This page was not yet optimized for use on mobile devices.
secunet konnektor 2.0.0, Version 5.1.2:2.0.0
CSV information ?
Status | active |
---|---|
Valid from | 09.09.2022 |
Valid until | 08.09.2027 |
Scheme | 🇩🇪 DE |
Manufacturer | Secunet Security Networks AG |
Category | Other Devices and Systems |
Security level | AVA_VAN.5, ALC_TAT.1, ALC_FLR.2, ADV_IMP.1, EAL3+, ADV_TDS.3, ADV_FSP.4 |
Maintenance updates | secunet konnektor 2.0.0, Version 5.1.3:2.0.0 (21.11.2022) Certification report |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-1201-2022
Certificate ?
Extracted keywords
Security level
EAL 3, EAL 2Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR.2, ALC_FLR, AVA_VAN.3Protection profiles
BSI-CC-PP-0098-V3-2021-MA-01Certificates
BSI-DSZ-CC-1201-2022Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Zertifikat BSI-DSZ-CC-1201-2022 |
---|---|
Subject | Zertifikat BSI-DSZ-CC-1201-2022 |
Keywords | "Common Criteria, Certification, Zertifizierung, Konnektor" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20220907140830+02'00' |
Modification date | D:20220913105534+02'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 7.2 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSAOAEP, ECDH, ECDSA, ECIES, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-256, SHA256, SHA-512Schemes
Key Exchange, AEADProtocols
TLS, TLS v1.2, TLS 1.2, IKEv2, IKE, IPsec, VPNElliptic Curves
brainpoolP256r1, FRP256v1Block cipher modes
ECB, CBC, GCMOperating System name
STARCOS 3Security level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 5+, EAL 6Claims
OE.NK, OE.AKSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR.2, ALC_FLR, ALC_CMS.4, ALC_CMS, AVA_VAN.3Security Functional Requirements (SFR)
FCS_COP.1, FCS_COP, FCS_CKM.1, FCS_CKM, FDP_DAU, FDP_ITC, FDP_UIT, FMT_MTD, FPT_TDC, FTP_ITC, FTP_TRPProtection profiles
BSI-CC-PP-0098-V3-2021-MA-01, BSI-CC-PP-0098Certificates
BSI-DSZ-CC-1201-2022, BSI-DSZ-CC-1184-2022, CC-1184-2022Evaluation facilities
SRC Security Research & ConsultingStandards
FIPS 180-4, FIPS186-4, FIPS 197, FIPS180-4, FIPS PUB 180-4, FIPS197, SP 800-38D, PKCS#1, PKCS#12, PKCS5, AIS 20, AIS 32, AIS 34, RFC5652, RFC-8017, RFC-5639, RFC5639, RFC-6931, RFC 8017, RFC7027, RFC-3526, RFC-7296, RFC-6954, RFC-5246, RFC-3268, RFC-4492, RFC-8247, RFC-2404, RFC-2104, RFC-5869, RFC4055, RFC5280, RFC7292, RFC-4868, RFC-3602, RFC-4303, RFC-4301, RFC-5289, RFC-5116, RFC-5652, RFC-4880, RFC2104, RFC 2104, RFC2404, RFC3268, RFC 3268, RFC3526, RFC3602, RFC4301, RFC4303, RFC4346, RFC4868, RFC4880, RFC5246, RFC5289, RFC5996, RFC7296, RFC8017, RFC4106, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509Technical reports
BSI TR-02102, BSI TR-03116-1, BSI TR-03154, BSI TR-03155, BSI TR-03157, BSI 7148File metadata
Title | Zertifizierungsreport BSI-DSZ-CC-1201-2022 |
---|---|
Subject | Zertifizierungsreport BSI-DSZ-CC-1201-2022 |
Keywords | "Common Criteria, Certification, Zertifizierung, Konnektor" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20220907140830+02'00' |
Modification date | D:20220912170040+02'00' |
Pages | 45 |
Creator | Writer |
Producer | LibreOffice 7.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-1201-2022 |
---|---|
Certified item | secunet konnektor 2.0.0, Version 5.1.2:2.0.0 |
Certification lab | BSI |
Developer | secunet Security Networks AG |
References
Outgoing- BSI-DSZ-CC-1184-2022 - active - secunet konnektor 2.0.0, Version 5.0.5:2.0.0
Security target ?
Extracted keywords
Symmetric Algorithms
AES128, AES256, AES, AES-128, AES-256, AES-192, HPC, E2, DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, RSA-2048, RSAOAEP, ECDH, ECDSA, ECIES, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA256, SHA-384, SHA-512, SHA-2Schemes
MAC, Key ExchangeProtocols
SSL, TLS, TLS 1.2, TLS 1.3, IKEv2, IKE, IPsec, VPNRandomness
RNGElliptic Curves
P-256, P-384, brainpoolP256r1, brainpoolP384r1Block cipher modes
CBC, GCMTLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384146Operating System name
STARCOS 3Trusted Execution Environments
SESecurity level
EAL3Claims
O.NK, O.AK, T.NK, T.AK, A.AK, A.NK, OE.NK, OE.AK, OSP.AK, OSP.NKSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_ARC.1, ADV_TDS, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_OPE, AGD_PRE.1, ALC_TAT.1, ALC_FLR.2, ALC_DEL.1, AVA_VAN.3, AVA_VAN, AVA_VAN.5, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG, FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_SAR, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_CKM.2, FCS_CMK.4, FDP_ACF, FDP_IFC, FDP_IFF, FDP_IFF.1, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_ITC, FDP_ITC.1, FDP_UIT, FDP_UIT.1, FDP_ITC.2, FDP_ETC, FDP_ETC.2, FDP_SOS.2, FDP_UCT, FDP_UCT.1, FDP_ACF.1.2, FDP_DAU, FDP_DAU.1, FDP_DAU.2, FDP_DAU.2.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FIA_API, FIA_UAU, FIA_API.1, FIA_UAU.5, FIA_API.1.1, FIA_UID.1, FIA_UID, FIA_UAU.1, FIA_SOS, FIA_SOS.1, FIA_SOS.2, FMT_MTD.1, FMT_MSA, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMR.1.1, FMT_MOF, FMT_MTD, FMT_SMF.1, FMT_SMF, FMT_MOF.1, FMT_MSA.4, FMT_SMR, FPT_EMS, FPT_EMS.1, FPT_STM, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TDC, FPT_STM.1, FPT_TDC.1, FPT_TST, FPT_TST.1, FPT_TDC.1.2, FPT_FLS, FPT_FLS.1, FPT_TEE, FPT_TEE.1, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0098, BSI-CC-PP-0098“, BSI-CC-PP-0097, BSI-PP-0032Certificates
BSI-DSZ-CC-0098-V3-2021-MA-01, BSI-DSZ-CC-1201, CC-1184-2022Side-channel analysis
side channelStandards
FIPS PUB 180-4, FIPS 197, FIPS PUB 186-4, FIPS 180-4, PKCS#1, PKCS#12, PKCS#7, PKCS #12, RFC 2131, RFC 2132, RFC 5652, RFC 4301, RFC 4303, RFC 7296, RFC 3602, RFC 2404, RFC 4868, RFC 8017, RFC 4106, RFC 5246, RFC-5639, RFC-7027, RFC 2104, RFC 8422, RFC 5289, RFC 4055, RFC 5639, RFC5652, RFC 4122, RFC4122, RFC2617, RFC2818, RFC-5246, RFC-5869, RFC 5116, RFC 5126, RFC 2560, RFC7296, RFC 5905, RFC 4302, RFC 2406, RFC 3526, RFC 8446, RFC 3268, RFC 4492, RFC 5083, RFC 5084, RFC 5280, RFC 5869, RFC 7027, X.509, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03114, BSI TR-03144, BSI TR-03116-1, BSI TR-03111, BSI TR-03154, BSI TR-03155, BSI TR-03157File metadata
Title | Security Target für secunet konnektor 2.0.0 (eHealth Konnektor PTV5 WR1) |
---|---|
Subject | Security Target BSI-DSZ-CC-1201-2022 |
Keywords | "Common Criteria, Certification, Zertifizierung, Konnektor" |
Author | koob.christian |
Creation date | D:20220627155011+02'00' |
Modification date | D:20220916101954+02'00' |
Pages | 424 |
Creator | PDF24 Creator |
Producer | GPL Ghostscript 9.56.1 |
Heuristics ?
Certificate ID: BSI-DSZ-CC-1201-2022
Extracted SARs
ADV_TDS.3, AGD_OPE.1, ADV_ARC.1, ALC_DEL.1, AGD_PRE.1, ALC_FLR.2, ALC_CMS.4, ALC_TAT.1, ADV_IMP.1, AVA_VAN.5, ASE_TSS.1, ADV_FSP.4Similar certificates
Showing 5 out of 20.
Scheme data ?
Cert Id | BSI-DSZ-CC-1201-2022 | |
---|---|---|
Product | secunet konnektor 2.0.0, Version 5.1.2:2.0.0 | |
Vendor | secunet Security Networks AG | |
Certification Date | 09.09.2022 | |
Category | eHealth | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Software/1201.html | |
Enhanced | ||
Product | secunet konnektor 2.0.0, Version 5.1.2:2.0.0 | |
Applicant | secunet Security Networks AG Kurfürstenstraße 58 45138 Essen | |
Evaluation Facility | SRC Security Research & Consulting GmbH | |
Assurance Level | EAL3,AVA_VAN.5,ALC_TAT.1,ALC_FLR.2,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4 | |
Protection Profile | Common Criteria Schutzprofil (Protection Profile) Schutzprofil 2: Anforderungen an den Konnektor, Version 1.6, BSI-CC-PP-0098-V3-2021-MA-01 vom 30.02.2022 | |
Certification Date | 09.09.2022 | |
Expiration Date | 08.09.2027 | |
Entries | [frozendict({'id': 'BSI-DSZ-CC-1201-2022-MA-01 (Ausstellungsdatum / Certification Date 21.11.2022)', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-1201-2022 (Ausstellungsdatum / Certification Date 09.09.2022, gültig bis / valid until 08.09.2027)', 'description': 'Certificate'})] | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1201a_pdf.pdf?__blob=publicationFile&v=1 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1201b_pdf.pdf?__blob=publicationFile&v=1 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1201c_pdf.pdf?__blob=publicationFile&v=1 | |
Description | The Target of evaluation (TOE) is a software product consisting of the Netzkonnektor and the Anwendungskonnektor as specified in the Protection Profile BSI-CC-PP-0098. The Netzkonnektor includes the security functionality of a Firewall, a VPN-client, an NTP Server, a name service (DNS) and a DHCP service. The TOE also includes the basic functions for establishment of secure TLS connections to other IT products. The TOE is part of the Konnektor and it is delivered pre-installed on exactly one hardware-configuration. The security functionality of the Anwendungskonnektor comprises the signature service, encryption and decryption of documents, a card terminal service and a smart card service. Together with the network connector, the Anwendungskonnektor also enables secure communication between the connector and the client system and between Fachmodulen and Fachdiensten. | |
Subcategory | Software |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2022-09-09', 'enhanced': {'__update__': {'applicant': 'secunet Security Networks AG Kurfürstenstraße 58 45138 Essen', 'certification_date': '2022-09-09', 'expiration_date': '2027-09-08'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4c78f95547cad8cf8607db19b9829dd5bffa6a64108ae0a5937ca03841d8ebfb', 'txt_hash': 'f5803e6dc9aa7ff863cdb48215cf7468ca2a07b0078389c1627d9021fa80b868'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e278bd5fd2326402ff0261b633f2a29ebc540f07ddc72df9fdfc92bcf605a5aa', 'txt_hash': '4ea28442f67fba1bb3862b1d81888556915b39760cfcbb9e3c7feec3099ad184'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b5d9acef43295646708ab0c75355cf4cd97e013449c7032d9721747b235df024', 'txt_hash': 'd6757e0e41cf8eff42006dacec1b51e76c0a06700be84a1e25c742adbbfd66ad'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 770517, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20220907140830+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Konnektor"', '/ModDate': "D:20220912170040+02'00'", '/Producer': 'LibreOffice 7.2', '/Subject': 'Zertifizierungsreport BSI-DSZ-CC-1201-2022', '/Title': 'Zertifizierungsreport BSI-DSZ-CC-1201-2022', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-spec.pdf', 'https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-6', 'https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.commoncriteriaportal.org/cc/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 3201982, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 424, '/Author': 'koob.christian', '/CreationDate': "D:20220627155011+02'00'", '/Creator': 'PDF24 Creator', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Konnektor"', '/ModDate': "D:20220916101954+02'00'", '/Producer': 'GPL Ghostscript 9.56.1', '/Subject': 'Security Target BSI-DSZ-CC-1201-2022', '/Title': 'Security Target für secunet konnektor 2.0.0 (eHealth Konnektor PTV5 WR1)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 425149, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20220907140830+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Konnektor"', '/ModDate': "D:20220913105534+02'00'", '/Producer': 'LibreOffice 7.2', '/Subject': 'Zertifikat BSI-DSZ-CC-1201-2022', '/Title': 'Zertifikat BSI-DSZ-CC-1201-2022', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)'], 'cert_id': 'BSI-DSZ-CC-1201-2022', 'cert_item': 'secunet konnektor 2.0.0, Version 5.1.2:2.0.0', 'developer': 'secunet Security Networks AG', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1201-2022': 23, 'BSI-DSZ-CC-1184-2022': 1}, 'NL': {'CC-1184-2022': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0098-V3-2021-MA-01': 3, 'BSI-CC-PP-0098': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 4, 'EAL 2': 3, 'EAL 1': 1, 'EAL 4': 1, 'EAL 5+': 1, 'EAL 6': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 4, 'ADV_IMP.1': 4, 'ADV_TDS.3': 4}, 'ALC': {'ALC_TAT.1': 4, 'ALC_FLR.2': 4, 'ALC_FLR': 3, 'ALC_CMS.4': 1, 'ALC_CMS': 1}, 'AVA': {'AVA_VAN.3': 5}}, 'cc_sfr': {'FCS': {'FCS_COP.1': 2, 'FCS_COP': 44, 'FCS_CKM.1': 1, 'FCS_CKM': 9}, 'FDP': {'FDP_DAU': 5, 'FDP_ITC': 2, 'FDP_UIT': 2}, 'FMT': {'FMT_MTD': 2}, 'FPT': {'FPT_TDC': 16}, 'FTP': {'FTP_ITC': 5, 'FTP_TRP': 1}}, 'cc_claims': {'OE': {'OE.NK': 4, 'OE.AK': 6}}, 'vendor': {}, 'eval_facility': {'SRC': {'SRC Security Research & Consulting': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 28, 'AES-128': 2, 'AES-': 3, 'AES-256': 2}}, 'constructions': {'MAC': {'HMAC': 13, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {'RSA': {'RSAOAEP': 4}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 29}, 'ECIES': {'ECIES': 8}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 19, 'SHA256': 2, 'SHA-512': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 5}, 'AEAD': {'AEAD': 3}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 42, 'TLS v1.2': 6, 'TLS 1.2': 2}}, 'IKE': {'IKEv2': 12, 'IKE': 6}, 'IPsec': {'IPsec': 12}, 'VPN': {'VPN': 13}}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}, 'GCM': {'GCM': 16}}, 'ecc_curve': {'Brainpool': {'brainpoolP256r1': 1}, 'ANSSI': {'FRP256v1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI TR-03116-1': 1, 'BSI TR-03154': 1, 'BSI TR-03155': 1, 'BSI TR-03157': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {'STARCOS': {'STARCOS 3': 2}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 24, 'FIPS186-4': 4, 'FIPS 197': 9, 'FIPS180-4': 1, 'FIPS PUB 180-4': 1, 'FIPS197': 1}, 'NIST': {'SP 800-38D': 5}, 'PKCS': {'PKCS#1': 8, 'PKCS#12': 2, 'PKCS5': 1}, 'BSI': {'AIS 20': 2, 'AIS 32': 1, 'AIS 34': 1}, 'RFC': {'RFC5652': 1, 'RFC-8017': 12, 'RFC-5639': 15, 'RFC5639': 16, 'RFC-6931': 1, 'RFC 8017': 1, 'RFC7027': 3, 'RFC-3526': 2, 'RFC-7296': 5, 'RFC-6954': 1, 'RFC-5246': 4, 'RFC-3268': 3, 'RFC-4492': 2, 'RFC-8247': 1, 'RFC-2404': 2, 'RFC-2104': 3, 'RFC-5869': 2, 'RFC4055': 1, 'RFC5280': 1, 'RFC7292': 1, 'RFC-4868': 1, 'RFC-3602': 2, 'RFC-4303': 2, 'RFC-4301': 3, 'RFC-5289': 1, 'RFC-5116': 3, 'RFC-5652': 3, 'RFC-4880': 1, 'RFC2104': 1, 'RFC 2104': 1, 'RFC2404': 1, 'RFC3268': 1, 'RFC 3268': 1, 'RFC3526': 1, 'RFC3602': 1, 'RFC4301': 1, 'RFC4303': 1, 'RFC4346': 1, 'RFC4868': 1, 'RFC4880': 1, 'RFC5246': 1, 'RFC5289': 1, 'RFC5996': 1, 'RFC7296': 1, 'RFC8017': 1, 'RFC4106': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}, 'X509': {'X.509': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0098-V3-2021-MA-01': 1, 'BSI-DSZ-CC-1201': 1}, 'NL': {'CC-1184-2022': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0098': 21, 'BSI-CC-PP-0098“': 1, 'BSI-CC-PP-0097': 6, 'BSI-PP-0032': 1}}, 'cc_security_level': {'EAL': {'EAL3': 8}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 6, 'ADV_TDS.3': 6, 'ADV_IMP.1': 6, 'ADV_ARC.1': 3, 'ADV_TDS': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 13, 'AGD_OPE': 1, 'AGD_PRE.1': 4}, 'ALC': {'ALC_TAT.1': 6, 'ALC_FLR.2': 6, 'ALC_DEL.1': 6}, 'AVA': {'AVA_VAN.3': 7, 'AVA_VAN': 1, 'AVA_VAN.5': 2}, 'ASE': {'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG': 14, 'FAU_GEN': 26, 'FAU_GEN.1': 12, 'FAU_GEN.2': 1, 'FAU_SAR': 6, 'FAU_SAR.1': 2, 'FAU_STG.1': 2, 'FAU_STG.3': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP': 291, 'FCS_CKM.1': 36, 'FCS_CKM.4': 34, 'FCS_COP.1': 33, 'FCS_CKM': 131, 'FCS_CKM.2': 8, 'FCS_CMK.4': 1}, 'FDP': {'FDP_ACF': 118, 'FDP_IFC': 19, 'FDP_IFF': 21, 'FDP_IFF.1': 20, 'FDP_IFC.1': 19, 'FDP_RIP': 21, 'FDP_RIP.1': 2, 'FDP_ACC.1': 43, 'FDP_ACC': 97, 'FDP_ACF.1': 72, 'FDP_ITC': 36, 'FDP_ITC.1': 35, 'FDP_UIT': 16, 'FDP_UIT.1': 6, 'FDP_ITC.2': 52, 'FDP_ETC': 17, 'FDP_ETC.2': 8, 'FDP_SOS.2': 1, 'FDP_UCT': 5, 'FDP_UCT.1': 1, 'FDP_ACF.1.2': 1, 'FDP_DAU': 33, 'FDP_DAU.1': 3, 'FDP_DAU.2': 9, 'FDP_DAU.2.1': 1, 'FDP_SDI': 7, 'FDP_SDI.1': 1, 'FDP_SDI.2': 2}, 'FIA': {'FIA_API': 13, 'FIA_UAU': 41, 'FIA_API.1': 3, 'FIA_UAU.5': 4, 'FIA_API.1.1': 2, 'FIA_UID.1': 12, 'FIA_UID': 14, 'FIA_UAU.1': 4, 'FIA_SOS': 17, 'FIA_SOS.1': 1, 'FIA_SOS.2': 3}, 'FMT': {'FMT_MTD.1': 7, 'FMT_MSA': 108, 'FMT_MSA.3': 28, 'FMT_MSA.1': 10, 'FMT_SMR.1': 43, 'FMT_SMR.1.1': 1, 'FMT_MOF': 18, 'FMT_MTD': 44, 'FMT_SMF.1': 14, 'FMT_SMF': 29, 'FMT_MOF.1': 2, 'FMT_MSA.4': 2, 'FMT_SMR': 10}, 'FPT': {'FPT_EMS': 16, 'FPT_EMS.1': 9, 'FPT_STM': 17, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_TDC': 49, 'FPT_STM.1': 4, 'FPT_TDC.1': 17, 'FPT_TST': 24, 'FPT_TST.1': 10, 'FPT_TDC.1.2': 1, 'FPT_FLS': 10, 'FPT_FLS.1': 2, 'FPT_TEE': 9, 'FPT_TEE.1': 2}, 'FTA': {'FTA_TAB': 14, 'FTA_TAB.1': 2}, 'FTP': {'FTP_ITC': 138, 'FTP_TRP': 15, 'FTP_ITC.1': 56, 'FTP_TRP.1': 11}}, 'cc_claims': {'O': {'O.NK': 209, 'O.AK': 385}, 'T': {'T.NK': 131, 'T.AK': 113}, 'A': {'A.AK': 88, 'A.NK': 67}, 'OE': {'OE.NK': 207, 'OE.AK': 199}, 'OSP': {'OSP.AK': 84, 'OSP.NK': 23}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES128': 4, 'AES256': 4, 'AES': 78, 'AES-128': 4, 'AES-256': 10, 'AES-192': 1}, 'HPC': {'HPC': 5}, 'E2': {'E2': 2}}, 'DES': {'DES': {'DES': 4}}, 'constructions': {'MAC': {'HMAC': 41, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2, 'RSA-2048': 1, 'RSAOAEP': 8}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 34}, 'ECIES': {'ECIES': 37}, 'ECC': {'ECC': 27}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 36, 'SHA256': 2, 'SHA-384': 6, 'SHA-512': 5, 'SHA-2': 8}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 3}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 283, 'TLS 1.2': 3, 'TLS 1.3': 2}}, 'IKE': {'IKEv2': 7, 'IKE': 22}, 'IPsec': {'IPsec': 33}, 'VPN': {'VPN': 58}}, 'randomness': {'RNG': {'RNG': 15}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'GCM': {'GCM': 11}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 2}, 'Brainpool': {'brainpoolP256r1': 5, 'brainpoolP384r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 3, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 3, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 3, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 3, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384146': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03114': 2, 'BSI TR-03144': 8, 'BSI TR-03116-1': 4, 'BSI TR-03111': 2, 'BSI TR-03154': 1, 'BSI TR-03155': 1, 'BSI TR-03157': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {'STARCOS': {'STARCOS 3': 2}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 15, 'FIPS 197': 9, 'FIPS PUB 186-4': 2, 'FIPS 180-4': 1}, 'PKCS': {'PKCS#1': 22, 'PKCS#12': 2, 'PKCS#7': 1, 'PKCS #12': 1}, 'RFC': {'RFC 2131': 3, 'RFC 2132': 3, 'RFC 5652': 2, 'RFC 4301': 4, 'RFC 4303': 5, 'RFC 7296': 6, 'RFC 3602': 3, 'RFC 2404': 2, 'RFC 4868': 2, 'RFC 8017': 4, 'RFC 4106': 2, 'RFC 5246': 7, 'RFC-5639': 1, 'RFC-7027': 1, 'RFC 2104': 2, 'RFC 8422': 2, 'RFC 5289': 2, 'RFC 4055': 2, 'RFC 5639': 7, 'RFC5652': 3, 'RFC 4122': 2, 'RFC4122': 2, 'RFC2617': 1, 'RFC2818': 1, 'RFC-5246': 2, 'RFC-5869': 2, 'RFC 5116': 3, 'RFC 5126': 1, 'RFC 2560': 1, 'RFC7296': 1, 'RFC 5905': 1, 'RFC 4302': 1, 'RFC 2406': 1, 'RFC 3526': 1, 'RFC 8446': 1, 'RFC 3268': 1, 'RFC 4492': 1, 'RFC 5083': 1, 'RFC 5084': 1, 'RFC 5280': 1, 'RFC 5869': 1, 'RFC 7027': 1}, 'X509': {'X.509': 32}, 'CC': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1201-2022': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0098-V3-2021-MA-01': 1}}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'ALC': {'ALC_TAT.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
1201a_pdf.pdf
. - The st_filename property was set to
1201b_pdf.pdf
. - The cert_filename property was set to
1201c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1201-2022
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1184-2022']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1184-2022']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1201a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1201b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name secunet konnektor 2.0.0, Version 5.1.2:2.0.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1201c_pdf.pdf",
"dgst": "f71e276c95e47642",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1201-2022",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.1.2",
"2.0.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1184-2022"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1184-2022"
]
}
},
"scheme_data": {
"category": "eHealth",
"cert_id": "BSI-DSZ-CC-1201-2022",
"certification_date": "2022-09-09",
"enhanced": {
"applicant": "secunet Security Networks AG Kurf\u00fcrstenstra\u00dfe 58 45138 Essen",
"assurance_level": "EAL3,AVA_VAN.5,ALC_TAT.1,ALC_FLR.2,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1201c_pdf.pdf?__blob=publicationFile\u0026v=1",
"certification_date": "2022-09-09",
"description": "The Target of evaluation (TOE) is a software product consisting of the Netzkonnektor and the Anwendungskonnektor as specified in the Protection Profile BSI-CC-PP-0098. The Netzkonnektor includes the security functionality of a Firewall, a VPN-client, an NTP Server, a name service (DNS) and a DHCP service. The TOE also includes the basic functions for establishment of secure TLS connections to other IT products. The TOE is part of the Konnektor and it is delivered pre-installed on exactly one hardware-configuration. The security functionality of the Anwendungskonnektor comprises the signature service, encryption and decryption of documents, a card terminal service and a smart card service. Together with the network connector, the Anwendungskonnektor also enables secure communication between the connector and the client system and between Fachmodulen and Fachdiensten.",
"entries": [
{
"description": "Maintenance Report",
"id": "BSI-DSZ-CC-1201-2022-MA-01 (Ausstellungsdatum / Certification Date 21.11.2022)"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-1201-2022 (Ausstellungsdatum / Certification Date 09.09.2022, g\u00fcltig bis / valid until 08.09.2027)"
}
],
"evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
"expiration_date": "2027-09-08",
"product": "secunet konnektor 2.0.0, Version 5.1.2:2.0.0",
"protection_profile": "Common Criteria Schutzprofil (Protection Profile) Schutzprofil 2: Anforderungen an den Konnektor, Version 1.6, BSI-CC-PP-0098-V3-2021-MA-01 vom 30.02.2022",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1201a_pdf.pdf?__blob=publicationFile\u0026v=1",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1201b_pdf.pdf?__blob=publicationFile\u0026v=1"
},
"product": "secunet konnektor 2.0.0, Version 5.1.2:2.0.0",
"subcategory": "Software",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Software/1201.html",
"vendor": "secunet Security Networks AG"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-11-21",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1044V6MA1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "secunet konnektor 2.0.0, Version 5.1.3:2.0.0"
}
]
},
"manufacturer": "Secunet Security Networks AG",
"manufacturer_web": "https://www.secunet.com/en/",
"name": "secunet konnektor 2.0.0, Version 5.1.2:2.0.0",
"not_valid_after": "2027-09-08",
"not_valid_before": "2022-09-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1201c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1201-2022": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0098-V3-2021-MA-01": 1
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1,
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20220907140830+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Konnektor\"",
"/ModDate": "D:20220913105534+02\u002700\u0027",
"/Producer": "LibreOffice 7.2",
"/Subject": "Zertifikat BSI-DSZ-CC-1201-2022",
"/Title": "Zertifikat BSI-DSZ-CC-1201-2022",
"pdf_file_size_bytes": 425149,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1201a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-1201-2022",
"cert_item": "secunet konnektor 2.0.0, Version 5.1.2:2.0.0",
"cert_lab": "BSI",
"developer": "secunet Security Networks AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) zu (.+?) der (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 9
},
"ECDSA": {
"ECDSA": 29
},
"ECIES": {
"ECIES": 8
}
},
"FF": {
"DH": {
"DH": 7,
"Diffie-Hellman": 3
}
},
"RSA": {
"RSAOAEP": 4
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1184-2022": 1,
"BSI-DSZ-CC-1201-2022": 23
},
"NL": {
"CC-1184-2022": 1
}
},
"cc_claims": {
"OE": {
"OE.AK": 6,
"OE.NK": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0098": 1,
"BSI-CC-PP-0098-V3-2021-MA-01": 3
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 4,
"ADV_IMP.1": 4,
"ADV_TDS.3": 4
},
"ALC": {
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_FLR": 3,
"ALC_FLR.2": 4,
"ALC_TAT.1": 4
},
"AVA": {
"AVA_VAN.3": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 3": 4,
"EAL 4": 1,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 1,
"FCS_COP": 44,
"FCS_COP.1": 2
},
"FDP": {
"FDP_DAU": 5,
"FDP_ITC": 2,
"FDP_UIT": 2
},
"FMT": {
"FMT_MTD": 2
},
"FPT": {
"FPT_TDC": 16
},
"FTP": {
"FTP_ITC": 5,
"FTP_TRP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 16
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 6,
"IKEv2": 12
},
"IPsec": {
"IPsec": 12
},
"TLS": {
"TLS": {
"TLS": 42,
"TLS 1.2": 2,
"TLS v1.2": 6
}
},
"VPN": {
"VPN": 13
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 3
},
"KEX": {
"Key Exchange": 5
}
},
"device_model": {},
"ecc_curve": {
"ANSSI": {
"FRP256v1": 1
},
"Brainpool": {
"brainpoolP256r1": 1
}
},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 19,
"SHA-512": 1,
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 2
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1,
"AIS 34": 1
},
"FIPS": {
"FIPS 180-4": 24,
"FIPS 197": 9,
"FIPS PUB 180-4": 1,
"FIPS180-4": 1,
"FIPS186-4": 4,
"FIPS197": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"NIST": {
"SP 800-38D": 5
},
"PKCS": {
"PKCS#1": 8,
"PKCS#12": 2,
"PKCS5": 1
},
"RFC": {
"RFC 2104": 1,
"RFC 3268": 1,
"RFC 8017": 1,
"RFC-2104": 3,
"RFC-2404": 2,
"RFC-3268": 3,
"RFC-3526": 2,
"RFC-3602": 2,
"RFC-4301": 3,
"RFC-4303": 2,
"RFC-4492": 2,
"RFC-4868": 1,
"RFC-4880": 1,
"RFC-5116": 3,
"RFC-5246": 4,
"RFC-5289": 1,
"RFC-5639": 15,
"RFC-5652": 3,
"RFC-5869": 2,
"RFC-6931": 1,
"RFC-6954": 1,
"RFC-7296": 5,
"RFC-8017": 12,
"RFC-8247": 1,
"RFC2104": 1,
"RFC2404": 1,
"RFC3268": 1,
"RFC3526": 1,
"RFC3602": 1,
"RFC4055": 1,
"RFC4106": 1,
"RFC4301": 1,
"RFC4303": 1,
"RFC4346": 1,
"RFC4868": 1,
"RFC4880": 1,
"RFC5246": 1,
"RFC5280": 1,
"RFC5289": 1,
"RFC5639": 16,
"RFC5652": 1,
"RFC5996": 1,
"RFC7027": 3,
"RFC7292": 1,
"RFC7296": 1,
"RFC8017": 1
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 28,
"AES-": 3,
"AES-128": 2,
"AES-256": 2
}
},
"constructions": {
"MAC": {
"HMAC": 13,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1,
"BSI TR-03116-1": 1,
"BSI TR-03154": 1,
"BSI TR-03155": 1,
"BSI TR-03157": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20220907140830+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Konnektor\"",
"/ModDate": "D:20220912170040+02\u002700\u0027",
"/Producer": "LibreOffice 7.2",
"/Subject": "Zertifizierungsreport BSI-DSZ-CC-1201-2022",
"/Title": "Zertifizierungsreport BSI-DSZ-CC-1201-2022",
"pdf_file_size_bytes": 770517,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung",
"https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-6",
"https://www.bsi.bund.de/",
"https://www.sogis.eu/",
"http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-spec.pdf",
"https://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
},
"st_filename": "1201b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 27
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 34
},
"ECIES": {
"ECIES": 37
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA 2048": 2,
"RSA-2048": 1,
"RSAOAEP": 8
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0098-V3-2021-MA-01": 1,
"BSI-DSZ-CC-1201": 1
},
"NL": {
"CC-1184-2022": 1
}
},
"cc_claims": {
"A": {
"A.AK": 88,
"A.NK": 67
},
"O": {
"O.AK": 385,
"O.NK": 209
},
"OE": {
"OE.AK": 199,
"OE.NK": 207
},
"OSP": {
"OSP.AK": 84,
"OSP.NK": 23
},
"T": {
"T.AK": 113,
"T.NK": 131
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0097": 6,
"BSI-CC-PP-0098": 21,
"BSI-CC-PP-0098\u201c": 1,
"BSI-PP-0032": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP": 1,
"ADV_FSP.4": 6,
"ADV_IMP": 1,
"ADV_IMP.1": 6,
"ADV_TDS": 1,
"ADV_TDS.3": 6
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 13,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_DEL.1": 6,
"ALC_FLR.2": 6,
"ALC_TAT.1": 6
},
"ASE": {
"ASE_TSS.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.3": 7,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL3": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 26,
"FAU_GEN.1": 12,
"FAU_GEN.2": 1,
"FAU_SAR": 6,
"FAU_SAR.1": 2,
"FAU_STG": 14,
"FAU_STG.1": 2,
"FAU_STG.3": 1,
"FAU_STG.4": 1
},
"FCS": {
"FCS_CKM": 131,
"FCS_CKM.1": 36,
"FCS_CKM.2": 8,
"FCS_CKM.4": 34,
"FCS_CMK.4": 1,
"FCS_COP": 291,
"FCS_COP.1": 33
},
"FDP": {
"FDP_ACC": 97,
"FDP_ACC.1": 43,
"FDP_ACF": 118,
"FDP_ACF.1": 72,
"FDP_ACF.1.2": 1,
"FDP_DAU": 33,
"FDP_DAU.1": 3,
"FDP_DAU.2": 9,
"FDP_DAU.2.1": 1,
"FDP_ETC": 17,
"FDP_ETC.2": 8,
"FDP_IFC": 19,
"FDP_IFC.1": 19,
"FDP_IFF": 21,
"FDP_IFF.1": 20,
"FDP_ITC": 36,
"FDP_ITC.1": 35,
"FDP_ITC.2": 52,
"FDP_RIP": 21,
"FDP_RIP.1": 2,
"FDP_SDI": 7,
"FDP_SDI.1": 1,
"FDP_SDI.2": 2,
"FDP_SOS.2": 1,
"FDP_UCT": 5,
"FDP_UCT.1": 1,
"FDP_UIT": 16,
"FDP_UIT.1": 6
},
"FIA": {
"FIA_API": 13,
"FIA_API.1": 3,
"FIA_API.1.1": 2,
"FIA_SOS": 17,
"FIA_SOS.1": 1,
"FIA_SOS.2": 3,
"FIA_UAU": 41,
"FIA_UAU.1": 4,
"FIA_UAU.5": 4,
"FIA_UID": 14,
"FIA_UID.1": 12
},
"FMT": {
"FMT_MOF": 18,
"FMT_MOF.1": 2,
"FMT_MSA": 108,
"FMT_MSA.1": 10,
"FMT_MSA.3": 28,
"FMT_MSA.4": 2,
"FMT_MTD": 44,
"FMT_MTD.1": 7,
"FMT_SMF": 29,
"FMT_SMF.1": 14,
"FMT_SMR": 10,
"FMT_SMR.1": 43,
"FMT_SMR.1.1": 1
},
"FPT": {
"FPT_EMS": 16,
"FPT_EMS.1": 9,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 2,
"FPT_FLS": 10,
"FPT_FLS.1": 2,
"FPT_STM": 17,
"FPT_STM.1": 4,
"FPT_TDC": 49,
"FPT_TDC.1": 17,
"FPT_TDC.1.2": 1,
"FPT_TEE": 9,
"FPT_TEE.1": 2,
"FPT_TST": 24,
"FPT_TST.1": 10
},
"FTA": {
"FTA_TAB": 14,
"FTA_TAB.1": 2
},
"FTP": {
"FTP_ITC": 138,
"FTP_ITC.1": 56,
"FTP_TRP": 15,
"FTP_TRP.1": 11
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"GCM": {
"GCM": 11
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 22,
"IKEv2": 7
},
"IPsec": {
"IPsec": 33
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 283,
"TLS 1.2": 3,
"TLS 1.3": 2
}
},
"VPN": {
"VPN": 58
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 3
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 5,
"brainpoolP384r1": 1
},
"NIST": {
"P-256": 2,
"P-384": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-2": 8,
"SHA-256": 36,
"SHA-384": 6,
"SHA-512": 5,
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 2
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 15
}
},
"side_channel_analysis": {
"SCA": {
"side channel": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 197": 9,
"FIPS PUB 180-4": 15,
"FIPS PUB 186-4": 2
},
"PKCS": {
"PKCS #12": 1,
"PKCS#1": 22,
"PKCS#12": 2,
"PKCS#7": 1
},
"RFC": {
"RFC 2104": 2,
"RFC 2131": 3,
"RFC 2132": 3,
"RFC 2404": 2,
"RFC 2406": 1,
"RFC 2560": 1,
"RFC 3268": 1,
"RFC 3526": 1,
"RFC 3602": 3,
"RFC 4055": 2,
"RFC 4106": 2,
"RFC 4122": 2,
"RFC 4301": 4,
"RFC 4302": 1,
"RFC 4303": 5,
"RFC 4492": 1,
"RFC 4868": 2,
"RFC 5083": 1,
"RFC 5084": 1,
"RFC 5116": 3,
"RFC 5126": 1,
"RFC 5246": 7,
"RFC 5280": 1,
"RFC 5289": 2,
"RFC 5639": 7,
"RFC 5652": 2,
"RFC 5869": 1,
"RFC 5905": 1,
"RFC 7027": 1,
"RFC 7296": 6,
"RFC 8017": 4,
"RFC 8422": 2,
"RFC 8446": 1,
"RFC-5246": 2,
"RFC-5639": 1,
"RFC-5869": 2,
"RFC-7027": 1,
"RFC2617": 1,
"RFC2818": 1,
"RFC4122": 2,
"RFC5652": 3,
"RFC7296": 1
},
"X509": {
"X.509": 32
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 78,
"AES-128": 4,
"AES-192": 1,
"AES-256": 10,
"AES128": 4,
"AES256": 4
},
"E2": {
"E2": 2
},
"HPC": {
"HPC": 5
}
},
"DES": {
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"HMAC": 41,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03111": 2,
"BSI TR-03114": 2,
"BSI TR-03116-1": 4,
"BSI TR-03144": 8,
"BSI TR-03154": 1,
"BSI TR-03155": 1,
"BSI TR-03157": 1
}
},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 3,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 3,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 3,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384146": 1
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "koob.christian",
"/CreationDate": "D:20220627155011+02\u002700\u0027",
"/Creator": "PDF24 Creator",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Konnektor\"",
"/ModDate": "D:20220916101954+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.56.1",
"/Subject": "Security Target BSI-DSZ-CC-1201-2022",
"/Title": "Security Target f\u00fcr secunet konnektor 2.0.0 (eHealth Konnektor PTV5 WR1)",
"pdf_file_size_bytes": 3201982,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 424
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0098V3b_pdf.pdf",
"pp_name": "BSI-CC-PP-0098-V3-2021 - Schutzprofil 2: Anforderungen an den Konnektor"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1201a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_TAT.1",
"ADV_TDS.3",
"ALC_FLR.2",
"EAL3+",
"AVA_VAN.5",
"ADV_IMP.1",
"ADV_FSP.4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1201b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b5d9acef43295646708ab0c75355cf4cd97e013449c7032d9721747b235df024",
"txt_hash": "d6757e0e41cf8eff42006dacec1b51e76c0a06700be84a1e25c742adbbfd66ad"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4c78f95547cad8cf8607db19b9829dd5bffa6a64108ae0a5937ca03841d8ebfb",
"txt_hash": "f5803e6dc9aa7ff863cdb48215cf7468ca2a07b0078389c1627d9021fa80b868"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e278bd5fd2326402ff0261b633f2a29ebc540f07ddc72df9fdfc92bcf605a5aa",
"txt_hash": "4ea28442f67fba1bb3862b1d81888556915b39760cfcbb9e3c7feec3099ad184"
}
},
"status": "active"
}