Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2
CSV information ?
Status | active |
---|---|
Valid from | 15.05.2024 |
Valid until | 15.05.2029 |
Scheme | 🇪🇸 ES |
Manufacturer | Microsoft Corporation |
Category | Databases |
Security level | EAL2+, ALC_FLR.3 |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
Microsoft, Microsoft CorporationSecurity level
EAL2+, EAL2Claims
O.E, T.I, A.USecurity Assurance Requirements (SAR)
ALC_FLR.3File metadata
Pages | 2 |
---|
Certification report ?
Extracted keywords
Hash functions
SHA1, SHA-256Vendor
Microsoft, Microsoft CorporationSecurity level
EAL2, EAL2+, EAL 1, EAL 4, EAL 2, ITSEC EvaluationClaims
A.USecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_FLR.3, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_USB_EXT.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FTA_MCS.1, FTA_TAH_EXT.1, FTA_TSE.1Certificates
2022-36-INF-4306- v1Evaluation facilities
DEKRA Testing and CertificationFile metadata
Pages | 15 |
---|
Security target ?
Extracted keywords
Hash functions
SHA1, SHA-256Trusted Execution Environments
SEVendor
Microsoft, Microsoft CorporationSecurity level
EAL2+, EAL2, EAL2 augmentedClaims
O.ADMIN_ROLE, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.MANAGE, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.DISCRETIONARY_ACCES, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_USER, T.RESIDUAL_DATA, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACCES, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_, OE.PHYSICAL, OE.IT_TRUSTED_SYSTEM, OE.NO_GENERAL_PURPOSESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_ADD, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FIA_USB_EXT.2, FIA_USB.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_USB_EXT.2.1, FIA_USB_EXT.2.2, FIA_USB_EXT.2.3, FIA_USB_EXT.2.4, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_TAH_EXT.1, FTA_TAH_EXT.1.1, FTA_TAH_EXT.1.2, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1File metadata
Pages | 61 |
---|
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
Scheme data ?
Product | Microsoft SQL Server 2022 on Linux Database Engine Enterprise Edition x64 (English) version 16.0.4105.2 | |
---|---|---|
Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/898-microsoft-sql-server-2022-on-linux-database-engine-enterprise-edition-x64-english-version-16-0-4105-2 | |
Category | Database management systems | |
Manufacturer | Microsoft Corp. | |
Certification Date | 15.05.2024 | |
Enhanced | ||
Description | The TOE is a database management system (DBMS) with the capability to limit TOE access to authorized users, enforce Discretionary Access Controls on objects under the control of the database management system based on user and/or role authorizations, and to provide user accountability via audit of users’ actions. | |
Category | Database management systems | |
Manufacturer | Microsoft Corp. | |
Type | Product | |
Evaluation Facility | DEKRA Testing and Certification S.A.U. | |
Status | Certified | |
Certification Date | 15.05.2024 | |
Cc Version | Common Criteria 3.1 release 5 | |
Level | EAL2 + (ALC_FLR.3) | |
Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2007 | |
Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2008 | |
Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2009 |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Microsoft SQL Server 2022 on Linux Database Engine Enterprise Edition x64 (English) version 16.0.4105.2', 'product_link': 'https://oc.ccn.cni.es/en/certified-products/certified-products/898-microsoft-sql-server-2022-on-linux-database-engine-enterprise-edition-x64-english-version-16-0-4105-2', 'category': 'Database management systems', 'manufacturer': 'Microsoft Corp.', 'certification_date': '2024-05-15', 'enhanced': {'description': 'The TOE is a database management system (DBMS) with the capability to limit TOE access to authorized users, enforce Discretionary Access Controls on objects under the control of the database management system based on user and/or role authorizations, and to provide user accountability via audit of users’ actions.', 'category': 'Database management systems', 'manufacturer': 'Microsoft Corp.', 'type': 'Product', 'evaluation_facility': 'DEKRA Testing and Certification S.A.U.', 'status': 'Certified', 'certification_date': '2024-05-15', 'cc_version': 'Common Criteria 3.1 release 5', 'level': 'EAL2 + (ALC_FLR.3)', 'target_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2007', 'cert_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2008', 'report_link': 'https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2009'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'eeac31d20681d63944b3d64c3258dc60cb00ee7e99415c70502ec8a27c3b15a7', 'txt_hash': '03068c22e51508233093b557e10c695fd9050521fa8752fba7c613c9faa9fd63'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7d6ee87817da5efc5c367e1912cb0a42c04792403c9fffa1bc8475426bdeb9b7', 'txt_hash': '997b9646d9a32d0f15a88dd1b8bbc1717d7ca4213f37fc532f57aa9e00ff5ddf'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 561416, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 61, '/Title': '', '/CreationDate': '', '/Producer': '', '/ModDate': '', '/Creator': '', '/Trapped': '', '/Keywords': '', '/Author': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.microsoft.com/licensing/servicecenter/default.aspx', 'https://www.microsoft.com/en-us/sql-server/data-security', 'https://www.catalog.update.microsoft.com/Search.aspx?q=sql%20server%202022']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 857353, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Title': '', '/CreationDate': '', '/Producer': '', '/ModDate': '', '/Trapped': '', '/Creator': '', '/Keywords': '', '/Author': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2+': 62, 'EAL2': 4, 'EAL2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_ADD': 3, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_GEN.2': 6, 'FAU_SEL.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SEL.1.1': 1}, 'FDP': {'FDP_ACC.1': 11, 'FDP_ACF.1': 8, 'FDP_RIP.1': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_USB_EXT.2': 21, 'FIA_USB.1': 5, 'FIA_ATD.1': 14, 'FIA_UAU.2': 7, 'FIA_UID.2': 11, 'FIA_ATD.1.1': 3, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB_EXT.2.1': 1, 'FIA_USB_EXT.2.2': 1, 'FIA_USB_EXT.2.3': 1, 'FIA_USB_EXT.2.4': 1, 'FIA_UID.1': 7}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.3': 8, 'FMT_MTD.1': 9, 'FMT_REV.1': 13, 'FMT_SMF.1': 11, 'FMT_SMR.1': 16, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 1}, 'FTA': {'FTA_TAH_EXT.1': 17, 'FTA_TAH_EXT.1.1': 2, 'FTA_TAH_EXT.1.2': 2, 'FTA_MCS.1': 7, 'FTA_TSE.1': 6, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 9, 'O.AUDIT_GENERATION': 5, 'O.DISCRETIONARY_ACCESS': 3, 'O.MANAGE': 11, 'O.RESIDUAL_INFORMATION': 5, 'O.TOE_ACCESS': 17, 'O.DISCRETIONARY_ACCES': 4}, 'T': {'T.ACCESS_TSFDATA': 4, 'T.ACCESS_TSFFUNC': 4, 'T.IA_USER': 5, 'T.RESIDUAL_DATA': 3, 'T.UNAUTHORIZED_ACCESS': 4, 'T.UNAUTHORIZED_ACCES': 1}, 'A': {'A.PHYSICAL': 2, 'A.AUTHUSER': 3, 'A.MANAGE': 4, 'A.TRAINEDUSER': 3, 'A.NO_GENERAL_PURPOSE': 3, 'A.SUPPORT': 4, 'A.CONNECT': 4}, 'OE': {'OE.ADMIN': 8, 'OE.INFO_PROTECT': 15, 'OE.NO_GENERAL_': 1, 'OE.PHYSICAL': 6, 'OE.IT_TRUSTED_SYSTEM': 6, 'OE.NO_GENERAL_PURPOSE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 22, 'Microsoft Corporation': 3}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}, 'SHA2': {'SHA-256': 7}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2+': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}, 'T': {'T.I': 1}, 'A': {'A.U': 1}}, 'vendor': {'Microsoft': {'Microsoft': 3, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
2022-36_ST.pdf
. - The cert_filename property was set to
2022-36_Certificado.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36-INF-4306.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_ST.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
- The cert property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Databases",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_Certificado.pdf",
"dgst": "3995c890eb3f0843",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2022-36-INF-4306",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"16.0.4105.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Database management systems",
"certification_date": "2024-05-15",
"enhanced": {
"category": "Database management systems",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2008",
"certification_date": "2024-05-15",
"description": "The TOE is a database management system (DBMS) with the capability to limit TOE access to authorized users, enforce Discretionary Access Controls on objects under the control of the database management system based on user and/or role authorizations, and to provide user accountability via audit of users\u2019 actions.",
"evaluation_facility": "DEKRA Testing and Certification S.A.U.",
"level": "EAL2 + (ALC_FLR.3)",
"manufacturer": "Microsoft Corp.",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2009",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2007",
"type": "Product"
},
"manufacturer": "Microsoft Corp.",
"product": "Microsoft SQL Server 2022 on Linux Database Engine Enterprise Edition x64 (English) version 16.0.4105.2",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/898-microsoft-sql-server-2022-on-linux-database-engine-enterprise-edition-x64-english-version-16-0-4105-2"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Microsoft Corporation",
"manufacturer_web": "https://www.microsoft.com",
"name": "Microsoft SQL Server 2022 Database Engine Enterprise Edition x64 (English) version 16.0.4105.2",
"not_valid_after": "2029-05-15",
"not_valid_before": "2024-05-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2022-36_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.U": 1
},
"O": {
"O.E": 1
},
"T": {
"T.I": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL2+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 3,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 857353,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "2022-36-INF-4306.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2022-36-INF-4306- v1": 1
}
},
"cc_claims": {
"A": {
"A.U": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 2,
"ALC_FLR.3": 7
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_SPD.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 8,
"EAL2+": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.2": 1,
"FAU_SEL.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_RIP.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UAU.2": 1,
"FIA_UID.2": 1,
"FIA_USB_EXT.2": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_REV.1": 2,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FTA": {
"FTA_MCS.1": 1,
"FTA_TAH_EXT.1": 1,
"FTA_TSE.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DEKRA": {
"DEKRA Testing and Certification": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 1
},
"SHA2": {
"SHA-256": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 19,
"Microsoft Corporation": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 401622,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "2022-36_ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUTHUSER": 3,
"A.CONNECT": 4,
"A.MANAGE": 4,
"A.NO_GENERAL_PURPOSE": 3,
"A.PHYSICAL": 2,
"A.SUPPORT": 4,
"A.TRAINEDUSER": 3
},
"O": {
"O.ADMIN_ROLE": 9,
"O.AUDIT_GENERATION": 5,
"O.DISCRETIONARY_ACCES": 4,
"O.DISCRETIONARY_ACCESS": 3,
"O.MANAGE": 11,
"O.RESIDUAL_INFORMATION": 5,
"O.TOE_ACCESS": 17
},
"OE": {
"OE.ADMIN": 8,
"OE.INFO_PROTECT": 15,
"OE.IT_TRUSTED_SYSTEM": 6,
"OE.NO_GENERAL_": 1,
"OE.NO_GENERAL_PURPOSE": 3,
"OE.PHYSICAL": 6
},
"T": {
"T.ACCESS_TSFDATA": 4,
"T.ACCESS_TSFFUNC": 4,
"T.IA_USER": 5,
"T.RESIDUAL_DATA": 3,
"T.UNAUTHORIZED_ACCES": 1,
"T.UNAUTHORIZED_ACCESS": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_ADD": 3,
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.3": 5
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4,
"EAL2 augmented": 2,
"EAL2+": 62
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SEL.1": 7,
"FAU_SEL.1.1": 1
},
"FDP": {
"FDP_ACC.1": 11,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD.1": 14,
"FIA_ATD.1.1": 3,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 7,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1,
"FIA_USB.1": 5,
"FIA_USB_EXT.2": 21,
"FIA_USB_EXT.2.1": 1,
"FIA_USB_EXT.2.2": 1,
"FIA_USB_EXT.2.3": 1,
"FIA_USB_EXT.2.4": 1
},
"FMT": {
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 9,
"FMT_MTD.1.1": 1,
"FMT_REV.1": 13,
"FMT_REV.1.1": 2,
"FMT_REV.1.2": 2,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 1
},
"FTA": {
"FTA_MCS.1": 7,
"FTA_MCS.1.1": 1,
"FTA_MCS.1.2": 1,
"FTA_TAH_EXT.1": 17,
"FTA_TAH_EXT.1.1": 2,
"FTA_TAH_EXT.1.2": 2,
"FTA_TSE.1": 6,
"FTA_TSE.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 1
},
"SHA2": {
"SHA-256": 7
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 3
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 22,
"Microsoft Corporation": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 561416,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.microsoft.com/en-us/sql-server/data-security",
"https://www.microsoft.com/licensing/servicecenter/default.aspx",
"https://www.catalog.update.microsoft.com/Search.aspx?q=sql%20server%202022"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 61
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/[CPPDBMS13]%20cPP_DBMS_V1.3.pdf",
"pp_name": "collaborative Protection Profile (cPP) for Database Management Systems"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36-INF-4306.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-36_ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7d6ee87817da5efc5c367e1912cb0a42c04792403c9fffa1bc8475426bdeb9b7",
"txt_hash": "997b9646d9a32d0f15a88dd1b8bbc1717d7ca4213f37fc532f57aa9e00ff5ddf"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d7c1dfb698bda2ded4641166a448ed808877abb3ada35f21cc9da144a2580f8a",
"txt_hash": "33d2434921e10ffde1cb50f04f30f08c2cc5729f69618d4a75750074f5bbdd81"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "eeac31d20681d63944b3d64c3258dc60cb00ee7e99415c70502ec8a27c3b15a7",
"txt_hash": "03068c22e51508233093b557e10c695fd9050521fa8752fba7c613c9faa9fd63"
}
},
"status": "active"
}