This page was not yet optimized for use on mobile devices.
MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06)
CSV information ?
Status | active |
---|---|
Valid from | 12.02.2025 |
Valid until | 12.02.2030 |
Scheme | 🇫🇷 FR |
Manufacturer | Thales |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, ALC_FLR.3 |
Heuristics summary ?
Certificate ID: ANSSI-CC-2025/06
Certificate ?
Extracted keywords
Security level
EAL4, EAL2Security Assurance Requirements (SAR)
ALC_FLR.3Certificates
ANSSI-CC-2025/06Evaluation facilities
OPPIDAFile metadata
Creation date | D:20250213160255+01'00' |
---|---|
Modification date | D:20250213160309+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESProtocols
IPsecSecurity level
EAL4, EAL2, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLRCertificates
ANSSI-CC-2025/06Evaluation facilities
CESTI, OPPIDAStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20250213160052+01'00' |
---|---|
Modification date | D:20250213160310+01'00' |
Pages | 12 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, HMAC, HMAC-SHA-256, HMAC-SHA-384Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-256, SHA-384, SHA256, PBKDF2Schemes
MAC, Key ExchangeProtocols
SSH, SSL, SSL 2.0, SSL 3.0, SSL2.0, TLS, TLS 1.2, TLS 1.1, TLS 1.0, DTLS, IKE, IKEv2, IKEv1, IPsec, VPNRandomness
RNG, RBGElliptic Curves
secp256r1, secp384r1, secp521r1, brainpoolP256r1Block cipher modes
CBC, CTR, GCM, XTSTLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384Security level
EAL4+, EAL4, EAL3, EAL4 augmentedClaims
O.PROTECTED_COMMUNICATIONS, O.POL_FILTERING, O.POL_DEFAULT, O.AUDIT, O.TIME_BASE, O.AUDIT_PROTECTION, O.SUPERVISION, O.SUPERVISION_IMPACT, O.ROLES, O.AUTHENTICATION_FAILURE, O.DISPLAY_BANNER, O.SESSION_LOCK, O.MANAGEMENT, O.VIEW_RULES, O.TOE_REDUNDANCY, O.RESIDUAL_INFORMATION_CLEAR, O.DATA_ERASURE, O.LOCAL_DATA_PROTECTION, O.SELF_TEST, O.SOFTWARE_UPDATES, O.BOOT_CONTROL, O.CERTIFICATE_INJECTION, O.CRYPTO_PERIOD, O.CRYPTO_REGULATION, O.PROTECTED_COMMUNICATION, O.RESIDUAL_INFORMATION_CLEA, T.SECURITY_FUNCTIONALITY_FAILURE, T.UNDETECTED_ACTIVITY, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.UPDATE_COMPROMISE, T.USER_DATA_REUSE, T.MISUSE, T.TIME_BASE, T.RESIDUAL_DATA, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.TOE_CAPTURE, T.SECURITY_FUNCTIONALITY, T.UNTRUSTED_COMMUNICATI, T.WEAK_AUTHENTICATION_EN, A.LIMITED_FUNCTIONALITY, A.PHYSICAL_PROTECTION, A.REGULAR_UPDATES, A.SENSITIVE_DATA_ERASURE, A.NO_THRU_TRAFFIC_PROTECTION, A.PERSISTENT_ASSETS_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.ALARM, A.POLICIES_CONTINUITY, A.ADMINISTRATION_NETWORK, A.ADMIN_CREDENTIALS_SECURE, A.BIOS_PASSWORD, A.SECURED_MANAGEMENT_DEVICES, A.ACCESS_CONTROL_MANAGEMENT_DEVICES, A.PHYSICAL_ENV_MANAGEMENT_DEVICES, A.AUDIT, A.SS_MMC_TO_TOE, A.DATA_TRANSPORTATION, A.EXTERNAL_KEYS, A.PHYSICAL_ENV_MANAGEMENT_DEVIC, OE.TRUSTED_ADMIN, OE.AUDIT, OE.ALARM, OE.POLICIES_CONTINUITY, OE.ADMIN_CREDENTIALS_SECURE, OE.BIOS_PASSWORD, OE.SECURE_PERSISTENT_ASSET, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TOE_INTEGRITY, OE.TIME_TOE, OE.TOE_DATA_ERASURE, OE.TOE_PRODUCTION, OE.NO_THRU_TRAFFIC_PROTECTION, OE.SECURED_MANAGEMENT_DEVICES, OE.ACCESS_CONTROL_MANAGEMENT_DEVICES, OE.PHYSICAL_ENV_MANAGEMENT_DEVICES, OE.AUDIT_RECORD, OE.LMGT_CONNECTION, OE.SS_MMC_TO_TOE, OE.DATA_TRANSPORTATION, OE.EXTERNAL_KEYS, OE.UPDATES, OE.SECURED_MANAGEMENT_DE, OE.ACCESS_CONTROL_MANAGE, OE.PHYSICAL_ENV_MANAGEMEN, OE.ADMIN_CREDENTIALS_SECUR, OE.ACCESS_CONTROL_MANAGEMENT_DEVICESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_GEN.1, FAU_STG_EXT.1, FAU_GEN, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG_EXT.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_STG, FAU_STG.3, FAU_STG.1, FCO_CPC_EXT, FCO_CPC_EXT.1, FCO_CPC_EXT.1.1, FCO_CPC_EXT.1.3, FCO_CPC_EXT.1.2, FCS_RBG_EXT, FCS_TLSC_EXT, FCS_TLSS_EXT, FCS_CKM_EXT.5, FCS_CKM.1, FCS_CKM.2, FCS_COP, FCS_RBG_EXT.1, FCS_CKM_EXT, FCS_TLSC_EXT.2, FCS_TLSC_EXT.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2.2, FCS_TLSC_EXT.2.3, FCS_TLSC_EXT.2.4, FCS_TLSC_EXT.2.5, FCS_TLSS_EXT.2, FCS_TLSS_EXT.2.1, FCS_TLSS_EXT.2.2, FCS_TLSS_EXT.2.3, FCS_TLSS_EXT.2.4, FCS_TLSS_EXT.2.5, FCS_TLSS_EXT.2.6, FCS_CKM.4, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.5.3, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC, FDP_ETC, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ETC.2, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.2, FDP_RIP.2.1, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UID.2, FIA_UAU.6, FIA_UAU.7, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UID.2.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UIA, FIA_UID.1, FIA_UAU.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF, FMT_MOF.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MSA.1, FMT_SMR.1, FPT_SKP_EXT, FPT_APW_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_STM_EXT, FPT_SDP_EXT, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_STM_EXT.1, FPT_PTD, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_SDP_EXT.2, FPT_SDP_EXT.2.1, FPT_SDP_EXT.2.2, FPT_TDC, FPT_TDC.1, FPT_RCV.1, FPT_RCV.1.1, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_FLS.1, FPT_FLS.1.1, FPT_STM.1, FTA_SSL_EXT, FTA_SSL.3, FTA_SSL.4, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP, FTP_TRP.1Certificates
CC-01, CC-02, CC-03Certification process
out of scope, Out of scope, of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. The Mistral Management Center device, System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9 MISTRAL VS9 IPSEC GATEWAY SOFTWARE DUAL USEStandards
PKCS #1, PKCS#12, RFC 2131, RFC 6960, RFC 4301, RFC 4303, RFC 4106, RFC 4109, RFC 4304, RFC 4868, RFC 7296, RFC 5282, RFC 4945, RFC 5246, RFC 4346, RFC 6125, RFC 5280, RFC 5759, RFC 2986, RFC5289, ISO/IEC 9796-2, ISO/IEC 9797-, ISO/IEC 18031:2011, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | Microsoft Word - ST_lite_GATEWAY_IPSEC_MISTRAL_VS9_63535113lite-306_AF |
---|---|
Author | ERIC AUGE |
Creation date | D:20250128123410+01'00' |
Modification date | D:20250128123410+01'00' |
Pages | 134 |
Producer | Microsoft: Print To PDF |
Heuristics ?
Certificate ID: ANSSI-CC-2025/06
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Similar certificates
References ?
No references are available for this certificate.
Updates ?
-
03.03.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bfd980948c78b74eb135363b74b00118ace027b9ae591f74fe0d050baeb52778', 'txt_hash': '688ae3e99c216fdebfd4e09b761c08ae72ac64f00c564dfb617ac75ecfd48949'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b3436633f5fefdb1ed351d7e08fa312262f9d0faee23e15dbe5bf75b841e046c', 'txt_hash': '59d4054ff0856083e7b22ff0d999b20cf51eef44fb948035fc399f69f5ddec68'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e9d19cb9f411dce35f21e53da63e7aeb24b139107d08541d12fedf4aa56476e', 'txt_hash': 'ace08c18935d62fbbbe1eac0d13e15319745b062b1e3442f9b0d5517da076d19'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 329723, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 12, '/CreationDate': "D:20250213160052+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250213160310+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/', 'mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2522320, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 134, '/Author': 'ERIC AUGE', '/CreationDate': "D:20250128123410+01'00'", '/ModDate': "D:20250128123410+01'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - ST_lite_GATEWAY_IPSEC_MISTRAL_VS9_63535113lite-306_AF', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 143188, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20250213160255+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250213160309+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2025/06': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL2': 2}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 3, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'CC-01': 1, 'CC-02': 2, 'CC-03': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 4, 'EAL4': 4, 'EAL3': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.4': 10, 'ADV_TDS.3': 5, 'ADV_IMP.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.3': 7, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 3, 'ALC_LCD.1': 4, 'ALC_TAT.1': 4, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 1, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.3': 3}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 10, 'FAU_GEN.1': 14, 'FAU_STG_EXT.1': 13, 'FAU_GEN': 16, 'FAU_STG_EXT.1.1': 2, 'FAU_STG_EXT.1.2': 2, 'FAU_STG_EXT.1.3': 4, 'FAU_STG_EXT.2': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_STG': 6, 'FAU_STG.3': 1, 'FAU_STG.1': 1}, 'FCO': {'FCO_CPC_EXT': 14, 'FCO_CPC_EXT.1': 12, 'FCO_CPC_EXT.1.1': 2, 'FCO_CPC_EXT.1.3': 2, 'FCO_CPC_EXT.1.2': 2}, 'FCS': {'FCS_RBG_EXT': 2, 'FCS_TLSC_EXT': 4, 'FCS_TLSS_EXT': 4, 'FCS_CKM_EXT.5': 17, 'FCS_CKM.1': 54, 'FCS_CKM.2': 13, 'FCS_COP': 120, 'FCS_RBG_EXT.1': 21, 'FCS_CKM_EXT': 13, 'FCS_TLSC_EXT.2': 10, 'FCS_TLSC_EXT.1': 1, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_CKM': 2, 'FCS_TLSC_EXT.2.1': 2, 'FCS_TLSC_EXT.2.2': 2, 'FCS_TLSC_EXT.2.3': 2, 'FCS_TLSC_EXT.2.4': 2, 'FCS_TLSC_EXT.2.5': 2, 'FCS_TLSS_EXT.2': 6, 'FCS_TLSS_EXT.2.1': 2, 'FCS_TLSS_EXT.2.2': 2, 'FCS_TLSS_EXT.2.3': 2, 'FCS_TLSS_EXT.2.4': 2, 'FCS_TLSS_EXT.2.5': 2, 'FCS_TLSS_EXT.2.6': 2, 'FCS_CKM.4': 26, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.5.3': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 21}, 'FDP': {'FDP_UCT.1': 8, 'FDP_UIT.1': 10, 'FDP_ITC': 13, 'FDP_ETC': 6, 'FDP_ITC.1': 19, 'FDP_ITC.2': 29, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ETC.2': 4, 'FDP_IFC': 19, 'FDP_IFC.1': 9, 'FDP_IFF': 16, 'FDP_IFF.1': 14, 'FDP_ACC.1': 11, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 5, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.2': 5, 'FDP_RIP.2.1': 1}, 'FIA': {'FIA_PMG_EXT': 2, 'FIA_UIA_EXT': 4, 'FIA_UAU_EXT': 2, 'FIA_UID.2': 8, 'FIA_UAU.6': 6, 'FIA_UAU.7': 7, 'FIA_PMG_EXT.1': 9, 'FIA_UAU_EXT.2': 10, 'FIA_PMG_EXT.1.1': 2, 'FIA_UIA_EXT.1': 14, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UIA': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MSA.3': 16, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.2': 7, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_MOF': 10, 'FMT_MOF.1': 2, 'FMT_MTD.1': 8, 'FMT_MTD.1.1': 1, 'FMT_MSA.1': 1, 'FMT_SMR.1': 4}, 'FPT': {'FPT_SKP_EXT': 2, 'FPT_APW_EXT': 2, 'FPT_TST_EXT': 2, 'FPT_TUD_EXT': 2, 'FPT_STM_EXT': 2, 'FPT_SDP_EXT': 3, 'FPT_SKP_EXT.1': 9, 'FPT_APW_EXT.1': 10, 'FPT_STM_EXT.1': 16, 'FPT_PTD': 1, 'FPT_SKP_EXT.1.1': 3, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_TST_EXT.1': 9, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1': 10, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_STM': 2, 'FPT_STM_EXT.1.1': 2, 'FPT_STM_EXT.1.2': 2, 'FPT_SDP_EXT.2': 10, 'FPT_SDP_EXT.2.1': 2, 'FPT_SDP_EXT.2.2': 2, 'FPT_TDC': 11, 'FPT_TDC.1': 7, 'FPT_RCV.1': 5, 'FPT_RCV.1.1': 1, 'FPT_RCV.2': 5, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FTA': {'FTA_SSL_EXT': 3, 'FTA_SSL.3': 6, 'FTA_SSL.4': 6, 'FTA_SSL_EXT.1': 11, 'FTA_TAB.1': 8, 'FTA_SSL': 1, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 18, 'FTP_ITC': 1, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP': 10, 'FTP_TRP.1': 11}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICATIONS': 13, 'O.POL_FILTERING': 8, 'O.POL_DEFAULT': 13, 'O.AUDIT': 15, 'O.TIME_BASE': 4, 'O.AUDIT_PROTECTION': 5, 'O.SUPERVISION': 6, 'O.SUPERVISION_IMPACT': 9, 'O.ROLES': 12, 'O.AUTHENTICATION_FAILURE': 10, 'O.DISPLAY_BANNER': 6, 'O.SESSION_LOCK': 4, 'O.MANAGEMENT': 7, 'O.VIEW_RULES': 12, 'O.TOE_REDUNDANCY': 4, 'O.RESIDUAL_INFORMATION_CLEAR': 4, 'O.DATA_ERASURE': 9, 'O.LOCAL_DATA_PROTECTION': 15, 'O.SELF_TEST': 12, 'O.SOFTWARE_UPDATES': 9, 'O.BOOT_CONTROL': 5, 'O.CERTIFICATE_INJECTION': 4, 'O.CRYPTO_PERIOD': 9, 'O.CRYPTO_REGULATION': 7, 'O.PROTECTED_COMMUNICATION': 3, 'O.RESIDUAL_INFORMATION_CLEA': 1}, 'T': {'T.SECURITY_FUNCTIONALITY_FAILURE': 3, 'T.UNDETECTED_ACTIVITY': 5, 'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 3, 'T.UPDATE_COMPROMISE': 5, 'T.USER_DATA_REUSE': 3, 'T.MISUSE': 5, 'T.TIME_BASE': 3, 'T.RESIDUAL_DATA': 5, 'T.WEAK_CRYPTOGRAPHY': 3, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 3, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 3, 'T.PASSWORD_CRACKING': 5, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 3, 'T.TOE_CAPTURE': 5, 'T.SECURITY_FUNCTIONALITY': 2, 'T.UNTRUSTED_COMMUNICATI': 2, 'T.WEAK_AUTHENTICATION_EN': 2}, 'A': {'A.LIMITED_FUNCTIONALITY': 2, 'A.PHYSICAL_PROTECTION': 1, 'A.REGULAR_UPDATES': 2, 'A.SENSITIVE_DATA_ERASURE': 1, 'A.NO_THRU_TRAFFIC_PROTECTION': 1, 'A.PERSISTENT_ASSETS_PROTECTION': 2, 'A.TRUSTED_ADMINISTRATOR': 2, 'A.ALARM': 1, 'A.POLICIES_CONTINUITY': 2, 'A.ADMINISTRATION_NETWORK': 1, 'A.ADMIN_CREDENTIALS_SECURE': 1, 'A.BIOS_PASSWORD': 2, 'A.SECURED_MANAGEMENT_DEVICES': 2, 'A.ACCESS_CONTROL_MANAGEMENT_DEVICES': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVICES': 1, 'A.AUDIT': 2, 'A.SS_MMC_TO_TOE': 1, 'A.DATA_TRANSPORTATION': 2, 'A.EXTERNAL_KEYS': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}, 'OE': {'OE.TRUSTED_ADMIN': 3, 'OE.AUDIT': 2, 'OE.ALARM': 3, 'OE.POLICIES_CONTINUITY': 2, 'OE.ADMIN_CREDENTIALS_SECURE': 3, 'OE.BIOS_PASSWORD': 2, 'OE.SECURE_PERSISTENT_ASSET': 2, 'OE.PHYSICAL': 2, 'OE.NO_GENERAL_PURPOSE': 2, 'OE.TOE_INTEGRITY': 7, 'OE.TIME_TOE': 3, 'OE.TOE_DATA_ERASURE': 5, 'OE.TOE_PRODUCTION': 3, 'OE.NO_THRU_TRAFFIC_PROTECTION': 2, 'OE.SECURED_MANAGEMENT_DEVICES': 4, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICES': 3, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVICES': 4, 'OE.AUDIT_RECORD': 3, 'OE.LMGT_CONNECTION': 5, 'OE.SS_MMC_TO_TOE': 5, 'OE.DATA_TRANSPORTATION': 5, 'OE.EXTERNAL_KEYS': 2, 'OE.UPDATES': 4, 'OE.SECURED_MANAGEMENT_DE': 1, 'OE.ACCESS_CONTROL_MANAGE': 1, 'OE.PHYSICAL_ENV_MANAGEMEN': 1, 'OE.ADMIN_CREDENTIALS_SECUR': 1, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICE': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'HMAC': 4, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'Diffie-Hellman': 7, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-384': 1, 'SHA256': 2}}, 'PBKDF': {'PBKDF2': 1}}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 4, 'SSL 2.0': 1, 'SSL 3.0': 2, 'SSL2.0': 1}, 'TLS': {'TLS': 55, 'TLS 1.2': 5, 'TLS 1.1': 4, 'TLS 1.0': 2}, 'DTLS': {'DTLS': 1}}, 'IKE': {'IKE': 24, 'IKEv2': 23, 'IKEv1': 5}, 'IPsec': {'IPsec': 64}, 'VPN': {'VPN': 48}}, 'randomness': {'RNG': {'RNG': 1, 'RBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'CTR': {'CTR': 2}, 'GCM': {'GCM': 3}, 'XTS': {'XTS': 2}}, 'ecc_curve': {'NIST': {'secp256r1': 11, 'secp384r1': 2, 'secp521r1': 2}, 'Brainpool': {'brainpoolP256r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS #1': 1, 'PKCS#12': 3}, 'RFC': {'RFC 2131': 2, 'RFC 6960': 4, 'RFC 4301': 2, 'RFC 4303': 2, 'RFC 4106': 2, 'RFC 4109': 1, 'RFC 4304': 1, 'RFC 4868': 3, 'RFC 7296': 3, 'RFC 5282': 2, 'RFC 4945': 2, 'RFC 5246': 4, 'RFC 4346': 2, 'RFC 6125': 2, 'RFC 5280': 5, 'RFC 5759': 2, 'RFC 2986': 2, 'RFC5289': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 9797-': 3, 'ISO/IEC 18031:2011': 4}, 'X509': {'X.509': 12}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Out of scope': 1, 'of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. The Mistral Management Center device': 1, 'System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9 MISTRAL VS9 IPSEC GATEWAY SOFTWARE DUAL USE': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2025/06': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2025_06fr.pdf
. - The st_filename property was set to
ANSSI-Cible-CC-2025_06en.pdf
. - The cert_filename property was set to
Certificat-ANSSI-CC-2025_06fr.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2025/06
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values added.
- The report property was updated, with the
-
24.02.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_06fr.pdf",
"dgst": "d8b3b6188c1ed69c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2025/06",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.2.3.5"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Thales",
"manufacturer_web": null,
"name": "MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 \u0026 IP9010) (ANSSI-CC-2025/06)",
"not_valid_after": "2030-02-12",
"not_valid_before": "2025-02-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-ANSSI-CC-2025_06fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2025/06": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20250213160255+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20250213160309+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 143188,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2025_06fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2025/06": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 3
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL4": 3
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"OPPIDA": {
"OPPIDA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20250213160052+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20250213160310+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 329723,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]",
"http://www.commoncriteriaportal.org/",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "ANSSI-Cible-CC-2025_06en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 7
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 7
}
}
},
"cc_cert_id": {
"NL": {
"CC-01": 1,
"CC-02": 2,
"CC-03": 2
}
},
"cc_claims": {
"A": {
"A.ACCESS_CONTROL_MANAGEMENT_DEVICES": 1,
"A.ADMINISTRATION_NETWORK": 1,
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.ALARM": 1,
"A.AUDIT": 2,
"A.BIOS_PASSWORD": 2,
"A.DATA_TRANSPORTATION": 2,
"A.EXTERNAL_KEYS": 1,
"A.LIMITED_FUNCTIONALITY": 2,
"A.NO_THRU_TRAFFIC_PROTECTION": 1,
"A.PERSISTENT_ASSETS_PROTECTION": 2,
"A.PHYSICAL_ENV_MANAGEMENT_DEVIC": 1,
"A.PHYSICAL_ENV_MANAGEMENT_DEVICES": 1,
"A.PHYSICAL_PROTECTION": 1,
"A.POLICIES_CONTINUITY": 2,
"A.REGULAR_UPDATES": 2,
"A.SECURED_MANAGEMENT_DEVICES": 2,
"A.SENSITIVE_DATA_ERASURE": 1,
"A.SS_MMC_TO_TOE": 1,
"A.TRUSTED_ADMINISTRATOR": 2
},
"O": {
"O.AUDIT": 15,
"O.AUDIT_PROTECTION": 5,
"O.AUTHENTICATION_FAILURE": 10,
"O.BOOT_CONTROL": 5,
"O.CERTIFICATE_INJECTION": 4,
"O.CRYPTO_PERIOD": 9,
"O.CRYPTO_REGULATION": 7,
"O.DATA_ERASURE": 9,
"O.DISPLAY_BANNER": 6,
"O.LOCAL_DATA_PROTECTION": 15,
"O.MANAGEMENT": 7,
"O.POL_DEFAULT": 13,
"O.POL_FILTERING": 8,
"O.PROTECTED_COMMUNICATION": 3,
"O.PROTECTED_COMMUNICATIONS": 13,
"O.RESIDUAL_INFORMATION_CLEA": 1,
"O.RESIDUAL_INFORMATION_CLEAR": 4,
"O.ROLES": 12,
"O.SELF_TEST": 12,
"O.SESSION_LOCK": 4,
"O.SOFTWARE_UPDATES": 9,
"O.SUPERVISION": 6,
"O.SUPERVISION_IMPACT": 9,
"O.TIME_BASE": 4,
"O.TOE_REDUNDANCY": 4,
"O.VIEW_RULES": 12
},
"OE": {
"OE.ACCESS_CONTROL_MANAGE": 1,
"OE.ACCESS_CONTROL_MANAGEMENT_DEVICE": 2,
"OE.ACCESS_CONTROL_MANAGEMENT_DEVICES": 3,
"OE.ADMIN_CREDENTIALS_SECUR": 1,
"OE.ADMIN_CREDENTIALS_SECURE": 3,
"OE.ALARM": 3,
"OE.AUDIT": 2,
"OE.AUDIT_RECORD": 3,
"OE.BIOS_PASSWORD": 2,
"OE.DATA_TRANSPORTATION": 5,
"OE.EXTERNAL_KEYS": 2,
"OE.LMGT_CONNECTION": 5,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.NO_THRU_TRAFFIC_PROTECTION": 2,
"OE.PHYSICAL": 2,
"OE.PHYSICAL_ENV_MANAGEMEN": 1,
"OE.PHYSICAL_ENV_MANAGEMENT_DEVICES": 4,
"OE.POLICIES_CONTINUITY": 2,
"OE.SECURED_MANAGEMENT_DE": 1,
"OE.SECURED_MANAGEMENT_DEVICES": 4,
"OE.SECURE_PERSISTENT_ASSET": 2,
"OE.SS_MMC_TO_TOE": 5,
"OE.TIME_TOE": 3,
"OE.TOE_DATA_ERASURE": 5,
"OE.TOE_INTEGRITY": 7,
"OE.TOE_PRODUCTION": 3,
"OE.TRUSTED_ADMIN": 3,
"OE.UPDATES": 4
},
"T": {
"T.MISUSE": 5,
"T.PASSWORD_CRACKING": 5,
"T.RESIDUAL_DATA": 5,
"T.SECURITY_FUNCTIONALITY": 2,
"T.SECURITY_FUNCTIONALITY_COMPROMISE": 3,
"T.SECURITY_FUNCTIONALITY_FAILURE": 3,
"T.TIME_BASE": 3,
"T.TOE_CAPTURE": 5,
"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 3,
"T.UNDETECTED_ACTIVITY": 5,
"T.UNTRUSTED_COMMUNICATI": 2,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 3,
"T.UPDATE_COMPROMISE": 5,
"T.USER_DATA_REUSE": 3,
"T.WEAK_AUTHENTICATION_EN": 2,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 3,
"T.WEAK_CRYPTOGRAPHY": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 10,
"ADV_IMP.1": 5,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 5
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.1": 1,
"ALC_CMS.4": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 3,
"ALC_FLR.3": 7,
"ALC_LCD.1": 4,
"ALC_TAT.1": 4
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 5,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 4,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 4,
"ATE_DPT.1": 3,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 3
}
},
"cc_security_level": {
"EAL": {
"EAL3": 1,
"EAL4": 4,
"EAL4 augmented": 2,
"EAL4+": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 16,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_STG": 6,
"FAU_STG.1": 1,
"FAU_STG.3": 1,
"FAU_STG_EXT": 10,
"FAU_STG_EXT.1": 13,
"FAU_STG_EXT.1.1": 2,
"FAU_STG_EXT.1.2": 2,
"FAU_STG_EXT.1.3": 4,
"FAU_STG_EXT.2": 2
},
"FCO": {
"FCO_CPC_EXT": 14,
"FCO_CPC_EXT.1": 12,
"FCO_CPC_EXT.1.1": 2,
"FCO_CPC_EXT.1.2": 2,
"FCO_CPC_EXT.1.3": 2
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 54,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 13,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 26,
"FCS_CKM.4.1": 1,
"FCS_CKM_EXT": 13,
"FCS_CKM_EXT.5": 17,
"FCS_CKM_EXT.5.1": 1,
"FCS_CKM_EXT.5.2": 1,
"FCS_CKM_EXT.5.3": 1,
"FCS_COP": 120,
"FCS_COP.1": 21,
"FCS_RBG_EXT": 2,
"FCS_RBG_EXT.1": 21,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 2,
"FCS_TLSC_EXT": 4,
"FCS_TLSC_EXT.1": 1,
"FCS_TLSC_EXT.2": 10,
"FCS_TLSC_EXT.2.1": 2,
"FCS_TLSC_EXT.2.2": 2,
"FCS_TLSC_EXT.2.3": 2,
"FCS_TLSC_EXT.2.4": 2,
"FCS_TLSC_EXT.2.5": 2,
"FCS_TLSS_EXT": 4,
"FCS_TLSS_EXT.2": 6,
"FCS_TLSS_EXT.2.1": 2,
"FCS_TLSS_EXT.2.2": 2,
"FCS_TLSS_EXT.2.3": 2,
"FCS_TLSS_EXT.2.4": 2,
"FCS_TLSS_EXT.2.5": 2,
"FCS_TLSS_EXT.2.6": 2
},
"FDP": {
"FDP_ACC.1": 11,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 5,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC": 6,
"FDP_ETC.2": 4,
"FDP_IFC": 19,
"FDP_IFC.1": 9,
"FDP_IFF": 16,
"FDP_IFF.1": 14,
"FDP_ITC": 13,
"FDP_ITC.1": 19,
"FDP_ITC.2": 29,
"FDP_RIP.2": 5,
"FDP_RIP.2.1": 1,
"FDP_UCT.1": 8,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 10,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PMG_EXT": 2,
"FIA_PMG_EXT.1": 9,
"FIA_PMG_EXT.1.1": 2,
"FIA_UAU.1": 2,
"FIA_UAU.6": 6,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 2,
"FIA_UAU_EXT.2": 10,
"FIA_UAU_EXT.2.1": 2,
"FIA_UIA": 1,
"FIA_UIA_EXT": 4,
"FIA_UIA_EXT.1": 14,
"FIA_UIA_EXT.1.1": 2,
"FIA_UIA_EXT.1.2": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 10,
"FMT_MOF.1": 2,
"FMT_MSA.1": 1,
"FMT_MSA.3": 16,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 4,
"FMT_SMR.2": 7,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT": 2,
"FPT_APW_EXT.1": 10,
"FPT_APW_EXT.1.1": 2,
"FPT_APW_EXT.1.2": 2,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_PTD": 1,
"FPT_RCV.1": 5,
"FPT_RCV.1.1": 1,
"FPT_RCV.2": 5,
"FPT_RCV.2.1": 1,
"FPT_RCV.2.2": 1,
"FPT_SDP_EXT": 3,
"FPT_SDP_EXT.2": 10,
"FPT_SDP_EXT.2.1": 2,
"FPT_SDP_EXT.2.2": 2,
"FPT_SKP_EXT": 2,
"FPT_SKP_EXT.1": 9,
"FPT_SKP_EXT.1.1": 3,
"FPT_STM": 2,
"FPT_STM.1": 1,
"FPT_STM_EXT": 2,
"FPT_STM_EXT.1": 16,
"FPT_STM_EXT.1.1": 2,
"FPT_STM_EXT.1.2": 2,
"FPT_TDC": 11,
"FPT_TDC.1": 7,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 9,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 10,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 6,
"FTA_SSL.4.1": 1,
"FTA_SSL_EXT": 3,
"FTA_SSL_EXT.1": 11,
"FTA_SSL_EXT.1.1": 2,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 18,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 10,
"FTP_TRP.1": 11
}
},
"certification_process": {
"OutOfScope": {
"Out of scope": 1,
"System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9 MISTRAL VS9 IPSEC GATEWAY SOFTWARE DUAL USE": 1,
"of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. The Mistral Management Center device": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CTR": {
"CTR": 2
},
"GCM": {
"GCM": 3
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 24,
"IKEv1": 5,
"IKEv2": 23
},
"IPsec": {
"IPsec": 64
},
"SSH": {
"SSH": 2
},
"TLS": {
"DTLS": {
"DTLS": 1
},
"SSL": {
"SSL": 4,
"SSL 2.0": 1,
"SSL 3.0": 2,
"SSL2.0": 1
},
"TLS": {
"TLS": 55,
"TLS 1.0": 2,
"TLS 1.1": 4,
"TLS 1.2": 5
}
},
"VPN": {
"VPN": 48
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 2
},
"NIST": {
"secp256r1": 11,
"secp384r1": 2,
"secp521r1": 2
}
},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF2": 1
},
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-384": 1,
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 2,
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 18031:2011": 4,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797-": 3
},
"PKCS": {
"PKCS #1": 1,
"PKCS#12": 3
},
"RFC": {
"RFC 2131": 2,
"RFC 2986": 2,
"RFC 4106": 2,
"RFC 4109": 1,
"RFC 4301": 2,
"RFC 4303": 2,
"RFC 4304": 1,
"RFC 4346": 2,
"RFC 4868": 3,
"RFC 4945": 2,
"RFC 5246": 4,
"RFC 5280": 5,
"RFC 5282": 2,
"RFC 5759": 2,
"RFC 6125": 2,
"RFC 6960": 4,
"RFC 7296": 3,
"RFC5289": 2
},
"X509": {
"X.509": 12
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
}
},
"DES": {
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 4,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ERIC AUGE",
"/CreationDate": "D:20250128123410+01\u002700\u0027",
"/ModDate": "D:20250128123410+01\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Title": "Microsoft Word - ST_lite_GATEWAY_IPSEC_MISTRAL_VS9_63535113lite-306_AF",
"pdf_file_size_bytes": 2522320,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 134
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_06fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_06en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e9d19cb9f411dce35f21e53da63e7aeb24b139107d08541d12fedf4aa56476e",
"txt_hash": "ace08c18935d62fbbbe1eac0d13e15319745b062b1e3442f9b0d5517da076d19"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bfd980948c78b74eb135363b74b00118ace027b9ae591f74fe0d050baeb52778",
"txt_hash": "688ae3e99c216fdebfd4e09b761c08ae72ac64f00c564dfb617ac75ecfd48949"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b3436633f5fefdb1ed351d7e08fa312262f9d0faee23e15dbe5bf75b841e046c",
"txt_hash": "59d4054ff0856083e7b22ff0d999b20cf51eef44fb948035fc399f69f5ddec68"
}
},
"status": "active"
}