API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454
CSV information ?
Status | active |
---|---|
Valid from | 16.02.2023 |
Valid until | 16.02.2028 |
Scheme | 🇫🇷 FR |
Manufacturer | Axway |
Category | Network and Network-Related Devices and Systems |
Security level | EAL4+, AVA_VAN.4, ALC_FLR.3 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL4, EAL2Security Assurance Requirements (SAR)
ALC_FLR.3, AVA_VAN.4Certificates
ANSSI-CC-2023/07Evaluation facilities
OPPIDACertification report ?
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL 4, EAL2, EAL4, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
AGD_PRE, AGD_OPE, ALC_FLR.3, ALC_FLR, AVA_VAN.4Certificates
ANSSI-CC-2023/07Evaluation facilities
OPPIDAStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003Security target ?
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256Asymmetric Algorithms
Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA256, SHA512, PBKDF2Schemes
MAC, Key exchangeProtocols
SSH, SSL, TLS, TLS 1.2, TLS 1.3, TLS v1.2, TLSv1.2, TLS v1.3, PGPRandomness
PRNGLibraries
OpenSSLElliptic Curves
secp256r1Block cipher modes
CBC, CTRTLS cipher suites
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384Security level
EAL4+, EAL4Claims
O.ACCESSID, O.AUDIT, O.AUTH, O.BANNER, O.CONSISTENT, O.DISTRIB, O.INTEGRITY, O.MANAGE, O.POLICY, O.PROTCOMMS, O.ROBUST, O.CRYPTO, O.DATAPROT, O.MAINTAIN, O.MNGRID, O.MONITOR, O.OFLOWS, O.RESILIENT, O.SELFID, O.CONSISTEN, O.PROTCOM, T.ADMIN_ERROR, T.CONDTRADICT, T.EAVES, T.FORGE, T.UNAUTH, T.WEAKPOL, T.WEAKIA, T.DISABLE, T.FALSIFY, T.MASK, T.NOROUTE, T.OFLOWS, T.BYPASS_POLICY, T.CONTRADICT, A.ENDUSER_DATA, A.POLICY, A.AUDIT_TRAIL, A.CREDENTIALS, OE.ADMIN, OE.INSTALL, OE.PERSON, OE.SYSTIME, OE.USERID, OE.POLICY, OE.KEY_ERASESecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_ARC.1, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.1, ALC_CMS.1, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_IND.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.4Security Functional Requirements (SFR)
FAU_SEL_EXT.1, FAU_STG_EXT.1, FAU_GEN.1, FAU_SEL.1, FAU_STG.1, FAU_SAR.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SEL.1.1, FAU_SEL_EXT.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FCO_NRR.2, FCO_NRR.1, FCO_NRR.2.1, FCO_NRR.2.2, FCO_NRR.2.3, FCS_TLS_EXT.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_TLS_EXT.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_COP.1.1, FCS_CKM.4, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.4, FDP_IFF.5, FDP_ITC.1, FDP_ITC.2, FIA_AFL.1, FIA_SOS.1, FIA_USB.1, FIA_UID.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF_EXT.1, FMT_MSA_EXT.5, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1, FMT_MOF.1.1, FMT_MOF_EXT.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA_EXT.5.1, FMT_MSA_EXT.5.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1.1, FPT_APW_EXT.1, FPT_FLS_EXT.1, FPT_SKP_EXT.1, FPT_RPL.1, FPT_TDC, FPT_STM.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_FLS_EXT.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_SKP_EXT.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1, FRU_FLT.1, FRU_FLT.1.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Evaluation facilities
OPPIDAStandards
FIPS197, FIPS180-4, PKCS#1, PKCS7, RFC 2818, RFC 5246, RFC8446, RFC4253, RFC5246, RFC4344, RFC3447, RFC2104, RFC4627, RFC2616, RFC2818, RFC0959, RFC4217, RFC4252, RFC2617, RFC5280, RFC4716, RFC 8446, X.509, CCMB-2017-04-002, CCMB-2017-04-003Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4References ?
No references are available for this certificate.
Updates ?
-
10.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL4+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
{'product': 'API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454', 'url': 'https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454', 'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE. Ce produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'sponsor': 'AXWAY Software', 'developer': 'AXWAY Software', 'cert_id': 'ANSSI-CC-2023/07', 'level': 'EAL4+', 'expiration_date': '2028-02-15', 'enhanced': {'cert_id': 'ANSSI-CC-2023/07', 'certification_date': '2023-02-16', 'expiration_date': '2028-02-15', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AXWAY Software', 'sponsor': 'AXWAY Software', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': '(AVA_VAN.4, ALC_FLR.3)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf'}}
.
- The report property was updated, with the
-
03.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
27.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454', 'url': 'https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454', 'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE. Ce produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'sponsor': 'AXWAY Software', 'developer': 'AXWAY Software', 'cert_id': 'ANSSI-CC-2023/07', 'level': 'EAL4+', 'expiration_date': '2028-02-15', 'enhanced': {'cert_id': 'ANSSI-CC-2023/07', 'certification_date': '2023-02-16', 'expiration_date': '2028-02-15', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AXWAY Software', 'sponsor': 'AXWAY Software', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': '(AVA_VAN.4, ALC_FLR.3)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf'}}
.
- The scheme_data property was set to
-
06.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454', 'url': 'https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454', 'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE. Ce produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'sponsor': 'AXWAY Software', 'developer': 'AXWAY Software', 'cert_id': 'ANSSI-CC-2023/07', 'level': 'EAL4+', 'expiration_date': '2028-02-15', 'enhanced': {'cert_id': 'ANSSI-CC-2023/07', 'certification_date': '2023-02-16', 'expiration_date': '2028-02-15', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AXWAY Software', 'sponsor': 'AXWAY Software', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': '(AVA_VAN.4, ALC_FLR.3)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE. Ce produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'expiration_date': '2028-02-15', 'enhanced': {'__update__': {'certification_date': '2023-02-16', 'expiration_date': '2028-02-15', 'mutual_recognition': 'CCRA SOG-IS'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454', 'url': 'https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454', 'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE.\n\nCe produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'sponsor': 'AXWAY Software', 'developer': 'AXWAY Software', 'cert_id': 'ANSSI-CC-2023/07', 'level': 'EAL4+', 'expiration_date': '15 Février 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/07', 'certification_date': '16/02/2023', 'expiration_date': '15/02/2028', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AXWAY Software', 'sponsor': 'AXWAY Software', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': '(AVA_VAN.4, ALC_FLR.3)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': '28bc07e44b743122ead336c03632a2585889e689e8554ec6e08a3cfe1102512a', 'txt_hash': 'ba4462197e773e496aa57d1dc41353b7be77ca02ec5e136d5fc157179ce674ef'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': 'e9ab30c9496f6e2b6fc67ad410b13bc94e08d09e4e28034517d5ebd79aa29d56', 'txt_hash': '6cbc0fa003c211bfad1b11426bd1e075bd0a57e7175ec37e28f99693ff3add32'}
data.
The PDF extraction data was updated.
- The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.4': 1, 'ADV_ARC.1': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 2, 'ALC_CMC.1': 1, 'ALC_CMS.1': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.4': 4}}, 'cc_sfr': {'FAU': {'FAU_SEL_EXT.1': 8, 'FAU_STG_EXT.1': 7, 'FAU_GEN.1': 18, 'FAU_SEL.1': 6, 'FAU_STG.1': 6, 'FAU_SAR.3': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_SEL_EXT.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG_EXT.1.1': 1, 'FAU_STG_EXT.1.2': 1, 'FAU_STG_EXT.1.3': 1, 'FAU_SAR.1': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1}, 'FCO': {'FCO_NRR.2': 7, 'FCO_NRR.1': 1, 'FCO_NRR.2.1': 1, 'FCO_NRR.2.2': 1, 'FCO_NRR.2.3': 1}, 'FCS': {'FCS_TLS_EXT.1': 11, 'FCS_CKM.1': 14, 'FCS_CKM.2': 6, 'FCS_COP.1': 44, 'FCS_TLS_EXT.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_COP.1.1': 4, 'FCS_CKM.4': 11}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 8, 'FDP_IFC.1': 9, 'FDP_IFF.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.4': 1, 'FDP_IFF.5': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_AFL.1': 8, 'FIA_SOS.1': 9, 'FIA_USB.1': 8, 'FIA_UID.1': 4, 'FIA_UAU.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 1}, 'FMT': {'FMT_MOF_EXT.1': 14, 'FMT_MSA_EXT.5': 7, 'FMT_MOF.1': 18, 'FMT_MSA.1': 8, 'FMT_MSA.3': 14, 'FMT_SMF.1': 20, 'FMT_SMR.1': 20, 'FMT_MTD.1': 13, 'FMT_MOF.1.1': 2, 'FMT_MOF_EXT.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA_EXT.5.1': 1, 'FMT_MSA_EXT.5.2': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1.1': 1}, 'FPT': {'FPT_APW_EXT.1': 7, 'FPT_FLS_EXT.1': 9, 'FPT_SKP_EXT.1': 7, 'FPT_RPL.1': 10, 'FPT_TDC': 1, 'FPT_STM.1': 2, 'FPT_APW_EXT.1.1': 1, 'FPT_APW_EXT.1.2': 1, 'FPT_FLS_EXT.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_SKP_EXT.1.1': 1, 'FPT_TDC.1': 7, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS.1': 1}, 'FRU': {'FRU_FLT.1': 6, 'FRU_FLT.1.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.4': 4, 'FTA_TAB.1': 6, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 16, 'FTP_TRP.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCESSID': 5, 'O.AUDIT': 5, 'O.AUTH': 4, 'O.BANNER': 5, 'O.CONSISTENT': 4, 'O.DISTRIB': 3, 'O.INTEGRITY': 3, 'O.MANAGE': 4, 'O.POLICY': 4, 'O.PROTCOMMS': 5, 'O.ROBUST': 4, 'O.CRYPTO': 8, 'O.DATAPROT': 5, 'O.MAINTAIN': 4, 'O.MNGRID': 7, 'O.MONITOR': 5, 'O.OFLOWS': 3, 'O.RESILIENT': 5, 'O.SELFID': 5, 'O.CONSISTEN': 1, 'O.PROTCOM': 1}, 'T': {'T.ADMIN_ERROR': 3, 'T.CONDTRADICT': 1, 'T.EAVES': 3, 'T.FORGE': 2, 'T.UNAUTH': 3, 'T.WEAKPOL': 2, 'T.WEAKIA': 3, 'T.DISABLE': 2, 'T.FALSIFY': 3, 'T.MASK': 2, 'T.NOROUTE': 3, 'T.OFLOWS': 2, 'T.BYPASS_POLICY': 3, 'T.CONTRADICT': 1}, 'A': {'A.ENDUSER_DATA': 1, 'A.POLICY': 1, 'A.AUDIT_TRAIL': 1, 'A.CREDENTIALS': 1}, 'OE': {'OE.ADMIN': 5, 'OE.INSTALL': 6, 'OE.PERSON': 3, 'OE.SYSTIME': 4, 'OE.USERID': 4, 'OE.POLICY': 4, 'OE.KEY_ERASE': 7}}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'constructions': {'MAC': {'HMAC': 2, 'HMAC-SHA-256': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 8, 'SHA-384': 4, 'SHA-512': 2, 'SHA256': 1, 'SHA512': 1}}, 'PBKDF': {'PBKDF2': 5}}, 'crypto_scheme': {'MAC': {'MAC': 13}, 'KEX': {'Key exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 6}, 'TLS': {'TLS': 44, 'TLS 1.2': 6, 'TLS 1.3': 7, 'TLS v1.2': 3, 'TLSv1.2': 6, 'TLS v1.3': 7}}, 'PGP': {'PGP': 2}}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'CTR': {'CTR': 3}}, 'ecc_curve': {'NIST': {'secp256r1': 8}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256': 2, 'TLS_DHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 2, 'TLS_RSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS197': 1, 'FIPS180-4': 3}, 'PKCS': {'PKCS#1': 3, 'PKCS7': 1}, 'RFC': {'RFC 2818': 1, 'RFC 5246': 2, 'RFC8446': 7, 'RFC4253': 6, 'RFC5246': 7, 'RFC4344': 1, 'RFC3447': 2, 'RFC2104': 1, 'RFC4627': 2, 'RFC2616': 1, 'RFC2818': 1, 'RFC0959': 3, 'RFC4217': 1, 'RFC4252': 1, 'RFC2617': 1, 'RFC5280': 2, 'RFC4716': 1, 'RFC 8446': 1}, 'X509': {'X.509': 9}, 'CC': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/07': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2023_07.pdf
. - The cert_filename property was set to
certificat-anssi-cc-2023_07.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': '288219f6ec61eccf73c31eb43bb0d1518e2e981eb85b91dbc77f6eedd8f0b3ef', 'txt_hash': 'd4285de8fd7f4de236407d2571efa6306abf2cb438809c6ec074cb9feb731c0e'}
data.
The PDF extraction data was updated.
- The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/07': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 2, 'EAL4': 2}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_FLR.3': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.4': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2023_07fr.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2023/07
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_07fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_07.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The scheme_data property was set to
{'product': 'API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454', 'url': 'https://cyber.gouv.fr/produits-certifies/api-gateway-version-7720210530-patch24803-patch24985patch25644-patch25454', 'description': 'Le produit évalué est « API GATEWAY, version 7.7.20210530, Patch24803, Patch24985, Patch25644, Patch25454 » développé par AXWAY SOFTWARE.\n\nCe produit est une plateforme de gestion d’API qui permet de gérer de manière centralisée le contrôle d’accès aux services web et aux ressources connexes d’une entreprise. Plus précisément, il s’agît d’une plateforme complète pour la gestion centralisée, et l', 'sponsor': 'AXWAY Software', 'developer': 'AXWAY Software', 'cert_id': 'ANSSI-CC-2023/07', 'level': 'EAL4+', 'expiration_date': '15 Février 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/07', 'certification_date': '16/02/2023', 'expiration_date': '15/02/2028', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'AXWAY Software', 'sponsor': 'AXWAY Software', 'evaluation_facility': 'OPPIDA', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': '(AVA_VAN.4, ALC_FLR.3)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2023_07.pdf'}}
.
- The report property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2023_07.pdf",
"dgst": "1287477a150148d4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2023/07",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.7.20210"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Axway",
"manufacturer_web": "https://www.axway.com",
"name": "API GATEWAY version 7.7.20210530, Patch24803, Patch24985,Patch25644, Patch25454",
"not_valid_after": "2028-02-16",
"not_valid_before": "2023-02-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-anssi-cc-2023_07.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/07": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "anssi-cc-2023_07fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/07": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL2": 2,
"EAL4": 2
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": null,
"st_filename": "anssi-cible-cc-2023_07.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUDIT_TRAIL": 1,
"A.CREDENTIALS": 1,
"A.ENDUSER_DATA": 1,
"A.POLICY": 1
},
"O": {
"O.ACCESSID": 5,
"O.AUDIT": 5,
"O.AUTH": 4,
"O.BANNER": 5,
"O.CONSISTEN": 1,
"O.CONSISTENT": 4,
"O.CRYPTO": 8,
"O.DATAPROT": 5,
"O.DISTRIB": 3,
"O.INTEGRITY": 3,
"O.MAINTAIN": 4,
"O.MANAGE": 4,
"O.MNGRID": 7,
"O.MONITOR": 5,
"O.OFLOWS": 3,
"O.POLICY": 4,
"O.PROTCOM": 1,
"O.PROTCOMMS": 5,
"O.RESILIENT": 5,
"O.ROBUST": 4,
"O.SELFID": 5
},
"OE": {
"OE.ADMIN": 5,
"OE.INSTALL": 6,
"OE.KEY_ERASE": 7,
"OE.PERSON": 3,
"OE.POLICY": 4,
"OE.SYSTIME": 4,
"OE.USERID": 4
},
"T": {
"T.ADMIN_ERROR": 3,
"T.BYPASS_POLICY": 3,
"T.CONDTRADICT": 1,
"T.CONTRADICT": 1,
"T.DISABLE": 2,
"T.EAVES": 3,
"T.FALSIFY": 3,
"T.FORGE": 2,
"T.MASK": 2,
"T.NOROUTE": 3,
"T.OFLOWS": 2,
"T.UNAUTH": 3,
"T.WEAKIA": 3,
"T.WEAKPOL": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 2,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 18,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 6,
"FAU_SEL.1.1": 1,
"FAU_SEL_EXT.1": 8,
"FAU_SEL_EXT.1.1": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG_EXT.1": 7,
"FAU_STG_EXT.1.1": 1,
"FAU_STG_EXT.1.2": 1,
"FAU_STG_EXT.1.3": 1
},
"FCO": {
"FCO_NRR.1": 1,
"FCO_NRR.2": 7,
"FCO_NRR.2.1": 1,
"FCO_NRR.2.2": 1,
"FCO_NRR.2.3": 1
},
"FCS": {
"FCS_CKM.1": 14,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 6,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 11,
"FCS_COP.1": 44,
"FCS_COP.1.1": 4,
"FCS_TLS_EXT.1": 11,
"FCS_TLS_EXT.1.1": 1
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 9,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 7,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.4": 1,
"FDP_IFF.5": 1,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 1,
"FIA_SOS.1": 9,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 1,
"FIA_UID.1": 4,
"FIA_USB.1": 8,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 18,
"FMT_MOF.1.1": 2,
"FMT_MOF_EXT.1": 14,
"FMT_MOF_EXT.1.1": 1,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA_EXT.5": 7,
"FMT_MSA_EXT.5.1": 1,
"FMT_MSA_EXT.5.2": 1,
"FMT_MTD.1": 13,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 20,
"FMT_SMR.1": 20,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_APW_EXT.1": 7,
"FPT_APW_EXT.1.1": 1,
"FPT_APW_EXT.1.2": 1,
"FPT_FLS.1": 1,
"FPT_FLS_EXT.1": 9,
"FPT_FLS_EXT.1.1": 1,
"FPT_RPL.1": 10,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_SKP_EXT.1": 7,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM.1": 2,
"FPT_TDC": 1,
"FPT_TDC.1": 7,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT.1": 6,
"FRU_FLT.1.1": 1
},
"FTA": {
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1,
"FTA_TAB.1": 6,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 16,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 8,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CTR": {
"CTR": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"PGP": {
"PGP": 2
},
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 6
},
"TLS": {
"TLS": 44,
"TLS 1.2": 6,
"TLS 1.3": 7,
"TLS v1.2": 3,
"TLS v1.3": 7,
"TLSv1.2": 6
}
}
},
"crypto_scheme": {
"KEX": {
"Key exchange": 1
},
"MAC": {
"MAC": 13
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"secp256r1": 8
}
},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 1
}
},
"hash_function": {
"PBKDF": {
"PBKDF2": 5
},
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 8,
"SHA-384": 4,
"SHA-512": 2,
"SHA256": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS180-4": 3,
"FIPS197": 1
},
"PKCS": {
"PKCS#1": 3,
"PKCS7": 1
},
"RFC": {
"RFC 2818": 1,
"RFC 5246": 2,
"RFC 8446": 1,
"RFC0959": 3,
"RFC2104": 1,
"RFC2616": 1,
"RFC2617": 1,
"RFC2818": 1,
"RFC3447": 2,
"RFC4217": 1,
"RFC4252": 1,
"RFC4253": 6,
"RFC4344": 1,
"RFC4627": 2,
"RFC4716": 1,
"RFC5246": 7,
"RFC5280": 2,
"RFC8446": 7
},
"X509": {
"X.509": 9
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"constructions": {
"MAC": {
"HMAC": 2,
"HMAC-SHA-256": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 2,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA256": 2,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": null
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_07fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.3",
"AVA_VAN.4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_07.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "e9ab30c9496f6e2b6fc67ad410b13bc94e08d09e4e28034517d5ebd79aa29d56",
"txt_hash": "6cbc0fa003c211bfad1b11426bd1e075bd0a57e7175ec37e28f99693ff3add32"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "288219f6ec61eccf73c31eb43bb0d1518e2e981eb85b91dbc77f6eedd8f0b3ef",
"txt_hash": "d4285de8fd7f4de236407d2571efa6306abf2cb438809c6ec074cb9feb731c0e"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "28bc07e44b743122ead336c03632a2585889e689e8554ec6e08a3cfe1102512a",
"txt_hash": "ba4462197e773e496aa57d1dc41353b7be77ca02ec5e136d5fc157179ce674ef"
}
},
"status": "active"
}