This page was not yet optimized for use on mobile
devices.
Crunchy Certified PostgreSQL v9.5
CSV information
| Status | archived |
|---|---|
| Valid from | 09.06.2016 |
| Valid until | 09.06.2019 |
| Scheme | 🇹🇷 TR |
| Manufacturer | Crunchy Data Solutions Inc. |
| Category | Databases |
| Security level | EAL2+, ALC_FLR.2 |
| Protection profiles |
Heuristics summary
Certificate ID: 21.0.03/TSE-CCCS-33
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Protocols
SSLSecurity level
EAL2+, EAL4, EAL 2+Claims
T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.PEER, A.SUPPORT, A.CONNECTSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL, ATE_COV.1, ATE_IND.2, ASE_INT.1, ASE_SPD.1, ASE_TSS.1Certificates
21.0.03/TSE-CCCS-33Certification process
Out of Scope, out of scope, Audit Extension e PostGIS Spatial Extensions 2.4.1.2 Components and Capabilities that are Out of Scope The following Crunchy Certified PostgreSQL 9.5 components are out of scope and thus not included in, platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: e Authenticator servers, if configured; and e Terminal emulator 2.4.2 Logical Scope of the TOE 2Standards
RFC 1321, ISO/IEC 17025, CCMB-2012-09-004File metadata
| Creation date | D:20160715145628+02'00' |
|---|---|
| Pages | 24 |
| Creator | Canon iR-ADV C5240 PDF |
| Producer | Adobe PSL 1.2e for Canon |
Security target
Extracted keywords
Hash functions
MD5Protocols
SSLSecurity level
EAL2, EAL2 augmentedClaims
O.ACCESS_HISTORY, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.TOEACCESS, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED_SYSTEMSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FIA_USB.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1Certification process
Out of Scope, out of scope, Audit Extension PostGIS Spatial Extensions 1.5.10.2 Components and Capabilities that are Out of Scope The following Crunchy Certified PostgreSQL 9.5 components are out of scope and thus not included in, methods are outside the scope of this evaluation. 1.5.10.3 Configuration Options that are Out of Scope. 1.5.10.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is, platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: Authenticator servers, if configured; and Terminal emulator 1.5.10.4.3 Functional Dependencies, are prohibited in the evaluated configuration. See Section 1.5.10.2 for further details regarding Out of Scope Configuration Options. Note: The MD5 implementation is vendor developed to the RFC 1321Standards
RFC 1413, RFC 1321, RFC 4510, RFC 2743, RFC 1964File metadata
| Author | Paul Laurence |
|---|---|
| Creation date | D:20160715155933+03'00' |
| Modification date | D:20160715155933+03'00' |
| Pages | 80 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
21.0.03/TSE-CCCS-33Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Databases",
"cert_link": null,
"dgst": "1be0865a3af6b498",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "21.0.03/TSE-CCCS-33",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.5"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"3f6ac99252bbf14e"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Crunchy Data Solutions Inc.",
"manufacturer_web": "https://crunchydata.com/",
"name": "Crunchy Certified PostgreSQL v9.5",
"not_valid_after": "2019-06-09",
"not_valid_before": "2016-06-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "Certification Report - Crunchy.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"TR": {
"21.0.03/TSE-CCCS-33": 2
}
},
"cc_claims": {
"A": {
"A.AUTHUSER": 1,
"A.CONNECT": 1,
"A.MANAGE": 1,
"A.NO_GENERAL_PURPOSE": 1,
"A.PEER": 1,
"A.PHYSICAL": 1,
"A.SUPPORT": 1,
"A.TRAINEDUSER": 1
},
"T": {
"T.ACCESS_TSFDATA": 1,
"T.ACCESS_TSFFUNC": 1,
"T.IA_MASQUERADE": 1,
"T.RESIDUAL_DATA": 1,
"T.TSF_COMPROMISE": 1,
"T.UNAUTHORIZED_ACCESS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL": 1,
"ALC_FLR.2": 6
},
"ASE": {
"ASE_INT.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_IND.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2+": 1,
"EAL2+": 4,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"Audit Extension e PostGIS Spatial Extensions 2.4.1.2 Components and Capabilities that are Out of Scope The following Crunchy Certified PostgreSQL 9.5 components are out of scope and thus not included in": 1,
"Out of Scope": 1,
"out of scope": 1,
"platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: e Authenticator servers, if configured; and e Terminal emulator 2.4.2 Logical Scope of the TOE 2": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"org": {
"org.tr": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 17025": 2
},
"RFC": {
"RFC 1321": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20160715145628+02\u002700\u0027",
"/Creator": "Canon iR-ADV C5240 PDF",
"/Producer": "Adobe PSL 1.2e for Canon\u0000",
"pdf_file_size_bytes": 1639551,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
},
"st_filename": "Security Target - Crunchy - Version 1.6 - 20160509.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUTHUSER": 2,
"A.CONNECT": 2,
"A.MANAGE": 2,
"A.NO_GENERAL_PURPOSE": 2,
"A.PHYSICAL": 2,
"A.SUPPORT": 2,
"A.TRAINEDUSER": 2
},
"O": {
"O.ACCESS_HISTORY": 8,
"O.ADMIN_ROLE": 8,
"O.AUDIT_GENERATION": 6,
"O.DISCRETIONARY_ACCESS": 6,
"O.MANAGE": 10,
"O.MEDIATE": 8,
"O.RESIDUAL_INFORMATION": 8,
"O.TOEACCESS": 1,
"O.TOE_ACCESS": 17
},
"OE": {
"OE.ADMIN": 11,
"OE.INFO_PROTECT": 19,
"OE.IT_REMOTE": 9,
"OE.IT_TRUSTED_SYSTEM": 9,
"OE.NO_GENERAL_PURPOSE": 7,
"OE.PHYSICAL": 7
},
"T": {
"T.ACCESS_TSFDATA": 2,
"T.ACCESS_TSFFUNC": 2,
"T.IA_MASQUERADE": 3,
"T.IA_USER": 2,
"T.RESIDUAL_DATA": 2,
"T.TSF_COMPROMISE": 3,
"T.UNAUTHORIZED_ACCESS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL2 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 3,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 3,
"FAU_SEL.1": 7,
"FAU_SEL.1.1": 1
},
"FDP": {
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 2,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 3,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 2,
"FIA_UID.1": 5,
"FIA_UID.1.1": 3,
"FIA_UID.1.2": 2,
"FIA_USB.1": 5
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 5,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 3,
"FMT_REV.1": 13,
"FMT_REV.1.1": 7,
"FMT_REV.1.2": 8,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_TRC.1": 7,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 1
},
"FTA": {
"FTA_MCS.1": 5,
"FTA_MCS.1.1": 3,
"FTA_MCS.1.2": 2,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 3
}
},
"certification_process": {
"OutOfScope": {
"Audit Extension PostGIS Spatial Extensions 1.5.10.2 Components and Capabilities that are Out of Scope The following Crunchy Certified PostgreSQL 9.5 components are out of scope and thus not included in": 1,
"Out of Scope": 3,
"are prohibited in the evaluated configuration. See Section 1.5.10.2 for further details regarding Out of Scope Configuration Options. Note: The MD5 implementation is vendor developed to the RFC 1321": 1,
"methods are outside the scope of this evaluation. 1.5.10.3 Configuration Options that are Out of Scope. 1.5.10.3.1 \u201cTrust\u201d authentication option (not in TOE) When the trust authentication option is": 1,
"out of scope": 1,
"platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: Authenticator servers, if configured; and Terminal emulator 1.5.10.4.3 Functional Dependencies": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 14
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 1321": 4,
"RFC 1413": 2,
"RFC 1964": 1,
"RFC 2743": 1,
"RFC 4510": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Paul Laurence",
"/CreationDate": "D:20160715155933+03\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20160715155933+03\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"pdf_file_size_bytes": 1528693,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 80
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Crunchy.pdf",
"scheme": "TR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target%20-%20Crunchy%20-%20Version%201.6%20-%2020160509.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "14d7b59a571f4e5d867815579932754efebb5c7d4fa71ac0be6249bc3d4a0e86",
"txt_hash": "1c904f072f09f044321bba020e7ca88d1b78ab9a60bb4e30f9951df6a3979e6d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "fc2796ea5cc0ec2eb07b9ae76f9e6b2ef415954468edc0e3bc4168d8d0cdba33",
"txt_hash": "09527eff4db261af51c98731b45b2808b51989dc7509f8bb24164cdd815963cd"
}
},
"status": "archived"
}