Crunchy Certified PostgreSQL 12.5
CSV information ?
Status | active |
---|---|
Valid from | 16.03.2021 |
Valid until | 16.03.2026 |
Scheme | 🇨🇦 CA |
Manufacturer | Crunchy Data Solutions Inc. |
Category | Databases |
Security level | ALC_FLR.2, EAL2+ |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Certificates
516-LSSEvaluation facilities
Lightship SecurityFile metadata
Title | cyber-centre-product-evaluation-certificate-e-bg |
---|---|
Creation date | D:20190122115136-04'00' |
Modification date | D:20210325160326-05'00' |
Pages | 1 |
Creator | Adobe Illustrator CC 22.0 (Windows) |
Producer | Adobe PDF library 15.00 |
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL 2+Security Assurance Requirements (SAR)
ALC_FLR.2Certificates
516-LSSEvaluation facilities
Lightship SecurityStandards
ISO/IEC 17025File metadata
Author | White, Debra E. |
---|---|
Creation date | D:20210326143039-04'00' |
Modification date | D:20210326143039-04'00' |
Pages | 16 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
Security target ?
Extracted keywords
Hash functions
MD5Protocols
SSLLibraries
OpenSSLSecurity level
EAL2, EAL2 augmentedClaims
O.ADMIN_ROLE, O.AUDIT_GENERATION, O.DISCRETIONARY_ACCESS, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.TOEACCESS, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED_SYSTEMSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FIA_USB.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FTA_MCS.1, FTA_TSE.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1.1Certification process
Out of Scope, Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide, methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is, platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional DependenciesStandards
RFC 1413, RFC 2743, RFC 1964, RFC 7677, RFC 1321, RFC 4510File metadata
Author | Paul Laurence |
---|---|
Creation date | D:20210316110349-04'00' |
Modification date | D:20210316110349-04'00' |
Pages | 79 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ALC_FLR.2, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2Scheme data ?
Product | Crunchy Certified PostgreSQL 12.5 | |
---|---|---|
Vendor | Crunchy Data Solutions, Inc. | |
Level | DBMS PP Base Package, V2.12 | |
Certification Date | 16.03.2021 |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2021-03-16'}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a', 'txt_hash': 'ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '62dcccf374de788629d4d52afdf5702a3c275fe34f5b9ff8a92df0ac185ffc9d', 'txt_hash': 'da9aa84738e5ea013feef3cac77a0af37e0c6c9ddeb93d3d4ac5f80fe7448b89'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1146452, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 79, '/Author': 'Paul Laurence', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20210316110349-04'00'", '/ModDate': "D:20210316110349-04'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 1640422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20210325160326-05'00'", '/Producer': 'Adobe PDF library 15.00', '/Title': 'cyber-centre-product-evaluation-certificate-e-bg', '/Creator': 'Adobe Illustrator CC 22.0 (Windows)', '/CreationDate': "D:20190122115136-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 4, 'FAU_GEN.2': 4, 'FAU_SEL.1': 7, 'FAU_GEN.1.1': 3, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 3, 'FAU_SEL.1.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 6, 'FDP_RIP.1': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_USB.1': 5, 'FIA_ATD.1': 10, 'FIA_UAU.1': 4, 'FIA_UID.1': 5, 'FIA_ATD.1.1': 3, 'FIA_UAU.1.1': 3, 'FIA_UAU.1.2': 2, 'FIA_UID.1.1': 3, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MSA.1': 6, 'FMT_MSA.3': 5, 'FMT_MTD.1': 5, 'FMT_REV.1': 13, 'FMT_SMF.1': 5, 'FMT_SMR.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 3, 'FMT_REV.1.1': 7, 'FMT_REV.1.2': 8, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPT': {'FPT_TRC.1': 7, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1}, 'FTA': {'FTA_MCS.1': 5, 'FTA_TSE.1': 4, 'FTA_MCS.1.1': 3, 'FTA_MCS.1.2': 2, 'FTA_TSE.1.1': 3}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 8, 'O.AUDIT_GENERATION': 6, 'O.DISCRETIONARY_ACCESS': 6, 'O.MANAGE': 10, 'O.MEDIATE': 8, 'O.RESIDUAL_INFORMATION': 8, 'O.TOE_ACCESS': 17, 'O.TOEACCESS': 1}, 'T': {'T.ACCESS_TSFDATA': 2, 'T.ACCESS_TSFFUNC': 2, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 2, 'T.TSF_COMPROMISE': 3, 'T.UNAUTHORIZED_ACCESS': 3}, 'A': {'A.PHYSICAL': 2, 'A.AUTHUSER': 2, 'A.MANAGE': 2, 'A.TRAINEDUSER': 2, 'A.NO_GENERAL_PURPOSE': 2, 'A.SUPPORT': 2, 'A.CONNECT': 2}, 'OE': {'OE.ADMIN': 11, 'OE.INFO_PROTECT': 19, 'OE.NO_GENERAL_PURPOSE': 7, 'OE.PHYSICAL': 7, 'OE.IT_REMOTE': 9, 'OE.IT_TRUSTED_SYSTEM': 9}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 5}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 1413': 2, 'RFC 2743': 1, 'RFC 1964': 1, 'RFC 7677': 4, 'RFC 1321': 4, 'RFC 4510': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of Scope': 2, 'Audit Extension • PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide': 1, 'methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is': 1, 'platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: • Authenticator servers, if configured; and • Terminal emulator 1.5.9.4.3 Functional Dependencies': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'CA': {'516-LSS': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Lightship': {'Lightship Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf
. - The cert_filename property was set to
516-LSS CT no sig Eng.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/516%20LSS%20CR.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target%20-%20Crunchy%20Certified%20PostgreSQL%2012%20-%20v1.8%20-%20515-LSS.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Crunchy Certified PostgreSQL 12.5 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Databases",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/516-LSS%20CT%20no%20sig%20Eng.pdf",
"dgst": "514db6064d93b43b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "516-LSS",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"12.5"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"certification_date": "2021-03-16",
"level": "DBMS PP Base Package, V2.12",
"product": "Crunchy Certified PostgreSQL 12.5",
"vendor": "Crunchy Data Solutions, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Crunchy Data Solutions Inc.",
"manufacturer_web": "https://crunchydata.com/",
"name": "Crunchy Certified PostgreSQL 12.5",
"not_valid_after": "2026-03-16",
"not_valid_before": "2021-03-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "516-LSS CT no sig Eng.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"516-LSS": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Lightship": {
"Lightship Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20190122115136-04\u002700\u0027",
"/Creator": "Adobe Illustrator CC 22.0 (Windows)",
"/ModDate": "D:20210325160326-05\u002700\u0027",
"/Producer": "Adobe PDF library 15.00",
"/Title": "cyber-centre-product-evaluation-certificate-e-bg",
"pdf_file_size_bytes": 1640422,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "516 LSS CR.pdf",
"report_frontpage": {
"CA": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"516-LSS": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Lightship": {
"Lightship Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "White, Debra E.",
"/CreationDate": "D:20210326143039-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20210326143039-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 596553,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.packetstormsecurity.org/",
"http://www.google.com/",
"http://www.kb.cert.org/vuls/",
"https://www.cvedetails.com/",
"https://www.postgresql.org/docs/9.5/libpq.html",
"http://nvd.nist.gov/",
"https://www.crunchydata.com/",
"https://www.pgaudit.org/#section_three",
"https://www.postgresql.org/support/security/",
"http://cve.mitre.org/",
"mailto:[email protected]",
"https://postgis.net/documentation/",
"https://jdbc.postgresql.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "Security Target - Crunchy Certified PostgreSQL 12 - v1.8 - 515-LSS.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUTHUSER": 2,
"A.CONNECT": 2,
"A.MANAGE": 2,
"A.NO_GENERAL_PURPOSE": 2,
"A.PHYSICAL": 2,
"A.SUPPORT": 2,
"A.TRAINEDUSER": 2
},
"O": {
"O.ADMIN_ROLE": 8,
"O.AUDIT_GENERATION": 6,
"O.DISCRETIONARY_ACCESS": 6,
"O.MANAGE": 10,
"O.MEDIATE": 8,
"O.RESIDUAL_INFORMATION": 8,
"O.TOEACCESS": 1,
"O.TOE_ACCESS": 17
},
"OE": {
"OE.ADMIN": 11,
"OE.INFO_PROTECT": 19,
"OE.IT_REMOTE": 9,
"OE.IT_TRUSTED_SYSTEM": 9,
"OE.NO_GENERAL_PURPOSE": 7,
"OE.PHYSICAL": 7
},
"T": {
"T.ACCESS_TSFDATA": 2,
"T.ACCESS_TSFFUNC": 2,
"T.IA_MASQUERADE": 3,
"T.IA_USER": 2,
"T.RESIDUAL_DATA": 2,
"T.TSF_COMPROMISE": 3,
"T.UNAUTHORIZED_ACCESS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL2 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 3,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 3,
"FAU_SEL.1": 7,
"FAU_SEL.1.1": 1
},
"FDP": {
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 2,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 3,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 2,
"FIA_UID.1": 5,
"FIA_UID.1.1": 3,
"FIA_UID.1.2": 2,
"FIA_USB.1": 5
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 5,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 3,
"FMT_REV.1": 13,
"FMT_REV.1.1": 7,
"FMT_REV.1.2": 8,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_TRC.1": 7,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 1
},
"FTA": {
"FTA_MCS.1": 5,
"FTA_MCS.1.1": 3,
"FTA_MCS.1.2": 2,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 3
}
},
"certification_process": {
"OutOfScope": {
"Audit Extension \u2022 PostGIS Spatial Extensions 1.5.9.2 Components and Capabilities that are Out of Scope The TOE relies on the operating system, which is part of the operational environment, to provide": 1,
"Out of Scope": 2,
"methods are outside the scope of this evaluation. 1.5.9.3 Configuration Options that are Out of Scope. 1.5.9.3.1 \u201cTrust\u201d authentication option (not in TOE) When the trust authentication option is": 1,
"platforms are included in the TOE. In addition, the following components in the IT environment are out of scope: \u2022 Authenticator servers, if configured; and \u2022 Terminal emulator 1.5.9.4.3 Functional Dependencies": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 3
}
},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 5
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 1321": 4,
"RFC 1413": 2,
"RFC 1964": 1,
"RFC 2743": 1,
"RFC 4510": 1,
"RFC 7677": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Paul Laurence",
"/CreationDate": "D:20210316110349-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20210316110349-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 1146452,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 79
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL2+",
"pp_ids": {
"_type": "Set",
"elements": [
"DBMS_PPV2.12"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf",
"pp_name": "Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/516%20LSS%20CR.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target%20-%20Crunchy%20Certified%20PostgreSQL%2012%20-%20v1.8%20-%20515-LSS.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "62dcccf374de788629d4d52afdf5702a3c275fe34f5b9ff8a92df0ac185ffc9d",
"txt_hash": "da9aa84738e5ea013feef3cac77a0af37e0c6c9ddeb93d3d4ac5f80fe7448b89"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "522a896a3bd1386b7347ed32abf58950d4dbf8cac2fce7b48ee1205116621b69",
"txt_hash": "8c9c3ab3dfce2272e80a885de7bc3479b5f45d8fd090ae68ccf084fa92cfbdb5"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8512df6f67ee2f8aa98cb383f2e3ae76577483fe8cc6ea43d21fc9f3e22fa42a",
"txt_hash": "ead1b738c0d0b410749550f96bae9aabdb5e7114f4dd98f65d622904077031d5"
}
},
"status": "active"
}