SIAVAL PKI VERSION 1

CSV information ?

Status active
Valid from 21.04.2022
Valid until 21.04.2027
Scheme 🇪🇸 ES
Manufacturer SIA Sistemas Informáticos Abiertos S.A.
Category Key Management Systems
Security level EAL4+, ALC_FLR.1

Heuristics summary ?

Certificate ID: 2020-34-INF-3784

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 2, EAL4
Claims
O.E, T.I, A.U
Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.1

File metadata

Pages 2

Certification report ?

Extracted keywords

Security level
EAL4, EAL 1, EAL 4, EAL 2, EAL2, ITSEC Evaluation
Claims
A.U, A
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, ALC_FLR.1, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.3, ASE_CCL.1, ASE_INT.1, ASE_REQ.2
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_STG.5, FCO_NRO.1, FCS_COP.1, FCS_COP.2, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1
Certificates
2020-34-INF-3784- v1
Evaluation facilities
DEKRA Testing and Certification

Standards
PKCS#11, PKCS11

File metadata

Pages 14

Security target ?

Extracted keywords

Symmetric Algorithms
HMAC, HMAC-SHA-256
Hash functions
SHA-256
Schemes
MAC
Protocols
SSL

Security level
EAL 4, EAL4, EAL4 augmented
Claims
A.U, A.CPS, OE.CPS
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_FLR, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_STG.1, FAU_STG.5, FAU_GEN.1, FAU_STG.5.1, FAU_STG, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_GEN.2, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_COP.1, FCS_COP.2, FCS_COP, FCS_COP.2.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_UCT.1, FDP_UCT.1.1, FDP_ITC.1, FDP_ITC.2, FIA_UID.1, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_ATD.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1.1, FIA_UAU.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FPT_STM.1, FTP_ITC.1, FTP_TRP.1

Certification process
out of scope, 1 as it specifies that the TSF must prevent or detect data alterations, leaving such operations out of scope in FAU_STG.5. Component levelling FAU_STG.5 Audit log signing event, incorporate a computation

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 140-2, PKCS#11, PKCS11, PKCS#12, RFC 5280, RFC5280, ISO/IEC 15408, ISO/IEC 19790, ICAO, X.509

File metadata

Pages 64

Heuristics ?

Certificate ID: 2020-34-INF-3784

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, AVA_VAN.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ALC_FLR.1, ASE_OBJ.2

Scheme data ?

Product SIAVAL PKI VERSION 1
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/813-siaval-pki-version-1
Category Others
Manufacturer Sistemas Informáticos Abiertos S.A.
Certification Date 21.04.2022
Enhanced
Description SIAVAL PKI comprises all the security functions required by a Certification Authority, allowing the issuance of certificates and CRLs, the management of the life cycle of these certificates and the capacity to provide information about the revocation status so that from a VA its status can be verified. The main functionality offered by the TOE is detailed next: Access Control: Access control is established for the operations performed in the TOE so that only authorized users can perform the operations for which they have been authorized. Only the HealthCheck service does not establish user access control but performs IP access control to validate the origin of the requests. Key Management: The private keys of the CAs will reside in a cryptographic module outside the TOE scope and the TSF will make use of them for the issuance of certificates and CRLs, invoking the signature operation on the device. The public keys are stored in x509 certificates and protected in integrity Management of the issuance of certificates and CRLs: Several CA’s can be managed by establishing a hierarchy among them, so that a Root CA and subordinate CA's can be established to issue for example certificates with different purposes, personal signature certificates, SSL/TLS Web certificates, etcCertificates and signed CRLs are generated, making it possible to request certificates through CSR using a mechanism such as PKCS # 10 or CRMF.Profiles and configurations are established for the issuance of certificates and generation of CRLs, so that it is possible to establish your own characteristics depending on the configuration of the profile.It enables the publication of certificates and CRLs in different repositories as well as the recovery of these certificates and CRLs from the TOE itself. Transmission Data security: The user keys will always be exported in keystores and certificates and CRLs will always be issued in a way that preserves their integrity. Audit Data: Audit trail is recorded for all operations performed by users in the system. A value calculated by the TSF will be added so that the integrity of the contained data can be checked. The analysis and consultation of audit data is not part of the scope of the TOE.
Category Others
Manufacturer Sistemas Informáticos Abiertos S.A.
Type Product
Evaluation Facility DEKRA Testing and Certification S.A.U.
Status Certified
Certification Date 21.04.2022
Cc Version Common Criteria 3.1 release 5
Level EAL4 + ALC_FLR.1
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1441
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1442
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1443

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2022-04-21'} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a4cc6313fd81b22441381e51deb9cfa4c28e6b422a65bf5630f92161756e4f19', 'txt_hash': 'c5b9ffd7f31ec7f6e0838dd76f0e791cfd0e596068cac4d38361601d83a6de40'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f1b4bcdad8ea27dd1eca62ecfd330ab9237772361e0c65cc25281fada576dcde', 'txt_hash': '7c563afba1feb369d099650d6a81588ef1a1bf528f85f461dc5464d10c98a8d3'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 773365, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 64, '/Subject': '', '/Producer': '', '/Title': '', '/ModDate': '', '/Creator': '', '/Keywords': '', '/Trapped': '', '/Author': '', '/CreationDate': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 842811, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Title': '', '/CreationDate': '', '/Producer': '', '/ModDate': '', '/Trapped': '', '/Creator': '', '/Keywords': '', '/Author': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG.1': 1, 'FAU_STG.5': 10, 'FAU_GEN.1': 10, 'FAU_STG.5.1': 2, 'FAU_STG': 1, 'FAU_GEN': 3, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_GEN.2': 4}, 'FCO': {'FCO_NRO.1': 5, 'FCO_NRO.1.1': 1, 'FCO_NRO.1.2': 1, 'FCO_NRO.1.3': 1}, 'FCS': {'FCS_COP.1': 20, 'FCS_COP.2': 20, 'FCS_COP': 2, 'FCS_COP.2.1': 2, 'FCS_CKM.1': 4, 'FCS_CKM.4': 4, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 4, 'FDP_UCT.1': 6, 'FDP_UCT.1.1': 1, 'FDP_ITC.1': 3, 'FDP_ITC.2': 3}, 'FIA': {'FIA_UID.1': 14, 'FIA_UAU': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1': 5, 'FIA_ATD.1': 7, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 5}, 'FMT': {'FMT_SMR.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 6, 'FMT_SMF.1': 9, 'FMT_MOF.1.1': 1, 'FMT_MSA.3': 8, 'FMT_MSA.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_STM.1': 5}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 5}}, 'cc_claims': {'A': {'A.U': 1, 'A.CPS': 2}, 'OE': {'OE.CPS': 4}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'constructions': {'MAC': {'HMAC': 11, 'HMAC-SHA-256': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1, 'FIPS140-2': 2, 'FIPS PUB 140-2': 1}, 'PKCS': {'PKCS#11': 3, 'PKCS11': 1, 'PKCS#12': 2}, 'RFC': {'RFC 5280': 9, 'RFC5280': 2}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 19790': 2}, 'ICAO': {'ICAO': 1}, 'X509': {'X.509': 14}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '1 as it specifies that the TSF must prevent or detect data alterations, leaving such operations out of scope in FAU_STG.5. Component levelling FAU_STG.5 Audit log signing event, incorporate a computation': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 2': 1, 'EAL4': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 2, 'ALC_FLR.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}, 'T': {'T.I': 1}, 'A': {'A.U': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 2020-34 ST.pdf.
    • The cert_filename property was set to 2020-34_Certificado.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '53c13972b4bf28d4583739a16c9abfb0b8685405892e04dbb42398a3696cad3d', 'txt_hash': '78e233ca32588d7810c90a327ee2de70abb8b8bcd1ed1c71c6393a0e4332f417'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 979015, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Title': '', '/CreationDate': '', '/Producer': '', '/ModDate': '', '/Creator': '', '/Trapped': '', '/Keywords': '', '/Author': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sogis.eu/', 'http://www.commoncriteriaportal.org/']}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'ES': {'2020-34-INF-3784- v1': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 7, 'EAL 1': 1, 'EAL 4': 2, 'EAL 2': 1, 'EAL2': 1}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.1': 9, 'ALC_CMC.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_FLR': 3}, 'ATE': {'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.2': 1, 'FAU_STG.5': 1}, 'FCO': {'FCO_NRO.1': 1}, 'FCS': {'FCS_COP.1': 1, 'FCS_COP.2': 1}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_UCT.1': 1}, 'FIA': {'FIA_ATD.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1, 'FIA_USB.1': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_MSA.1': 1, 'FMT_MSA.3': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}}, 'cc_claims': {'A': {'A.U': 4, 'A': 1}}, 'vendor': {}, 'eval_facility': {'DEKRA': {'DEKRA Testing and Certification': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#11': 1, 'PKCS11': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 2020-34 INF-3784.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to 2020-34-INF-3784.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-34%20INF-3784.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-34%20ST.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SIAVAL PKI VERSION 1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-34_Certificado.pdf",
  "dgst": "077319415aa6197e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2020-34-INF-3784",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Others",
      "certification_date": "2022-04-21",
      "enhanced": {
        "category": "Others",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1442",
        "certification_date": "2022-04-21",
        "description": "SIAVAL PKI comprises all the security functions required by a Certification Authority, allowing the issuance of certificates and CRLs, the management of the life cycle of these certificates and the capacity to provide information about the revocation status so that from a VA its status can be verified. The main functionality offered by the TOE is detailed next: Access Control: Access control is established for the operations performed in the TOE so that only authorized users can perform the operations for which they have been authorized. Only the HealthCheck service does not establish user access control but performs IP access control to validate the origin of the requests. Key Management: The private keys of the CAs will reside in a cryptographic module outside the TOE scope and the TSF will make use of them for the issuance of certificates and CRLs, invoking the signature operation on the device. The public keys are stored in x509 certificates and protected in integrity Management of the issuance of certificates and CRLs: Several CA\u2019s can be managed by establishing a hierarchy among them, so that a Root CA and subordinate CA\u0027s can be established to issue for example certificates with different purposes, personal signature certificates, SSL/TLS Web certificates, etcCertificates and signed CRLs are generated, making it possible to request certificates through CSR using a mechanism such as PKCS # 10 or CRMF.Profiles and configurations are established for the issuance of certificates and generation of CRLs, so that it is possible to establish your own characteristics depending on the configuration of the profile.It enables the publication of certificates and CRLs in different repositories as well as the recovery of these certificates and CRLs from the TOE itself. Transmission Data security: The user keys will always be exported in keystores and certificates and CRLs will always be issued in a way that preserves their integrity. Audit Data: Audit trail is recorded for all operations performed by users in the system. A value calculated by the TSF will be added so that the integrity of the contained data can be checked. The analysis and consultation of audit data is not part of the scope of the TOE.",
        "evaluation_facility": "DEKRA Testing and Certification S.A.U.",
        "level": "EAL4 + ALC_FLR.1",
        "manufacturer": "Sistemas Inform\u00e1ticos Abiertos S.A.",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1443",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1441",
        "type": "Product"
      },
      "manufacturer": "Sistemas Inform\u00e1ticos Abiertos S.A.",
      "product": "SIAVAL PKI VERSION 1",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/813-siaval-pki-version-1"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "SIA Sistemas Inform\u00e1ticos Abiertos S.A.",
  "manufacturer_web": "https://sia.es",
  "name": "SIAVAL PKI VERSION 1",
  "not_valid_after": "2027-04-21",
  "not_valid_before": "2022-04-21",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2020-34_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.U": 1
        },
        "O": {
          "O.E": 1
        },
        "T": {
          "T.I": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 2,
          "ALC_FLR.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 842811,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2020-34 INF-3784.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2020-34-INF-3784- v1": 1
        }
      },
      "cc_claims": {
        "A": {
          "A": 1,
          "A.U": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 9,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL4": 7
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1,
          "FAU_STG.5": 1
        },
        "FCO": {
          "FCO_NRO.1": 1
        },
        "FCS": {
          "FCS_COP.1": 1,
          "FCS_COP.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_UCT.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UID.1": 1,
          "FIA_USB.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DEKRA": {
          "DEKRA Testing and Certification": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "PKCS": {
          "PKCS#11": 1,
          "PKCS11": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 979015,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "2020-34 ST.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CPS": 2,
          "A.U": 1
        },
        "OE": {
          "OE.CPS": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL4": 3,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 3,
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 1,
          "FAU_STG.5": 10,
          "FAU_STG.5.1": 2
        },
        "FCO": {
          "FCO_NRO.1": 5,
          "FCO_NRO.1.1": 1,
          "FCO_NRO.1.2": 1,
          "FCO_NRO.1.3": 1
        },
        "FCS": {
          "FCS_CKM.1": 4,
          "FCS_CKM.4": 4,
          "FCS_COP": 2,
          "FCS_COP.1": 20,
          "FCS_COP.1.1": 1,
          "FCS_COP.2": 20,
          "FCS_COP.2.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 7,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 4,
          "FDP_ITC.1": 3,
          "FDP_ITC.2": 3,
          "FDP_UCT.1": 6,
          "FDP_UCT.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 5,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 8,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 5
        },
        "FTP": {
          "FTP_ITC.1": 4,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          "1 as it specifies that the TSF must prevent or detect data alterations, leaving such operations out of scope in FAU_STG.5. Component levelling FAU_STG.5 Audit log signing event, incorporate a computation": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS PUB 140-2": 1,
          "FIPS140-2": 2
        },
        "ICAO": {
          "ICAO": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 19790": 2
        },
        "PKCS": {
          "PKCS#11": 3,
          "PKCS#12": 2,
          "PKCS11": 1
        },
        "RFC": {
          "RFC 5280": 9,
          "RFC5280": 2
        },
        "X509": {
          "X.509": 14
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "HMAC": 11,
            "HMAC-SHA-256": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 773365,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 64
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-34%20INF-3784.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-34%20ST.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f1b4bcdad8ea27dd1eca62ecfd330ab9237772361e0c65cc25281fada576dcde",
      "txt_hash": "7c563afba1feb369d099650d6a81588ef1a1bf528f85f461dc5464d10c98a8d3"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "53c13972b4bf28d4583739a16c9abfb0b8685405892e04dbb42398a3696cad3d",
      "txt_hash": "78e233ca32588d7810c90a327ee2de70abb8b8bcd1ed1c71c6393a0e4332f417"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a4cc6313fd81b22441381e51deb9cfa4c28e6b422a65bf5630f92161756e4f19",
      "txt_hash": "c5b9ffd7f31ec7f6e0838dd76f0e791cfd0e596068cac4d38361601d83a6de40"
    }
  },
  "status": "active"
}