eTugra SAM v1.4
Link Link by certificate ID Link by certificate nameCSV information ?
Status | active |
---|---|
Valid from | 16.04.2024 |
Valid until | 16.04.2029 |
Scheme | 🇮🇹 IT |
Manufacturer | E-Tugra EBG Information Technologies and Services Joint Stock Company |
Category | Products for Digital Signatures |
Security level | AVA_VAN.5, EAL4+ |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL4+, EAL2, EAL4Security Assurance Requirements (SAR)
ALC_FLR, AVA_VAN.5Certificates
OCSI/CERT/CCL/01/2023/RC, OCSI/CERT/CCL/13/2021/RCStandards
ISO/IEC 15408File metadata
Title | Certification Report "eTugra SAM v1.4".pdf |
---|---|
Author | Tiziano Inzerilli |
Creation date | D:20240419162007+02'00' |
Modification date | D:20240419162007+02'00' |
Pages | 2 |
Producer | Microsoft: Print To PDF |
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL4+, EAL2, EAL4, EAL 4+, EAL4 augmentedClaims
O.JSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Certificates
OCSI/CERT/CCL/01/2023/RC, OCSI/CERT/CCL/13/2021/RCEvaluation facilities
CCLab Software LaboratoryStandards
ISO/IEC 15408, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | Certification Report "eTugra SAM v1.4" |
---|---|
Author | OCSI |
Creation date | D:20240416084741+02'00' |
Modification date | D:20240416084741+02'00' |
Pages | 25 |
Creator | Microsoft® Word per Microsoft 365 |
Producer | Microsoft® Word per Microsoft 365 |
References
Outgoing- OCSI/CERT/CCL/13/2021/RC - active - Sophos Firewall OS v19.0.2-MR-2-Build472
- OCSI/CERT/CCL/01/2022/RC - active - Veritas NetBackup v9.1.0.1
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HMACAsymmetric Algorithms
RSA 2048, ECDSA, ECCHash functions
SHA256, SHA-224, SHA-384, SHA512, SHA224, SHA384, SHA-256, SHA3-224, SHA3-384, SHA3-512, SHA3-256, SHA-3, MD5Protocols
TLSRandomness
RNGElliptic Curves
P-256, P-384, P-521, NIST P-256, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP256t1, brainpoolP320t1, brainpoolP384t1, brainpoolP512t1Vendor
ThalesSecurity level
EAL 4, EAL 4 augmentedClaims
T.ENROLMENT_SIGNER_IMPERSONATION, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_, T.SVD_FORGERY, T.ADMIN_IMPERSONATION, T.MAINTENANCE_AUTHENTICATION_DISCLOSE, T.AUTHENTICATION_SIGNER_IMPERSONATION, T.SIGNER_AUTHENTICATION_DATA_MODIFIED, T.SAP_BYPASS, T.SAP_REPLAY, T.SAD_FORGERY, T.SIGNATURE_REQUEST_DISCLOSURE, T.DTBSR_FORGERY, T.SIGNATURE_FORGERY, T.PRIVILEGED_USER_INSERTION, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_, T.AUTHORISATION_DATA_UPDATE, T.CONTEXT_ALTERATION, T.AUDIT_ALTERATION, T.RANDOM, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION, T.AUTHORISATION_DATA_DISCLOSE, T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL, T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA, A.PRIVILEGED_USER, A.SIGNER_ENROLMENT, A.SIGNER_AUTHENTICATION_DATA_PROTECTION, A.SIGNER_DEVICE, A.CA, A.ACCESS_PROTECTED, A.AUTH_DATA, A.TSP_AUDITED, A.SEC_REQ, R.SVD, R.SAD, R.TSF_DATA, R.AUDIT, R.RANDOM, OT.SIGNER_PROTECTION, OT.REFERENCE_SIGNER_AUTHENTICATION_DATA, OT.SIGNER_KEY_PAIR_GENERATION, OT.SVD, OT.PRIVILEGED_USER_MANAGEMENT, OT.PRIVILEGED_USER_AUTHENTICATION, OT.PRIVILEGED_USER_PROTECTION, OT.SIGNER_MANAGEMENT, OT.SAD_VERIFICATION, OT.SAP, OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION, OT.DTBSR_INTEGRITY, OT.SIGNATURE_INTEGRITY, OT.CRYPTO, OT.RANDOM, OT.SYSTEM_PROTECTION, OT.AUDIT_PROTECTION, OE.SVD_AUTHENTICITY, OE.CA_REQUEST_CERTIFICATE, OE.CERTIFICATE_VERFICATION, OE.SIGNER_AUTHENTICATION_DATA, OE.DELEGATED_AUTHENTICATION, OE.DEVICE, OE.ENV, OE.CRYPTOMODULE_CERTIFIED, OE.CERTIFICATE_VERIFICATION, OSP.RANDOM, OSP.CRYPTOSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_RNG, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_COP, FCS_CKM.2, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_IFC, FDP_IFF, FDP_ITC, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FDP_IFF.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU, FIA_UID.2, FIA_USB.1, FIA_AFL, FIA_UID.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.5, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UTD.1, FMT_MSA, FMT_MSA.2, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MSA.1, FMT_MSA.3, FMT_SMR.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_PHP.1, FPT_PHP.3, FPT_RPL.1, FPT_STM.1, FPT_TDC.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TRP, FTP_TRP, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_TDC.1Evaluation facilities
CCLab Software LaboratoryCertification process
out of scope, used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication isSide-channel analysis
side-channels, physical tamperingCertification process
out of scope, used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication isStandards
FIPS 186-5, FIPS 140-3, FIPS PUB 186-5, FIPS PUB 140-3, FIPS 202, PKCS#1, AIS 20, AIS 31, RFC 5639, RFC 6151, ISO/IEC 19790, ISO/IEC 15408, ISO/IEC 19790:2012, CCMB-2017-04-004, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Author | Israr Ahmed |
---|---|
Creation date | D:20240423181459+05'00' |
Modification date | D:20240423181459+05'00' |
Pages | 244 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Heuristics ?
Extracted SARs
AGD_OPE.1, ATE_COV.2, ADV_TDS.3, ASE_OBJ.2, ALC_DVS.1, ATE_FUN.1, ASE_CCL.1, ASE_TSS.1, ALC_CMC.4, AVA_VAN.5, ASE_ECD.1, ADV_IMP.1, ADV_ARC.1, ALC_LCD.1, ALC_CMS.4, ASE_INT.1, ATE_IND.2, ASE_REQ.2, ATE_DPT.1, ALC_TAT.1, ADV_FSP.4, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1Scheme data ?
Title | eTugra SAM v1.4 | |
---|---|---|
Supplier | E-Tugra EBG Information Technologies and Services Joint Stock Company | |
Level | EAL4+ | |
Certification Date | 16 Aprile 2024 | |
Report Link It | https://www.ocsi.gov.it/documenti/certificazioni/eTugra/rc_etugra_sam_14_v.1.0_it.pdf | |
Report Link En | https://www.ocsi.gov.it/documenti/certificazioni/eTugra/cr_etugra_sam_14_v1.0_en.pdf | |
Target Link | https://www.ocsi.gov.it/documenti/certificazioni/eTugra/st_etugra_sam_14_v10.pdf |
References ?
Updates ?
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'title': 'eTugra SAM v1.4', 'supplier': ' E-Tugra EBG Information Technologies and Services Joint Stock Company', 'level': ' EAL4+', 'certification_date': ' 16 Aprile 2024', 'report_link_it': 'https://www.ocsi.gov.it/documenti/certificazioni/eTugra/rc_etugra_sam_14_v.1.0_it.pdf', 'report_link_en': 'https://www.ocsi.gov.it/documenti/certificazioni/eTugra/cr_etugra_sam_14_v1.0_en.pdf', 'target_link': 'https://www.ocsi.gov.it/documenti/certificazioni/eTugra/st_etugra_sam_14_v10.pdf'}
.
- The scheme_data property was set to
-
16.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '33c328755fbf1d37a91cc3d4b09921792d1c1a28619283be6904e2ca5ece38db', 'txt_hash': 'd55abc43a7a743babde5df36c52a19a2fe06c2e70007776ffe4caeee95261a46'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '133655af9909865cdeb79b0fe449dc4cf115b2e84448c2cb3b85a5f32bc564e1', 'txt_hash': '101d42984dfc892a5026f582c713b8a5014a26c1d0482285f4a86a4efe9b2cc7'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '017f772a979e6cba6dc59589984d5f691a03b45e954a2dab27958976fdb0c7a6', 'txt_hash': '34461af14aba6fd817f96246dc33559958aa0424a3ee6e80b0cb6095225af540'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 656782, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Title': 'Certification Report "eTugra SAM v1.4"', '/Author': 'OCSI', '/Creator': 'Microsoft® Word per Microsoft 365', '/CreationDate': "D:20240416084741+02'00'", '/ModDate': "D:20240416084741+02'00'", '/Producer': 'Microsoft® Word per Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.commoncriteriaportal.org/', 'https://www.sogis.eu/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1959590, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 244, '/Author': 'Israr Ahmed', '/Creator': 'Microsoft® Word 2021', '/CreationDate': "D:20240423181459+05'00'", '/ModDate': "D:20240423181459+05'00'", '/Producer': 'Microsoft® Word 2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-195307-ST_RevM.pdf', 'https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-195307-CR2-1.0.pdf']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 373181, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'Tiziano Inzerilli', '/CreationDate': "D:20240419162007+02'00'", '/ModDate': "D:20240419162007+02'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Certification Report "eTugra SAM v1.4".pdf', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'IT': {'OCSI/CERT/CCL/01/2023/RC': 25, 'OCSI/CERT/CCL/13/2021/RC': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL2': 4, 'EAL4': 10, 'EAL 4+': 4, 'EAL4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 4, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.J': 1}}, 'vendor': {}, 'eval_facility': {'CCLab': {'CCLab Software Laboratory': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 4}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 9, 'EAL 4 augmented': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 2, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_GEN.2': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_RNG': 3, 'FCS_CKM.1': 17, 'FCS_CKM.4': 29, 'FCS_COP.1': 14, 'FCS_RNG.1': 11, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 25, 'FCS_COP': 26, 'FCS_CKM.2': 6, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC': 91, 'FDP_ACF': 60, 'FDP_ETC': 15, 'FDP_IFC': 29, 'FDP_IFF': 15, 'FDP_ITC': 15, 'FDP_UCT.1': 7, 'FDP_UIT.1': 8, 'FDP_ITC.1': 12, 'FDP_ITC.2': 22, 'FDP_ACF.1': 49, 'FDP_ACC.1': 43, 'FDP_IFC.1': 24, 'FDP_ETC.2': 8, 'FDP_IFF.1': 14, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1}, 'FIA': {'FIA_AFL.1': 1, 'FIA_ATD.1': 12, 'FIA_UAU.2': 8, 'FIA_UAU': 15, 'FIA_UID.2': 11, 'FIA_USB.1': 18, 'FIA_AFL': 11, 'FIA_UID.1': 5, 'FIA_UAU.1': 5, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 4, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 2, 'FIA_USB.1.3': 1, 'FIA_UTD.1': 1}, 'FMT': {'FMT_MSA': 38, 'FMT_MSA.2': 9, 'FMT_MTD.1': 6, 'FMT_SMF.1': 10, 'FMT_SMR.2': 13, 'FMT_MSA.1': 10, 'FMT_MSA.3': 26, 'FMT_SMR.1': 10, 'FMT_MSA.2.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1}, 'FPT': {'FPT_PHP.1': 11, 'FPT_PHP.3': 9, 'FPT_RPL.1': 7, 'FPT_STM.1': 9, 'FPT_TDC.1': 14, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TRP': 2}, 'FTP': {'FTP_TRP': 24, 'FTP_ITC': 8, 'FTP_ITC.1': 11, 'FTP_TRP.1': 15, 'FTP_TDC.1': 2}}, 'cc_claims': {'T': {'T.ENROLMENT_SIGNER_IMPERSONATION': 10, 'T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_': 1, 'T.SVD_FORGERY': 8, 'T.ADMIN_IMPERSONATION': 8, 'T.MAINTENANCE_AUTHENTICATION_DISCLOSE': 6, 'T.AUTHENTICATION_SIGNER_IMPERSONATION': 10, 'T.SIGNER_AUTHENTICATION_DATA_MODIFIED': 6, 'T.SAP_BYPASS': 7, 'T.SAP_REPLAY': 7, 'T.SAD_FORGERY': 6, 'T.SIGNATURE_REQUEST_DISCLOSURE': 7, 'T.DTBSR_FORGERY': 7, 'T.SIGNATURE_FORGERY': 7, 'T.PRIVILEGED_USER_INSERTION': 10, 'T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_': 1, 'T.AUTHORISATION_DATA_UPDATE': 10, 'T.CONTEXT_ALTERATION': 11, 'T.AUDIT_ALTERATION': 7, 'T.RANDOM': 9, 'T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED': 3, 'T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION': 2, 'T.AUTHORISATION_DATA_DISCLOSE': 3, 'T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL': 2, 'T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA': 1}, 'A': {'A.PRIVILEGED_USER': 4, 'A.SIGNER_ENROLMENT': 4, 'A.SIGNER_AUTHENTICATION_DATA_PROTECTION': 4, 'A.SIGNER_DEVICE': 4, 'A.CA': 4, 'A.ACCESS_PROTECTED': 4, 'A.AUTH_DATA': 4, 'A.TSP_AUDITED': 4, 'A.SEC_REQ': 4}, 'R': {'R.SVD': 42, 'R.SAD': 27, 'R.TSF_DATA': 11, 'R.AUDIT': 2, 'R.RANDOM': 2}, 'OT': {'OT.SIGNER_PROTECTION': 20, 'OT.REFERENCE_SIGNER_AUTHENTICATION_DATA': 7, 'OT.SIGNER_KEY_PAIR_GENERATION': 19, 'OT.SVD': 4, 'OT.PRIVILEGED_USER_MANAGEMENT': 19, 'OT.PRIVILEGED_USER_AUTHENTICATION': 6, 'OT.PRIVILEGED_USER_PROTECTION': 18, 'OT.SIGNER_MANAGEMENT': 5, 'OT.SAD_VERIFICATION': 18, 'OT.SAP': 8, 'OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION': 19, 'OT.DTBSR_INTEGRITY': 4, 'OT.SIGNATURE_INTEGRITY': 18, 'OT.CRYPTO': 6, 'OT.RANDOM': 20, 'OT.SYSTEM_PROTECTION': 19, 'OT.AUDIT_PROTECTION': 5}, 'OE': {'OE.SVD_AUTHENTICITY': 5, 'OE.CA_REQUEST_CERTIFICATE': 4, 'OE.CERTIFICATE_VERFICATION': 2, 'OE.SIGNER_AUTHENTICATION_DATA': 6, 'OE.DELEGATED_AUTHENTICATION': 3, 'OE.DEVICE': 10, 'OE.ENV': 9, 'OE.CRYPTOMODULE_CERTIFIED': 5, 'OE.CERTIFICATE_VERIFICATION': 1}, 'OSP': {'OSP.RANDOM': 5, 'OSP.CRYPTO': 4}}, 'vendor': {'Thales': {'Thales': 4}}, 'eval_facility': {'CCLab': {'CCLab Software Laboratory': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'constructions': {'MAC': {'HMAC': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 3}, 'ECC': {'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 7, 'SHA-224': 2, 'SHA-384': 2, 'SHA512': 5, 'SHA224': 2, 'SHA384': 3, 'SHA-256': 1}, 'SHA3': {'SHA3-224': 4, 'SHA3-384': 5, 'SHA3-512': 5, 'SHA3-256': 3, 'SHA-3': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 2}}}, 'randomness': {'RNG': {'RNG': 9}}, 'cipher_mode': {}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 2, 'P-521': 4, 'NIST P-256': 2}, 'Brainpool': {'brainpoolP224r1': 2, 'brainpoolP256r1': 2, 'brainpoolP320r1': 2, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2, 'brainpoolP256t1': 2, 'brainpoolP320t1': 2, 'brainpoolP384t1': 2, 'brainpoolP512t1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channels': 1}, 'FI': {'physical tampering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-5': 7, 'FIPS 140-3': 1, 'FIPS PUB 186-5': 1, 'FIPS PUB 140-3': 1, 'FIPS 202': 1}, 'PKCS': {'PKCS#1': 5}, 'BSI': {'AIS 20': 2, 'AIS 31': 1}, 'RFC': {'RFC 5639': 4, 'RFC 6151': 2}, 'ISO': {'ISO/IEC 19790': 8, 'ISO/IEC 15408': 2, 'ISO/IEC 19790:2012': 1}, 'CC': {'CCMB-2017-04-004': 3, 'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'IT': {'OCSI/CERT/CCL/01/2023/RC': 1, 'OCSI/CERT/CCL/13/2021/RC': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL2': 2, 'EAL4': 2}}, 'cc_sar': {'ALC': {'ALC_FLR': 2}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
cr_etugra_sam_14_v1.0_en.pdf
. - The st_filename property was set to
st_etugra_sam_14_v10.pdf
. - The cert_filename property was set to
cr_FP_etugra_sam_14_v1.0_en.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
OCSI/CERT/CCL/01/2023/RC
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['OCSI/CERT/CCL/01/2022/RC']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['OCSI/CERT/CCL/01/2022/RC']}, 'directly_referencing': {'_type': 'Set', 'elements': ['OCSI/CERT/CCL/13/2021/RC']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['OCSI/CERT/CCL/13/2021/RC']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]}
values added. - The direct_transitive_cves property was set to
{'_type': 'Set', 'elements': ['CVE-2022-42300', 'CVE-2022-36989', 'CVE-2022-36997', 'CVE-2022-36996', 'CVE-2022-42301', 'CVE-2022-36986', 'CVE-2022-36999', 'CVE-2023-28759', 'CVE-2022-42304', 'CVE-2022-42305', 'CVE-2022-36998', 'CVE-2022-36987', 'CVE-2022-36994', 'CVE-2022-36995', 'CVE-2021-41570', 'CVE-2022-36991', 'CVE-2022-36984', 'CVE-2022-36993', 'CVE-2022-36985', 'CVE-2022-42303', 'CVE-2022-42307', 'CVE-2022-42302', 'CVE-2022-37000', 'CVE-2022-36990', 'CVE-2022-36988', 'CVE-2022-36992', 'CVE-2022-42299']}
. - The indirect_transitive_cves property was set to
{'_type': 'Set', 'elements': ['CVE-2022-42300', 'CVE-2022-36989', 'CVE-2022-36997', 'CVE-2022-36996', 'CVE-2022-42301', 'CVE-2022-36986', 'CVE-2022-36999', 'CVE-2023-28759', 'CVE-2022-42304', 'CVE-2022-42305', 'CVE-2022-36998', 'CVE-2022-36987', 'CVE-2022-36994', 'CVE-2022-36995', 'CVE-2021-41570', 'CVE-2022-36991', 'CVE-2022-36984', 'CVE-2022-36993', 'CVE-2022-36985', 'CVE-2022-42303', 'CVE-2022-42307', 'CVE-2022-42302', 'CVE-2022-37000', 'CVE-2022-36990', 'CVE-2022-36988', 'CVE-2022-36992', 'CVE-2022-42299']}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name eTugra SAM v1.4 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Products for Digital Signatures",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_etugra_sam_14_v1.0_en.pdf",
"dgst": "f4885e7bbdd8eb7d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "OCSI/CERT/CCL/01/2023/RC",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2022-42301",
"CVE-2022-42307",
"CVE-2022-36994",
"CVE-2022-42302",
"CVE-2022-42304",
"CVE-2022-36986",
"CVE-2022-36996",
"CVE-2022-42299",
"CVE-2022-42303",
"CVE-2022-36987",
"CVE-2022-36985",
"CVE-2022-36993",
"CVE-2022-36984",
"CVE-2021-41570",
"CVE-2022-36988",
"CVE-2022-36989",
"CVE-2022-36999",
"CVE-2022-36995",
"CVE-2022-36991",
"CVE-2022-36992",
"CVE-2022-37000",
"CVE-2022-36997",
"CVE-2022-42305",
"CVE-2023-28759",
"CVE-2022-36990",
"CVE-2022-42300",
"CVE-2022-36998"
]
},
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.4"
]
},
"indirect_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2022-42301",
"CVE-2022-42307",
"CVE-2022-36994",
"CVE-2022-42302",
"CVE-2022-42304",
"CVE-2022-36986",
"CVE-2022-36996",
"CVE-2022-42299",
"CVE-2022-42303",
"CVE-2022-36987",
"CVE-2022-36985",
"CVE-2022-36993",
"CVE-2022-36984",
"CVE-2021-41570",
"CVE-2022-36988",
"CVE-2022-36989",
"CVE-2022-36999",
"CVE-2022-36995",
"CVE-2022-36991",
"CVE-2022-36992",
"CVE-2022-37000",
"CVE-2022-36997",
"CVE-2022-42305",
"CVE-2023-28759",
"CVE-2022-36990",
"CVE-2022-42300",
"CVE-2022-36998"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/01/2022/RC"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/13/2021/RC"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/01/2022/RC"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/13/2021/RC"
]
}
},
"scheme_data": {
"certification_date": " 16 Aprile 2024",
"level": " EAL4+",
"report_link_en": "https://www.ocsi.gov.it/documenti/certificazioni/eTugra/cr_etugra_sam_14_v1.0_en.pdf",
"report_link_it": "https://www.ocsi.gov.it/documenti/certificazioni/eTugra/rc_etugra_sam_14_v.1.0_it.pdf",
"supplier": " E-Tugra EBG Information Technologies and Services Joint Stock Company",
"target_link": "https://www.ocsi.gov.it/documenti/certificazioni/eTugra/st_etugra_sam_14_v10.pdf",
"title": "eTugra SAM v1.4"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "E-Tugra EBG Information Technologies and Services Joint Stock Company",
"manufacturer_web": "https://e-tugra.com.tr/",
"name": "eTugra SAM v1.4",
"not_valid_after": "2029-04-16",
"not_valid_before": "2024-04-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "cr_FP_etugra_sam_14_v1.0_en.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"IT": {
"OCSI/CERT/CCL/01/2023/RC": 1,
"OCSI/CERT/CCL/13/2021/RC": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 2
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL4": 2,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Tiziano Inzerilli",
"/CreationDate": "D:20240419162007+02\u002700\u0027",
"/ModDate": "D:20240419162007+02\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Title": "Certification Report \"eTugra SAM v1.4\".pdf",
"pdf_file_size_bytes": 373181,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "cr_etugra_sam_14_v1.0_en.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"IT": {
"OCSI/CERT/CCL/01/2023/RC": 25,
"OCSI/CERT/CCL/13/2021/RC": 1
}
},
"cc_claims": {
"O": {
"O.J": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR": 4,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 4,
"EAL2": 4,
"EAL4": 10,
"EAL4 augmented": 3,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CCLab": {
"CCLab Software Laboratory": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 15408": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "OCSI",
"/CreationDate": "D:20240416084741+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word per Microsoft 365",
"/ModDate": "D:20240416084741+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word per Microsoft 365",
"/Title": "Certification Report \"eTugra SAM v1.4\"",
"pdf_file_size_bytes": 656782,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"https://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "st_etugra_sam_14_v10.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 6
}
},
"RSA": {
"RSA 2048": 3
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS_PROTECTED": 4,
"A.AUTH_DATA": 4,
"A.CA": 4,
"A.PRIVILEGED_USER": 4,
"A.SEC_REQ": 4,
"A.SIGNER_AUTHENTICATION_DATA_PROTECTION": 4,
"A.SIGNER_DEVICE": 4,
"A.SIGNER_ENROLMENT": 4,
"A.TSP_AUDITED": 4
},
"OE": {
"OE.CA_REQUEST_CERTIFICATE": 4,
"OE.CERTIFICATE_VERFICATION": 2,
"OE.CERTIFICATE_VERIFICATION": 1,
"OE.CRYPTOMODULE_CERTIFIED": 5,
"OE.DELEGATED_AUTHENTICATION": 3,
"OE.DEVICE": 10,
"OE.ENV": 9,
"OE.SIGNER_AUTHENTICATION_DATA": 6,
"OE.SVD_AUTHENTICITY": 5
},
"OSP": {
"OSP.CRYPTO": 4,
"OSP.RANDOM": 5
},
"OT": {
"OT.AUDIT_PROTECTION": 5,
"OT.CRYPTO": 6,
"OT.DTBSR_INTEGRITY": 4,
"OT.PRIVILEGED_USER_AUTHENTICATION": 6,
"OT.PRIVILEGED_USER_MANAGEMENT": 19,
"OT.PRIVILEGED_USER_PROTECTION": 18,
"OT.RANDOM": 20,
"OT.REFERENCE_SIGNER_AUTHENTICATION_DATA": 7,
"OT.SAD_VERIFICATION": 18,
"OT.SAP": 8,
"OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION": 19,
"OT.SIGNATURE_INTEGRITY": 18,
"OT.SIGNER_KEY_PAIR_GENERATION": 19,
"OT.SIGNER_MANAGEMENT": 5,
"OT.SIGNER_PROTECTION": 20,
"OT.SVD": 4,
"OT.SYSTEM_PROTECTION": 19
},
"R": {
"R.AUDIT": 2,
"R.RANDOM": 2,
"R.SAD": 27,
"R.SVD": 42,
"R.TSF_DATA": 11
},
"T": {
"T.ADMIN_IMPERSONATION": 8,
"T.AUDIT_ALTERATION": 7,
"T.AUTHENTICATION_SIGNER_IMPERSONATION": 10,
"T.AUTHORISATION_DATA_DISCLOSE": 3,
"T.AUTHORISATION_DATA_UPDATE": 10,
"T.CONTEXT_ALTERATION": 11,
"T.DTBSR_FORGERY": 7,
"T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_": 1,
"T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL": 2,
"T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED": 3,
"T.ENROLMENT_SIGNER_IMPERSONATION": 10,
"T.MAINTENANCE_AUTHENTICATION_DISCLOSE": 6,
"T.PRIVILEGED_USER_INSERTION": 10,
"T.RANDOM": 9,
"T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_": 1,
"T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA": 1,
"T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION": 2,
"T.SAD_FORGERY": 6,
"T.SAP_BYPASS": 7,
"T.SAP_REPLAY": 7,
"T.SIGNATURE_FORGERY": 7,
"T.SIGNATURE_REQUEST_DISCLOSURE": 7,
"T.SIGNER_AUTHENTICATION_DATA_MODIFIED": 6,
"T.SVD_FORGERY": 8
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 1,
"AGD_PRE": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 9,
"EAL 4 augmented": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 7,
"FAU_GEN.2.1": 1
},
"FCS": {
"FCS_CKM": 25,
"FCS_CKM.1": 17,
"FCS_CKM.2": 6,
"FCS_CKM.4": 29,
"FCS_CKM.4.1": 1,
"FCS_COP": 26,
"FCS_COP.1": 14,
"FCS_RNG": 3,
"FCS_RNG.1": 11,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 91,
"FDP_ACC.1": 43,
"FDP_ACF": 60,
"FDP_ACF.1": 49,
"FDP_ETC": 15,
"FDP_ETC.2": 8,
"FDP_IFC": 29,
"FDP_IFC.1": 24,
"FDP_IFF": 15,
"FDP_IFF.1": 14,
"FDP_ITC": 15,
"FDP_ITC.1": 12,
"FDP_ITC.2": 22,
"FDP_UCT.1": 7,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 8,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 11,
"FIA_AFL.1": 1,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_ATD.1": 12,
"FIA_ATD.1.1": 1,
"FIA_UAU": 15,
"FIA_UAU.1": 5,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 4,
"FIA_UID.1": 5,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1,
"FIA_USB.1": 18,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 2,
"FIA_USB.1.3": 1,
"FIA_UTD.1": 1
},
"FMT": {
"FMT_MSA": 38,
"FMT_MSA.1": 10,
"FMT_MSA.2": 9,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 26,
"FMT_MTD.1": 6,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.2": 13,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_PHP.1": 11,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 1,
"FPT_RPL.1": 7,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 14,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TRP": 2
},
"FTP": {
"FTP_ITC": 8,
"FTP_ITC.1": 11,
"FTP_TDC.1": 2,
"FTP_TRP": 24,
"FTP_TRP.1": 15
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP224r1": 2,
"brainpoolP256r1": 2,
"brainpoolP256t1": 2,
"brainpoolP320r1": 2,
"brainpoolP320t1": 2,
"brainpoolP384r1": 2,
"brainpoolP384t1": 2,
"brainpoolP512r1": 2,
"brainpoolP512t1": 2
},
"NIST": {
"NIST P-256": 2,
"P-256": 2,
"P-384": 2,
"P-521": 4
}
},
"eval_facility": {
"CCLab": {
"CCLab Software Laboratory": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA2": {
"SHA-224": 2,
"SHA-256": 1,
"SHA-384": 2,
"SHA224": 2,
"SHA256": 7,
"SHA384": 3,
"SHA512": 5
},
"SHA3": {
"SHA-3": 1,
"SHA3-224": 4,
"SHA3-256": 3,
"SHA3-384": 5,
"SHA3-512": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 9
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 4
},
"SCA": {
"side-channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 31": 1
},
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 3
},
"FIPS": {
"FIPS 140-3": 1,
"FIPS 186-5": 7,
"FIPS 202": 1,
"FIPS PUB 140-3": 1,
"FIPS PUB 186-5": 1
},
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 19790": 8,
"ISO/IEC 19790:2012": 1
},
"PKCS": {
"PKCS#1": 5
},
"RFC": {
"RFC 5639": 4,
"RFC 6151": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Israr Ahmed",
"/CreationDate": "D:20240423181459+05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20240423181459+05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"pdf_file_size_bytes": 1959590,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-195307-CR2-1.0.pdf",
"https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-195307-ST_RevM.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 244
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf",
"pp_name": "Trustworthy Systems Supporting Server Signing Part 2 : Protection Profiles for QSCD for Server Signin..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf",
"scheme": "IT",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "017f772a979e6cba6dc59589984d5f691a03b45e954a2dab27958976fdb0c7a6",
"txt_hash": "34461af14aba6fd817f96246dc33559958aa0424a3ee6e80b0cb6095225af540"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "33c328755fbf1d37a91cc3d4b09921792d1c1a28619283be6904e2ca5ece38db",
"txt_hash": "d55abc43a7a743babde5df36c52a19a2fe06c2e70007776ffe4caeee95261a46"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "133655af9909865cdeb79b0fe449dc4cf115b2e84448c2cb3b85a5f32bc564e1",
"txt_hash": "101d42984dfc892a5026f582c713b8a5014a26c1d0482285f4a86a4efe9b2cc7"
}
},
"status": "active"
}