 8_15_08as.fm",
      "pdf_file_size_bytes": 1374263,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 102
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10015-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL3+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10015-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "0b2065eec6d8d9af3582d9828a4a31d7e83a4d14886ea432804de1b8cdbb3328",
      "txt_hash": "b79a6b9d51e00a00d80ddc100a356997a65e661a7f885de0f781e0e37f3feb61"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "48d9e55129c6e099508000b63c6b0f4c91e1af15ac0a32738cb49b58d42b5fcf",
      "txt_hash": "ed4b40bcd9108a78b09d6517c5bc97419a2e2a334e3fbc7ad2cd58d06fdaef89"
    }
  },
  "status": "archived"
}