Huawei GaussDB 200 version 6.5.1 build e3690037

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status active
Valid from 22.03.2022
Valid until 22.03.2027
Scheme 🇪🇸 ES
Manufacturer Huawei Technologies Co., Ltd.
Category Databases
Security level EAL2+, ALC_FLR.2
Protection profiles

Heuristics summary

Certificate ID: 2019-32-INF-3664

Certificate

Extracted keywords

Vendor
Huawei, Huawei Technologies Co

Security level
EAL 4, EAL 2, EAL2
Claims
O.E, A.U, R.C
Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2
Protection profiles
BSI-CC-PP-0088-V2

File metadata

Creation date D:20220310164952+01'00'
Modification date D:20220310164952+01'00'
Pages 2
Producer GPL Ghostscript 9.27

Certification report

Extracted keywords

Hash functions
SHA256
Protocols
TLS, TLSv1.1, TLSv1.2

Vendor
Huawei, Huawei Technologies Co

Security level
EAL2, EAL2+, EAL 1, EAL 4, EAL 2, ITSEC Evaluation
Claims
A.U
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FPT_TRC.1, FTA_MCS.1, FTA_TSE.1
Protection profiles
BSI-CC-PP-0088-V2
Certificates
2019-32-INF-3664- v1
Evaluation facilities
DEKRA Testing and Certification

File metadata

Creation date D:20220325091528+01'00'
Modification date D:20220325091528+01'00'
Pages 14
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Security target

security target file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Hash functions
SHA256

Vendor
Huawei Technologies Co, Huawei

Security level
EAL 2
Claims
O.ADMIN_ROLE, O.AUDIT, O.DISCRETIONARY, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORM, O.TOE_ACCESS, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.RESIDUAL_INFORMATION, O.RESIDUAL, O.TOE_ACCE, O.ADMIN_RO, O.DISCRETIO, O.RESIDUAL_, O.AUDIT_GE, O.ADMIN_ROL, O.RESIDUAL_I, O.TOE_ACCES, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, T.ACCESS_TSF, T.IA_MASQUE, T.RESIDUAL_, T.TSF_COMPR, T.UNAUTHOR, T.TSF, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, A.NO_GENERA, A.PEER_FUNC, A.TRAINEDUS, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED, OE.IT_TRUSTED_SYSTEM, OE.NO_GENE, OE.NO_GENERAL, OE.INFO, OE.IT_REMOT, OE.IT_TRUST, OE.INFO_PRO
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FAU_MTD.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_STM.1, FPT_ITT.1, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1
Protection profiles
BSI-CC-PP-0088-V2

Certification process
out of scope, including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE, this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE, with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are, provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a, Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the, Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz, 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools, is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

2019-32-INF-3664

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2020-1790
C N
HIGH 8.8 5.9 18.02.2020
CVE-2020-1811
C N
HIGH 8.8 5.9 18.02.2020
CVE-2020-1853
C N
MEDIUM 6.5 3.6 17.02.2020

Scheme data

Product Huawei GaussDB 200 version 6.5.1 build e3690037
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037
Category Database management systems
Manufacturer Huawei Technologies Co., Ltd.
Certification Date 22.03.2022
Enhanced
Description The TOE is the Huawei GaussDB 200 Database Management System (DBMS). Huawei GaussDB 200 is an enterprise-level relational database for massively parallel processing (MPP), which adopts the MPP architecture, supports row and column storage, provides the capabilities of processing petabytes of data, and is oriented to massive data online analysis.
Category Database management systems
Manufacturer Huawei Technologies Co., Ltd.
Type Product
Evaluation Facility DEKRA Testing and Certification S.A.U.
Status Certified
Certification Date 22.03.2022
Cc Version Common Criteria 3.1 release 5
Level EAL2 + (ALC_FLR.2)
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1425
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1426
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1427

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Databases",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf",
  "dgst": "b91f3f25e268a1e0",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2019-32-INF-3664",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "3f6ac99252bbf14e"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2020-1811",
        "CVE-2020-1790",
        "CVE-2020-1853"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Database management systems",
      "certification_date": "2022-03-22",
      "enhanced": {
        "category": "Database management systems",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1426",
        "certification_date": "2022-03-22",
        "description": "The TOE is the Huawei GaussDB 200 Database Management System (DBMS). Huawei GaussDB 200 is an enterprise-level relational database for massively parallel processing (MPP), which adopts the MPP architecture, supports row and column storage, provides the capabilities of processing petabytes of data, and is oriented to massive data online analysis.",
        "evaluation_facility": "DEKRA Testing and Certification S.A.U.",
        "level": "EAL2 + (ALC_FLR.2)",
        "manufacturer": "Huawei Technologies Co., Ltd.",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1427",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1425",
        "type": "Product"
      },
      "manufacturer": "Huawei Technologies Co., Ltd.",
      "product": "Huawei GaussDB 200 version 6.5.1 build e3690037",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Huawei Technologies Co., Ltd.",
  "manufacturer_web": "https://www.huawei.com",
  "name": "Huawei GaussDB 200 version 6.5.1 build e3690037",
  "not_valid_after": "2027-03-22",
  "not_valid_before": "2022-03-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2019-32_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.U": 1
        },
        "O": {
          "O.E": 1
        },
        "R": {
          "R.C": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0088-V2": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 2,
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 2,
          "Huawei Technologies Co": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20220310164952+01\u002700\u0027",
      "/ModDate": "D:20220310164952+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.27",
      "pdf_file_size_bytes": 847729,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2019-32-INF-3664.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2019-32-INF-3664- v1": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.U": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0088-V2": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE": 3,
          "AGD_OPE.1": 1,
          "AGD_PRE": 4
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 2,
          "ALC_FLR.2": 8
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 7,
          "EAL2+": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1,
          "FAU_SEL.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_REV.1": 2,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_TRC.1": 1
        },
        "FTA": {
          "FTA_MCS.1": 1,
          "FTA_TSE.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3,
            "TLSv1.1": 1,
            "TLSv1.2": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DEKRA": {
          "DEKRA Testing and Certification": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 14,
          "Huawei Technologies Co": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20220325091528+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220325091528+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 909986,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "2019-32-ST.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AUTHUSER": 2,
          "A.CONNECT": 3,
          "A.MANAGE": 3,
          "A.NO_GENERA": 1,
          "A.NO_GENERAL_PURPOSE": 2,
          "A.PEER_FUNC": 1,
          "A.PHYSICAL": 3,
          "A.SUPPORT": 4,
          "A.TRAINEDUS": 1,
          "A.TRAINEDUSER": 1
        },
        "O": {
          "O.ADMIN_RO": 3,
          "O.ADMIN_ROL": 1,
          "O.ADMIN_ROLE": 7,
          "O.AUDIT": 2,
          "O.AUDIT_GE": 2,
          "O.AUDIT_GENERATION": 3,
          "O.DISCRETIO": 3,
          "O.DISCRETIONARY": 1,
          "O.DISCRETIONARY_ACCESS": 5,
          "O.MANAGE": 13,
          "O.MEDIATE": 9,
          "O.RESIDUAL": 2,
          "O.RESIDUAL_": 1,
          "O.RESIDUAL_I": 1,
          "O.RESIDUAL_INFORM": 1,
          "O.RESIDUAL_INFORMATION": 6,
          "O.TOE_ACCE": 8,
          "O.TOE_ACCES": 1,
          "O.TOE_ACCESS": 10
        },
        "OE": {
          "OE.ADMIN": 10,
          "OE.INFO": 5,
          "OE.INFO_PRO": 4,
          "OE.INFO_PROTECT": 11,
          "OE.IT_REMOT": 4,
          "OE.IT_REMOTE": 6,
          "OE.IT_TRUST": 4,
          "OE.IT_TRUSTED": 1,
          "OE.IT_TRUSTED_SYSTEM": 5,
          "OE.NO_GENE": 3,
          "OE.NO_GENERAL": 1,
          "OE.NO_GENERAL_PURPOSE": 4,
          "OE.PHYSICAL": 8
        },
        "T": {
          "T.ACCESS_TSF": 2,
          "T.ACCESS_TSFDATA": 2,
          "T.ACCESS_TSFFUNC": 1,
          "T.IA_MASQUE": 2,
          "T.IA_MASQUERADE": 2,
          "T.IA_USER": 2,
          "T.RESIDUAL_": 1,
          "T.RESIDUAL_DATA": 2,
          "T.TSF": 1,
          "T.TSF_COMPR": 1,
          "T.TSF_COMPROMISE": 1,
          "T.UNAUTHOR": 2,
          "T.UNAUTHORIZED_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0088-V2": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 12,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 10,
          "FAU_GEN.2.1": 2,
          "FAU_MTD.1": 2,
          "FAU_SEL.1": 10,
          "FAU_SEL.1.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 19,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 17,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 1,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 2
        },
        "FIA": {
          "FIA_ATD.1": 16,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UID.1": 15,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2,
          "FIA_USB.1": 5
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 2,
          "FMT_MSA.1": 11,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_REV.1": 15,
          "FMT_REV.1.1": 5,
          "FMT_REV.1.2": 3,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPT": {
          "FPT_ITT.1": 1,
          "FPT_STM.1": 1,
          "FPT_TRC.1": 11,
          "FPT_TRC.1.1": 2,
          "FPT_TRC.1.2": 2
        },
        "FTA": {
          "FTA_MCS.1": 9,
          "FTA_MCS.1.1": 2,
          "FTA_MCS.1.2": 2,
          "FTA_TSE.1": 8,
          "FTA_TSE.1.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools": 1,
          "Co., Ltd. 6 Item Requirement \u25cf NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz": 1,
          "Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the": 1,
          "including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE": 1,
          "is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to": 1,
          "out of scope": 7,
          "provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a": 1,
          "this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE": 1,
          "with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 9,
          "Huawei Technologies Co": 87
        }
      },
      "vulnerability": {}
    },
    "st_metadata": null
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "c54b4d2999a8fabd845475365be7eae515610ba9bb9ab08ca411ea597f7f6182",
      "txt_hash": "de509c605a6b9c3912b02d919cc8fc13533d96955a3d461999e693952b5df28c"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "751bc00acd3f7630e3c5c689e0831c7d3c4e555f1fab98256a3ec0cd688e2b18",
      "txt_hash": "cb0a07fbf7792960f58c0c79306b0b859c18ed6a66fa5122b08eb69ca0d354b5"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": "d02f59b7a6d5456731c35ebc9bb381df2e56cc8e578e4f38d8c6bcc1425d1f17",
      "txt_hash": "3c923458c53ff9aae9cc3c56cadb125a1b0b82e243db896cbf01f90971014771"
    }
  },
  "status": "active"
}