MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06)

CSV information ?

Status active
Valid from 12.02.2025
Valid until 12.02.2030
Scheme 🇫🇷 FR
Manufacturer Thales
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ALC_FLR.3

Heuristics summary ?

Certificate ID: ANSSI-CC-2025/06

Certificate ?

Extracted keywords

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
ANSSI-CC-2025/06
Evaluation facilities
OPPIDA

File metadata

Creation date D:20250213160255+01'00'
Modification date D:20250213160309+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Protocols
IPsec

Security level
EAL4, EAL2, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLR
Certificates
ANSSI-CC-2025/06
Evaluation facilities
CESTI, OPPIDA

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20250213160052+01'00'
Modification date D:20250213160310+01'00'
Pages 12
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, HMAC, HMAC-SHA-256, HMAC-SHA-384
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-256, SHA-384, SHA256, PBKDF2
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, SSL 2.0, SSL 3.0, SSL2.0, TLS, TLS 1.2, TLS 1.1, TLS 1.0, DTLS, IKE, IKEv2, IKEv1, IPsec, VPN
Randomness
RNG, RBG
Elliptic Curves
secp256r1, secp384r1, secp521r1, brainpoolP256r1
Block cipher modes
CBC, CTR, GCM, XTS
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Security level
EAL4+, EAL4, EAL3, EAL4 augmented
Claims
O.PROTECTED_COMMUNICATIONS, O.POL_FILTERING, O.POL_DEFAULT, O.AUDIT, O.TIME_BASE, O.AUDIT_PROTECTION, O.SUPERVISION, O.SUPERVISION_IMPACT, O.ROLES, O.AUTHENTICATION_FAILURE, O.DISPLAY_BANNER, O.SESSION_LOCK, O.MANAGEMENT, O.VIEW_RULES, O.TOE_REDUNDANCY, O.RESIDUAL_INFORMATION_CLEAR, O.DATA_ERASURE, O.LOCAL_DATA_PROTECTION, O.SELF_TEST, O.SOFTWARE_UPDATES, O.BOOT_CONTROL, O.CERTIFICATE_INJECTION, O.CRYPTO_PERIOD, O.CRYPTO_REGULATION, O.PROTECTED_COMMUNICATION, O.RESIDUAL_INFORMATION_CLEA, T.SECURITY_FUNCTIONALITY_FAILURE, T.UNDETECTED_ACTIVITY, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.UPDATE_COMPROMISE, T.USER_DATA_REUSE, T.MISUSE, T.TIME_BASE, T.RESIDUAL_DATA, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.TOE_CAPTURE, T.SECURITY_FUNCTIONALITY, T.UNTRUSTED_COMMUNICATI, T.WEAK_AUTHENTICATION_EN, A.LIMITED_FUNCTIONALITY, A.PHYSICAL_PROTECTION, A.REGULAR_UPDATES, A.SENSITIVE_DATA_ERASURE, A.NO_THRU_TRAFFIC_PROTECTION, A.PERSISTENT_ASSETS_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.ALARM, A.POLICIES_CONTINUITY, A.ADMINISTRATION_NETWORK, A.ADMIN_CREDENTIALS_SECURE, A.BIOS_PASSWORD, A.SECURED_MANAGEMENT_DEVICES, A.ACCESS_CONTROL_MANAGEMENT_DEVICES, A.PHYSICAL_ENV_MANAGEMENT_DEVICES, A.AUDIT, A.SS_MMC_TO_TOE, A.DATA_TRANSPORTATION, A.EXTERNAL_KEYS, A.PHYSICAL_ENV_MANAGEMENT_DEVIC, OE.TRUSTED_ADMIN, OE.AUDIT, OE.ALARM, OE.POLICIES_CONTINUITY, OE.ADMIN_CREDENTIALS_SECURE, OE.BIOS_PASSWORD, OE.SECURE_PERSISTENT_ASSET, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TOE_INTEGRITY, OE.TIME_TOE, OE.TOE_DATA_ERASURE, OE.TOE_PRODUCTION, OE.NO_THRU_TRAFFIC_PROTECTION, OE.SECURED_MANAGEMENT_DEVICES, OE.ACCESS_CONTROL_MANAGEMENT_DEVICES, OE.PHYSICAL_ENV_MANAGEMENT_DEVICES, OE.AUDIT_RECORD, OE.LMGT_CONNECTION, OE.SS_MMC_TO_TOE, OE.DATA_TRANSPORTATION, OE.EXTERNAL_KEYS, OE.UPDATES, OE.SECURED_MANAGEMENT_DE, OE.ACCESS_CONTROL_MANAGE, OE.PHYSICAL_ENV_MANAGEMEN, OE.ADMIN_CREDENTIALS_SECUR, OE.ACCESS_CONTROL_MANAGEMENT_DEVICE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_GEN.1, FAU_STG_EXT.1, FAU_GEN, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG_EXT.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_STG, FAU_STG.3, FAU_STG.1, FCO_CPC_EXT, FCO_CPC_EXT.1, FCO_CPC_EXT.1.1, FCO_CPC_EXT.1.3, FCO_CPC_EXT.1.2, FCS_RBG_EXT, FCS_TLSC_EXT, FCS_TLSS_EXT, FCS_CKM_EXT.5, FCS_CKM.1, FCS_CKM.2, FCS_COP, FCS_RBG_EXT.1, FCS_CKM_EXT, FCS_TLSC_EXT.2, FCS_TLSC_EXT.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2.2, FCS_TLSC_EXT.2.3, FCS_TLSC_EXT.2.4, FCS_TLSC_EXT.2.5, FCS_TLSS_EXT.2, FCS_TLSS_EXT.2.1, FCS_TLSS_EXT.2.2, FCS_TLSS_EXT.2.3, FCS_TLSS_EXT.2.4, FCS_TLSS_EXT.2.5, FCS_TLSS_EXT.2.6, FCS_CKM.4, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.5.3, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC, FDP_ETC, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ETC.2, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.2, FDP_RIP.2.1, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UID.2, FIA_UAU.6, FIA_UAU.7, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UID.2.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UIA, FIA_UID.1, FIA_UAU.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF, FMT_MOF.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MSA.1, FMT_SMR.1, FPT_SKP_EXT, FPT_APW_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_STM_EXT, FPT_SDP_EXT, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_STM_EXT.1, FPT_PTD, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_SDP_EXT.2, FPT_SDP_EXT.2.1, FPT_SDP_EXT.2.2, FPT_TDC, FPT_TDC.1, FPT_RCV.1, FPT_RCV.1.1, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_FLS.1, FPT_FLS.1.1, FPT_STM.1, FTA_SSL_EXT, FTA_SSL.3, FTA_SSL.4, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP, FTP_TRP.1
Certificates
CC-01, CC-02, CC-03

Certification process
out of scope, Out of scope, of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. The Mistral Management Center device, System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9 MISTRAL VS9 IPSEC GATEWAY SOFTWARE DUAL USE

Standards
PKCS #1, PKCS#12, RFC 2131, RFC 6960, RFC 4301, RFC 4303, RFC 4106, RFC 4109, RFC 4304, RFC 4868, RFC 7296, RFC 5282, RFC 4945, RFC 5246, RFC 4346, RFC 6125, RFC 5280, RFC 5759, RFC 2986, RFC5289, ISO/IEC 9796-2, ISO/IEC 9797-, ISO/IEC 18031:2011, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Microsoft Word - ST_lite_GATEWAY_IPSEC_MISTRAL_VS9_63535113lite-306_AF
Author ERIC AUGE
Creation date D:20250128123410+01'00'
Modification date D:20250128123410+01'00'
Pages 134
Producer Microsoft: Print To PDF

Heuristics ?

Certificate ID: ANSSI-CC-2025/06

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

References ?

No references are available for this certificate.

Updates ?

  • 03.03.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bfd980948c78b74eb135363b74b00118ace027b9ae591f74fe0d050baeb52778', 'txt_hash': '688ae3e99c216fdebfd4e09b761c08ae72ac64f00c564dfb617ac75ecfd48949'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b3436633f5fefdb1ed351d7e08fa312262f9d0faee23e15dbe5bf75b841e046c', 'txt_hash': '59d4054ff0856083e7b22ff0d999b20cf51eef44fb948035fc399f69f5ddec68'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e9d19cb9f411dce35f21e53da63e7aeb24b139107d08541d12fedf4aa56476e', 'txt_hash': 'ace08c18935d62fbbbe1eac0d13e15319745b062b1e3442f9b0d5517da076d19'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 329723, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 12, '/CreationDate': "D:20250213160052+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250213160310+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/', 'mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 2522320, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 134, '/Author': 'ERIC AUGE', '/CreationDate': "D:20250128123410+01'00'", '/ModDate': "D:20250128123410+01'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - ST_lite_GATEWAY_IPSEC_MISTRAL_VS9_63535113lite-306_AF', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 143188, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20250213160255+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250213160309+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2025/06': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL2': 2}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 3, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'NL': {'CC-01': 1, 'CC-02': 2, 'CC-03': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 4, 'EAL4': 4, 'EAL3': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.4': 10, 'ADV_TDS.3': 5, 'ADV_IMP.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.3': 7, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 3, 'ALC_LCD.1': 4, 'ALC_TAT.1': 4, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 1, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.3': 3}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 10, 'FAU_GEN.1': 14, 'FAU_STG_EXT.1': 13, 'FAU_GEN': 16, 'FAU_STG_EXT.1.1': 2, 'FAU_STG_EXT.1.2': 2, 'FAU_STG_EXT.1.3': 4, 'FAU_STG_EXT.2': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_STG': 6, 'FAU_STG.3': 1, 'FAU_STG.1': 1}, 'FCO': {'FCO_CPC_EXT': 14, 'FCO_CPC_EXT.1': 12, 'FCO_CPC_EXT.1.1': 2, 'FCO_CPC_EXT.1.3': 2, 'FCO_CPC_EXT.1.2': 2}, 'FCS': {'FCS_RBG_EXT': 2, 'FCS_TLSC_EXT': 4, 'FCS_TLSS_EXT': 4, 'FCS_CKM_EXT.5': 17, 'FCS_CKM.1': 54, 'FCS_CKM.2': 13, 'FCS_COP': 120, 'FCS_RBG_EXT.1': 21, 'FCS_CKM_EXT': 13, 'FCS_TLSC_EXT.2': 10, 'FCS_TLSC_EXT.1': 1, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_CKM': 2, 'FCS_TLSC_EXT.2.1': 2, 'FCS_TLSC_EXT.2.2': 2, 'FCS_TLSC_EXT.2.3': 2, 'FCS_TLSC_EXT.2.4': 2, 'FCS_TLSC_EXT.2.5': 2, 'FCS_TLSS_EXT.2': 6, 'FCS_TLSS_EXT.2.1': 2, 'FCS_TLSS_EXT.2.2': 2, 'FCS_TLSS_EXT.2.3': 2, 'FCS_TLSS_EXT.2.4': 2, 'FCS_TLSS_EXT.2.5': 2, 'FCS_TLSS_EXT.2.6': 2, 'FCS_CKM.4': 26, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.5.3': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 21}, 'FDP': {'FDP_UCT.1': 8, 'FDP_UIT.1': 10, 'FDP_ITC': 13, 'FDP_ETC': 6, 'FDP_ITC.1': 19, 'FDP_ITC.2': 29, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ETC.2': 4, 'FDP_IFC': 19, 'FDP_IFC.1': 9, 'FDP_IFF': 16, 'FDP_IFF.1': 14, 'FDP_ACC.1': 11, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 5, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.2': 5, 'FDP_RIP.2.1': 1}, 'FIA': {'FIA_PMG_EXT': 2, 'FIA_UIA_EXT': 4, 'FIA_UAU_EXT': 2, 'FIA_UID.2': 8, 'FIA_UAU.6': 6, 'FIA_UAU.7': 7, 'FIA_PMG_EXT.1': 9, 'FIA_UAU_EXT.2': 10, 'FIA_PMG_EXT.1.1': 2, 'FIA_UIA_EXT.1': 14, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UIA': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MSA.3': 16, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.2': 7, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_MOF': 10, 'FMT_MOF.1': 2, 'FMT_MTD.1': 8, 'FMT_MTD.1.1': 1, 'FMT_MSA.1': 1, 'FMT_SMR.1': 4}, 'FPT': {'FPT_SKP_EXT': 2, 'FPT_APW_EXT': 2, 'FPT_TST_EXT': 2, 'FPT_TUD_EXT': 2, 'FPT_STM_EXT': 2, 'FPT_SDP_EXT': 3, 'FPT_SKP_EXT.1': 9, 'FPT_APW_EXT.1': 10, 'FPT_STM_EXT.1': 16, 'FPT_PTD': 1, 'FPT_SKP_EXT.1.1': 3, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_TST_EXT.1': 9, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1': 10, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_STM': 2, 'FPT_STM_EXT.1.1': 2, 'FPT_STM_EXT.1.2': 2, 'FPT_SDP_EXT.2': 10, 'FPT_SDP_EXT.2.1': 2, 'FPT_SDP_EXT.2.2': 2, 'FPT_TDC': 11, 'FPT_TDC.1': 7, 'FPT_RCV.1': 5, 'FPT_RCV.1.1': 1, 'FPT_RCV.2': 5, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FTA': {'FTA_SSL_EXT': 3, 'FTA_SSL.3': 6, 'FTA_SSL.4': 6, 'FTA_SSL_EXT.1': 11, 'FTA_TAB.1': 8, 'FTA_SSL': 1, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 18, 'FTP_ITC': 1, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP': 10, 'FTP_TRP.1': 11}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICATIONS': 13, 'O.POL_FILTERING': 8, 'O.POL_DEFAULT': 13, 'O.AUDIT': 15, 'O.TIME_BASE': 4, 'O.AUDIT_PROTECTION': 5, 'O.SUPERVISION': 6, 'O.SUPERVISION_IMPACT': 9, 'O.ROLES': 12, 'O.AUTHENTICATION_FAILURE': 10, 'O.DISPLAY_BANNER': 6, 'O.SESSION_LOCK': 4, 'O.MANAGEMENT': 7, 'O.VIEW_RULES': 12, 'O.TOE_REDUNDANCY': 4, 'O.RESIDUAL_INFORMATION_CLEAR': 4, 'O.DATA_ERASURE': 9, 'O.LOCAL_DATA_PROTECTION': 15, 'O.SELF_TEST': 12, 'O.SOFTWARE_UPDATES': 9, 'O.BOOT_CONTROL': 5, 'O.CERTIFICATE_INJECTION': 4, 'O.CRYPTO_PERIOD': 9, 'O.CRYPTO_REGULATION': 7, 'O.PROTECTED_COMMUNICATION': 3, 'O.RESIDUAL_INFORMATION_CLEA': 1}, 'T': {'T.SECURITY_FUNCTIONALITY_FAILURE': 3, 'T.UNDETECTED_ACTIVITY': 5, 'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 3, 'T.UPDATE_COMPROMISE': 5, 'T.USER_DATA_REUSE': 3, 'T.MISUSE': 5, 'T.TIME_BASE': 3, 'T.RESIDUAL_DATA': 5, 'T.WEAK_CRYPTOGRAPHY': 3, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 3, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 3, 'T.PASSWORD_CRACKING': 5, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 3, 'T.TOE_CAPTURE': 5, 'T.SECURITY_FUNCTIONALITY': 2, 'T.UNTRUSTED_COMMUNICATI': 2, 'T.WEAK_AUTHENTICATION_EN': 2}, 'A': {'A.LIMITED_FUNCTIONALITY': 2, 'A.PHYSICAL_PROTECTION': 1, 'A.REGULAR_UPDATES': 2, 'A.SENSITIVE_DATA_ERASURE': 1, 'A.NO_THRU_TRAFFIC_PROTECTION': 1, 'A.PERSISTENT_ASSETS_PROTECTION': 2, 'A.TRUSTED_ADMINISTRATOR': 2, 'A.ALARM': 1, 'A.POLICIES_CONTINUITY': 2, 'A.ADMINISTRATION_NETWORK': 1, 'A.ADMIN_CREDENTIALS_SECURE': 1, 'A.BIOS_PASSWORD': 2, 'A.SECURED_MANAGEMENT_DEVICES': 2, 'A.ACCESS_CONTROL_MANAGEMENT_DEVICES': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVICES': 1, 'A.AUDIT': 2, 'A.SS_MMC_TO_TOE': 1, 'A.DATA_TRANSPORTATION': 2, 'A.EXTERNAL_KEYS': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}, 'OE': {'OE.TRUSTED_ADMIN': 3, 'OE.AUDIT': 2, 'OE.ALARM': 3, 'OE.POLICIES_CONTINUITY': 2, 'OE.ADMIN_CREDENTIALS_SECURE': 3, 'OE.BIOS_PASSWORD': 2, 'OE.SECURE_PERSISTENT_ASSET': 2, 'OE.PHYSICAL': 2, 'OE.NO_GENERAL_PURPOSE': 2, 'OE.TOE_INTEGRITY': 7, 'OE.TIME_TOE': 3, 'OE.TOE_DATA_ERASURE': 5, 'OE.TOE_PRODUCTION': 3, 'OE.NO_THRU_TRAFFIC_PROTECTION': 2, 'OE.SECURED_MANAGEMENT_DEVICES': 4, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICES': 3, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVICES': 4, 'OE.AUDIT_RECORD': 3, 'OE.LMGT_CONNECTION': 5, 'OE.SS_MMC_TO_TOE': 5, 'OE.DATA_TRANSPORTATION': 5, 'OE.EXTERNAL_KEYS': 2, 'OE.UPDATES': 4, 'OE.SECURED_MANAGEMENT_DE': 1, 'OE.ACCESS_CONTROL_MANAGE': 1, 'OE.PHYSICAL_ENV_MANAGEMEN': 1, 'OE.ADMIN_CREDENTIALS_SECUR': 1, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICE': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'HMAC': 4, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'Diffie-Hellman': 7, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-384': 1, 'SHA256': 2}}, 'PBKDF': {'PBKDF2': 1}}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 4, 'SSL 2.0': 1, 'SSL 3.0': 2, 'SSL2.0': 1}, 'TLS': {'TLS': 55, 'TLS 1.2': 5, 'TLS 1.1': 4, 'TLS 1.0': 2}, 'DTLS': {'DTLS': 1}}, 'IKE': {'IKE': 24, 'IKEv2': 23, 'IKEv1': 5}, 'IPsec': {'IPsec': 64}, 'VPN': {'VPN': 48}}, 'randomness': {'RNG': {'RNG': 1, 'RBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'CTR': {'CTR': 2}, 'GCM': {'GCM': 3}, 'XTS': {'XTS': 2}}, 'ecc_curve': {'NIST': {'secp256r1': 11, 'secp384r1': 2, 'secp521r1': 2}, 'Brainpool': {'brainpoolP256r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS #1': 1, 'PKCS#12': 3}, 'RFC': {'RFC 2131': 2, 'RFC 6960': 4, 'RFC 4301': 2, 'RFC 4303': 2, 'RFC 4106': 2, 'RFC 4109': 1, 'RFC 4304': 1, 'RFC 4868': 3, 'RFC 7296': 3, 'RFC 5282': 2, 'RFC 4945': 2, 'RFC 5246': 4, 'RFC 4346': 2, 'RFC 6125': 2, 'RFC 5280': 5, 'RFC 5759': 2, 'RFC 2986': 2, 'RFC5289': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 9797-': 3, 'ISO/IEC 18031:2011': 4}, 'X509': {'X.509': 12}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Out of scope': 1, 'of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. The Mistral Management Center device': 1, 'System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9 MISTRAL VS9 IPSEC GATEWAY SOFTWARE DUAL USE': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2025/06': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2025_06fr.pdf.
    • The st_filename property was set to ANSSI-Cible-CC-2025_06en.pdf.
    • The cert_filename property was set to Certificat-ANSSI-CC-2025_06fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2025/06.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]} values added.
  • 24.02.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_06fr.pdf",
  "dgst": "d8b3b6188c1ed69c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2025/06",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.2.3.5"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Thales",
  "manufacturer_web": null,
  "name": "MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 \u0026 IP9010) (ANSSI-CC-2025/06)",
  "not_valid_after": "2030-02-12",
  "not_valid_before": "2025-02-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-ANSSI-CC-2025_06fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2025/06": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20250213160255+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20250213160309+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 143188,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2025_06fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2025/06": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL4": 3
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "OPPIDA": {
          "OPPIDA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20250213160052+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20250213160310+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 329723,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]",
          "http://www.commoncriteriaportal.org/",
          "http://www.sogis.eu/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 12
    },
    "st_filename": "ANSSI-Cible-CC-2025_06en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 7
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-01": 1,
          "CC-02": 2,
          "CC-03": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.ACCESS_CONTROL_MANAGEMENT_DEVICES": 1,
          "A.ADMINISTRATION_NETWORK": 1,
          "A.ADMIN_CREDENTIALS_SECURE": 1,
          "A.ALARM": 1,
          "A.AUDIT": 2,
          "A.BIOS_PASSWORD": 2,
          "A.DATA_TRANSPORTATION": 2,
          "A.EXTERNAL_KEYS": 1,
          "A.LIMITED_FUNCTIONALITY": 2,
          "A.NO_THRU_TRAFFIC_PROTECTION": 1,
          "A.PERSISTENT_ASSETS_PROTECTION": 2,
          "A.PHYSICAL_ENV_MANAGEMENT_DEVIC": 1,
          "A.PHYSICAL_ENV_MANAGEMENT_DEVICES": 1,
          "A.PHYSICAL_PROTECTION": 1,
          "A.POLICIES_CONTINUITY": 2,
          "A.REGULAR_UPDATES": 2,
          "A.SECURED_MANAGEMENT_DEVICES": 2,
          "A.SENSITIVE_DATA_ERASURE": 1,
          "A.SS_MMC_TO_TOE": 1,
          "A.TRUSTED_ADMINISTRATOR": 2
        },
        "O": {
          "O.AUDIT": 15,
          "O.AUDIT_PROTECTION": 5,
          "O.AUTHENTICATION_FAILURE": 10,
          "O.BOOT_CONTROL": 5,
          "O.CERTIFICATE_INJECTION": 4,
          "O.CRYPTO_PERIOD": 9,
          "O.CRYPTO_REGULATION": 7,
          "O.DATA_ERASURE": 9,
          "O.DISPLAY_BANNER": 6,
          "O.LOCAL_DATA_PROTECTION": 15,
          "O.MANAGEMENT": 7,
          "O.POL_DEFAULT": 13,
          "O.POL_FILTERING": 8,
          "O.PROTECTED_COMMUNICATION": 3,
          "O.PROTECTED_COMMUNICATIONS": 13,
          "O.RESIDUAL_INFORMATION_CLEA": 1,
          "O.RESIDUAL_INFORMATION_CLEAR": 4,
          "O.ROLES": 12,
          "O.SELF_TEST": 12,
          "O.SESSION_LOCK": 4,
          "O.SOFTWARE_UPDATES": 9,
          "O.SUPERVISION": 6,
          "O.SUPERVISION_IMPACT": 9,
          "O.TIME_BASE": 4,
          "O.TOE_REDUNDANCY": 4,
          "O.VIEW_RULES": 12
        },
        "OE": {
          "OE.ACCESS_CONTROL_MANAGE": 1,
          "OE.ACCESS_CONTROL_MANAGEMENT_DEVICE": 2,
          "OE.ACCESS_CONTROL_MANAGEMENT_DEVICES": 3,
          "OE.ADMIN_CREDENTIALS_SECUR": 1,
          "OE.ADMIN_CREDENTIALS_SECURE": 3,
          "OE.ALARM": 3,
          "OE.AUDIT": 2,
          "OE.AUDIT_RECORD": 3,
          "OE.BIOS_PASSWORD": 2,
          "OE.DATA_TRANSPORTATION": 5,
          "OE.EXTERNAL_KEYS": 2,
          "OE.LMGT_CONNECTION": 5,
          "OE.NO_GENERAL_PURPOSE": 2,
          "OE.NO_THRU_TRAFFIC_PROTECTION": 2,
          "OE.PHYSICAL": 2,
          "OE.PHYSICAL_ENV_MANAGEMEN": 1,
          "OE.PHYSICAL_ENV_MANAGEMENT_DEVICES": 4,
          "OE.POLICIES_CONTINUITY": 2,
          "OE.SECURED_MANAGEMENT_DE": 1,
          "OE.SECURED_MANAGEMENT_DEVICES": 4,
          "OE.SECURE_PERSISTENT_ASSET": 2,
          "OE.SS_MMC_TO_TOE": 5,
          "OE.TIME_TOE": 3,
          "OE.TOE_DATA_ERASURE": 5,
          "OE.TOE_INTEGRITY": 7,
          "OE.TOE_PRODUCTION": 3,
          "OE.TRUSTED_ADMIN": 3,
          "OE.UPDATES": 4
        },
        "T": {
          "T.MISUSE": 5,
          "T.PASSWORD_CRACKING": 5,
          "T.RESIDUAL_DATA": 5,
          "T.SECURITY_FUNCTIONALITY": 2,
          "T.SECURITY_FUNCTIONALITY_COMPROMISE": 3,
          "T.SECURITY_FUNCTIONALITY_FAILURE": 3,
          "T.TIME_BASE": 3,
          "T.TOE_CAPTURE": 5,
          "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 3,
          "T.UNDETECTED_ACTIVITY": 5,
          "T.UNTRUSTED_COMMUNICATI": 2,
          "T.UNTRUSTED_COMMUNICATION_CHANNELS": 3,
          "T.UPDATE_COMPROMISE": 5,
          "T.USER_DATA_REUSE": 3,
          "T.WEAK_AUTHENTICATION_EN": 2,
          "T.WEAK_AUTHENTICATION_ENDPOINTS": 3,
          "T.WEAK_CRYPTOGRAPHY": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 10,
          "ADV_IMP.1": 5,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 5
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 3,
          "ALC_FLR.3": 7,
          "ALC_LCD.1": 4,
          "ALC_TAT.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 5,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 4,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 1,
          "EAL4": 4,
          "EAL4 augmented": 2,
          "EAL4+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 16,
          "FAU_GEN.1": 14,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_STG": 6,
          "FAU_STG.1": 1,
          "FAU_STG.3": 1,
          "FAU_STG_EXT": 10,
          "FAU_STG_EXT.1": 13,
          "FAU_STG_EXT.1.1": 2,
          "FAU_STG_EXT.1.2": 2,
          "FAU_STG_EXT.1.3": 4,
          "FAU_STG_EXT.2": 2
        },
        "FCO": {
          "FCO_CPC_EXT": 14,
          "FCO_CPC_EXT.1": 12,
          "FCO_CPC_EXT.1.1": 2,
          "FCO_CPC_EXT.1.2": 2,
          "FCO_CPC_EXT.1.3": 2
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 54,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 13,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 26,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXT": 13,
          "FCS_CKM_EXT.5": 17,
          "FCS_CKM_EXT.5.1": 1,
          "FCS_CKM_EXT.5.2": 1,
          "FCS_CKM_EXT.5.3": 1,
          "FCS_COP": 120,
          "FCS_COP.1": 21,
          "FCS_RBG_EXT": 2,
          "FCS_RBG_EXT.1": 21,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 2,
          "FCS_TLSC_EXT": 4,
          "FCS_TLSC_EXT.1": 1,
          "FCS_TLSC_EXT.2": 10,
          "FCS_TLSC_EXT.2.1": 2,
          "FCS_TLSC_EXT.2.2": 2,
          "FCS_TLSC_EXT.2.3": 2,
          "FCS_TLSC_EXT.2.4": 2,
          "FCS_TLSC_EXT.2.5": 2,
          "FCS_TLSS_EXT": 4,
          "FCS_TLSS_EXT.2": 6,
          "FCS_TLSS_EXT.2.1": 2,
          "FCS_TLSS_EXT.2.2": 2,
          "FCS_TLSS_EXT.2.3": 2,
          "FCS_TLSS_EXT.2.4": 2,
          "FCS_TLSS_EXT.2.5": 2,
          "FCS_TLSS_EXT.2.6": 2
        },
        "FDP": {
          "FDP_ACC.1": 11,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 5,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ETC": 6,
          "FDP_ETC.2": 4,
          "FDP_IFC": 19,
          "FDP_IFC.1": 9,
          "FDP_IFF": 16,
          "FDP_IFF.1": 14,
          "FDP_ITC": 13,
          "FDP_ITC.1": 19,
          "FDP_ITC.2": 29,
          "FDP_RIP.2": 5,
          "FDP_RIP.2.1": 1,
          "FDP_UCT.1": 8,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 10,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PMG_EXT": 2,
          "FIA_PMG_EXT.1": 9,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_UAU.1": 2,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 7,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT": 2,
          "FIA_UAU_EXT.2": 10,
          "FIA_UAU_EXT.2.1": 2,
          "FIA_UIA": 1,
          "FIA_UIA_EXT": 4,
          "FIA_UIA_EXT.1": 14,
          "FIA_UIA_EXT.1.1": 2,
          "FIA_UIA_EXT.1.2": 2,
          "FIA_UID.1": 5,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 10,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 16,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 4,
          "FMT_SMR.2": 7,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 2,
          "FPT_APW_EXT.1": 10,
          "FPT_APW_EXT.1.1": 2,
          "FPT_APW_EXT.1.2": 2,
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_PTD": 1,
          "FPT_RCV.1": 5,
          "FPT_RCV.1.1": 1,
          "FPT_RCV.2": 5,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_SDP_EXT": 3,
          "FPT_SDP_EXT.2": 10,
          "FPT_SDP_EXT.2.1": 2,
          "FPT_SDP_EXT.2.2": 2,
          "FPT_SKP_EXT": 2,
          "FPT_SKP_EXT.1": 9,
          "FPT_SKP_EXT.1.1": 3,
          "FPT_STM": 2,
          "FPT_STM.1": 1,
          "FPT_STM_EXT": 2,
          "FPT_STM_EXT.1": 16,
          "FPT_STM_EXT.1.1": 2,
          "FPT_STM_EXT.1.2": 2,
          "FPT_TDC": 11,
          "FPT_TDC.1": 7,
          "FPT_TST_EXT": 2,
          "FPT_TST_EXT.1": 9,
          "FPT_TST_EXT.1.1": 2,
          "FPT_TUD_EXT": 2,
          "FPT_TUD_EXT.1": 10,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 6,
          "FTA_SSL.4.1": 1,
          "FTA_SSL_EXT": 3,
          "FTA_SSL_EXT.1": 11,
          "FTA_SSL_EXT.1.1": 2,
          "FTA_TAB.1": 8,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 18,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 10,
          "FTP_TRP.1": 11
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Out of scope": 1,
          "System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9 MISTRAL VS9 IPSEC GATEWAY SOFTWARE DUAL USE": 1,
          "of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. The Mistral Management Center device": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CTR": {
          "CTR": 2
        },
        "GCM": {
          "GCM": 3
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 24,
          "IKEv1": 5,
          "IKEv2": 23
        },
        "IPsec": {
          "IPsec": 64
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "DTLS": {
            "DTLS": 1
          },
          "SSL": {
            "SSL": 4,
            "SSL 2.0": 1,
            "SSL 3.0": 2,
            "SSL2.0": 1
          },
          "TLS": {
            "TLS": 55,
            "TLS 1.0": 2,
            "TLS 1.1": 4,
            "TLS 1.2": 5
          }
        },
        "VPN": {
          "VPN": 48
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 2
        },
        "NIST": {
          "secp256r1": 11,
          "secp384r1": 2,
          "secp521r1": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "PBKDF": {
          "PBKDF2": 1
        },
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 18031:2011": 4,
          "ISO/IEC 9796-2": 1,
          "ISO/IEC 9797-": 3
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#12": 3
        },
        "RFC": {
          "RFC 2131": 2,
          "RFC 2986": 2,
          "RFC 4106": 2,
          "RFC 4109": 1,
          "RFC 4301": 2,
          "RFC 4303": 2,
          "RFC 4304": 1,
          "RFC 4346": 2,
          "RFC 4868": 3,
          "RFC 4945": 2,
          "RFC 5246": 4,
          "RFC 5280": 5,
          "RFC 5282": 2,
          "RFC 5759": 2,
          "RFC 6125": 2,
          "RFC 6960": 4,
          "RFC 7296": 3,
          "RFC5289": 2
        },
        "X509": {
          "X.509": 12
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 4,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "ERIC AUGE",
      "/CreationDate": "D:20250128123410+01\u002700\u0027",
      "/ModDate": "D:20250128123410+01\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "Microsoft Word - ST_lite_GATEWAY_IPSEC_MISTRAL_VS9_63535113lite-306_AF",
      "pdf_file_size_bytes": 2522320,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 134
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_06fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_06en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4e9d19cb9f411dce35f21e53da63e7aeb24b139107d08541d12fedf4aa56476e",
      "txt_hash": "ace08c18935d62fbbbe1eac0d13e15319745b062b1e3442f9b0d5517da076d19"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bfd980948c78b74eb135363b74b00118ace027b9ae591f74fe0d050baeb52778",
      "txt_hash": "688ae3e99c216fdebfd4e09b761c08ae72ac64f00c564dfb617ac75ecfd48949"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b3436633f5fefdb1ed351d7e08fa312262f9d0faee23e15dbe5bf75b841e046c",
      "txt_hash": "59d4054ff0856083e7b22ff0d999b20cf51eef44fb948035fc399f69f5ddec68"
    }
  },
  "status": "active"
}