This page was not yet optimized for use on mobile
devices.
IBM z/OS Version 1 Release 10
CSV information
| Status | archived |
|---|---|
| Valid from | 13.08.2009 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | IBM Corporation |
| Category | Operating Systems |
| Security level | EAL4+, ALC_FLR.3 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0534-2009
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES-, AES, RC4, DESSchemes
MAC, Key ExchangeProtocols
SSH, SSL, TLS, IKESecurity level
EAL 4, EAL 1, EAL 7, EAL4, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented, EAL4 augmentedClaims
OE.INSTALL, OE.PHYSICAL, OE.CREDEN, OE.HW_SEP, OE.HW_CRYPTO, OE.CLASSIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSCertificates
BSI-DSZ-CC-0534-2009, BSI-DSZ-CC-0459-2008, BSI-DSZ-CC-0534Evaluation facilities
atsecCertification process
Evaluation Technical Report BSI-DSZ-CC-0534, Version 3, 30.06.09, atsec information security GmbH (confidential document) [9] MLSGUIDE z/OS Planning for Multilevel Security and the Common Criteria, Version GA22-7509-08Standards
PKCS#11, AIS 1, AIS 14, AIS 19, AIS 23, AIS 32, RFC 4217, X.509Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-DSZ-CC-0534-2009 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Zertifzierung, Certification, CC, Common Criteria, IBM Corporation, IBM z/OS Version 1 Release 19, Betriebssystems, operating system" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20090903081720+02'00' |
| Modification date | D:20090903102744+02'00' |
| Pages | 58 |
| Creator | Writer |
| Producer | StarOffice 9 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0534-2009 |
|---|---|
| Certified item | IBM z/OS Version 1 Release 10 |
| Certification lab | BSI |
| Developer | IBM Corporation |
References
Outgoing- BSI-DSZ-CC-0459-2008 - archived - IBM z/OS Version 1, Release 9
- BSI-DSZ-CC-0637-2010 - archived - IBM z/OS Version 1 Release 11
Security target
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, AES128, AES256, RC4, DESAsymmetric Algorithms
Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5Schemes
MAC, Key ExchangeProtocols
SSH, SSHv2, SSL, TLS, IKE, IKEv2, IPsec, VPNLibraries
OpenSSL, NSSTLS cipher suites
TLS_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHAVendor
MicrosoftSecurity level
EAL4, EAL3, EAL4 augmentedClaims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.MANDATORY_ACCESS, O.AUDITING, O.RESIDUAL_INFORMATION, O.MANAGE, O.ENFORCEMENT, O.COMPROT, O.ENFORCMENT, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADM, A.COOP, A.CLEARANCE, A.SENSITIVITY, A.PEER, A.CONNECT, A.NO_EVIL_ADMIN, OE.INSTALL, OE.PHYSICAL, OE.CREDEN, OE.HW_SEP, OE.HW_CRYPTO, OE.CLASSIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.3, FAU_STG.4, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.4, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.4, FDP_ETC.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_ACF.1.3, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_IFC.1.1, FDP_IFF.2.1, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.2.1, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FIA_UID, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MTD.1, FMT_REV.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTC.1, FPT_RVM.1, FPT_SEP.1, FPT_AMT.1, FPT_TEE.1, FPT_TEE.1.1, FPT_TDC.1, FPT_STM.1, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TEE, FPT_ITC.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Side-channel analysis
malfunctionStandards
FIPS 46-3, FIPS 197, FIPS 180-2, PKCS#11, PKCS#1, PKCS#7, PKCS#12, RFC 4217, RFC4217, RFC1510, RFC1777, RFC 1777, RFC1778, RFC 1778, RFC1779, RFC 1779, RFC1823, RFC 1823, RFC1964, RFC2052, RFC 2052, RFC 2078, RFC2203, RFC 2203, RFC2222, RFC 2222, RFC2251, RFC 2251, RFC2252, RFC 2252, RFC2253, RFC 2253, RFC2254, RFC 2254, RFC2255, RFC 2255, RFC2256, RFC 2256, RFC2401, RFC2402, RFC2406, RFC2408, RFC2409, RFC2459, RFC 2459, RFC2560, RFC2623, RFC 2623, RFC2744, RFC2829, RFC 2829, RFC2830, RFC 2830, RFC2831, RFC 2831, RFC2849, RFC 2849, RFC3268, RFC 3268, RFC3530, RFC 3530, RFC3602, RFC3692, RFC3961, RFC4301, RFC4302, RFC4303, RFC4304, RFC4305, RFC4308, RFC4835, RFC4251, RFC4252, RFC4253, RFC 1510, RFC 3961, RFC 3962, RFC 4253, RFC 2409, RFC 2406, RFC 3602, RFC 2402, RFC 2404, RFC 2560, X.509, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
| Title | Security Target for IBM z/OS Version 1 Release 10 |
|---|---|
| Subject | z/OS Evaluation |
| Author | Walter Farrell, Helmut Kurth |
| Creation date | D:20090316140319-04'00' |
| Pages | 188 |
| Creator | Writer |
| Producer | OpenOffice.org 3.0 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0534-2009Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Similar certificates
| Name | Certificate ID | |
|---|---|---|
| IBM DB2 Universal Data Base for z/OS Version 8 (DB2 UDB V8) and the IBM z/OS Version 1 Release 6 operating system (z/OS V1R6) | BSI-DSZ-CC-0286-2008 | Compare |
| IBM DB2 Version 9.1 for z/OS Version 1 Release 10 | BSI-DSZ-CC-0622-2012 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "174f8248817bdcb1",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0534-2009",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1",
"10"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0637-2010"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0459-2008"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0875-2015",
"BSI-DSZ-CC-0874-2014",
"OCSI/CERT/ATS/01/2017/RC",
"BSI-DSZ-CC-0948-2017",
"BSI-DSZ-CC-0816-2013",
"BSI-DSZ-CC-0972-2015",
"BSI-DSZ-CC-0701-2011",
"BSI-DSZ-CC-0788-2012",
"BSI-DSZ-CC-1029-2017",
"BSI-DSZ-CC-0637-2010"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0247-2005",
"BSI-DSZ-CC-0304-2006",
"BSI-DSZ-CC-0459-2008",
"BSI-DSZ-CC-0377-2007"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "IBM Corporation",
"manufacturer_web": "https://www.ibm.com",
"name": "IBM z/OS Version 1 Release 10",
"not_valid_after": "2019-09-01",
"not_valid_before": "2009-08-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0534a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0534-2009",
"cert_item": "IBM z/OS Version 1 Release 10",
"cert_lab": "BSI",
"developer": "IBM Corporation",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0459-2008": 3,
"BSI-DSZ-CC-0534": 2,
"BSI-DSZ-CC-0534-2009": 28
}
},
"cc_claims": {
"OE": {
"OE.CLASSIFICATION": 1,
"OE.CREDEN": 1,
"OE.HW_CRYPTO": 1,
"OE.HW_SEP": 1,
"OE.INSTALL": 1,
"OE.PHYSICAL": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 5,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 5,
"EAL 4 augmented": 2,
"EAL 7": 1,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL4 augmented": 1,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Evaluation Technical Report BSI-DSZ-CC-0534, Version 3, 30.06.09, atsec information security GmbH (confidential document) [9] MLSGUIDE z/OS Planning for Multilevel Security and the Common Criteria, Version GA22-7509-08": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 11
},
"TLS": {
"TLS": 8
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 13
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 23": 1,
"AIS 32": 1
},
"PKCS": {
"PKCS#11": 2
},
"RFC": {
"RFC 4217": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2,
"AES-": 1
},
"RC": {
"RC4": 1
}
},
"DES": {
"DES": {
"DES": 4
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20090903081720+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Zertifzierung, Certification, CC, Common Criteria, IBM Corporation, IBM z/OS Version 1 Release 19, Betriebssystems, operating system\"",
"/ModDate": "D:20090903102744+02\u002700\u0027",
"/Producer": "StarOffice 9",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0534-2009",
"pdf_file_size_bytes": 1379048,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.ibm.com/software/shopzseries",
"http://www.bsi.bund.de/",
"http://publibz.boulder.ibm.com/epubs/pdf/dz9zr007.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 58
},
"st_filename": "0534b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 8
},
"DSA": {
"DSA": 19
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CLEARANCE": 3,
"A.CONNECT": 4,
"A.COOP": 4,
"A.LOCATE": 4,
"A.MANAGE": 4,
"A.NO_EVIL_ADM": 1,
"A.NO_EVIL_ADMIN": 2,
"A.PEER": 4,
"A.PROTECT": 3,
"A.SENSITIVITY": 4
},
"O": {
"O.AUDITING": 20,
"O.AUTHORIZATION": 18,
"O.COMPROT": 33,
"O.DISCRETIONARY_ACCESS": 15,
"O.ENFORCEMENT": 12,
"O.ENFORCMENT": 1,
"O.MANAGE": 32,
"O.MANDATORY_ACCESS": 21,
"O.RESIDUAL_INFORMATION": 8
},
"OE": {
"OE.CLASSIFICATION": 6,
"OE.CREDEN": 4,
"OE.HW_CRYPTO": 4,
"OE.HW_SEP": 12,
"OE.INSTALL": 6,
"OE.PHYSICAL": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 7,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 7,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 2,
"EAL4": 6,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 9,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 13,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 12,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 12,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 8,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.2": 1,
"FAU_STG.3": 13,
"FAU_STG.3.1": 1,
"FAU_STG.4": 12,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 44,
"FCS_CKM.1.1": 8,
"FCS_CKM.2": 35,
"FCS_CKM.2.1": 5,
"FCS_CKM.4": 1,
"FCS_COP.1": 50,
"FCS_COP.1.1": 13
},
"FDP": {
"FDP_ACC.1": 11,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 24,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 4,
"FDP_ETC.1": 10,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_ETC.2": 12,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 9,
"FDP_IFC.1.1": 1,
"FDP_IFF.2": 9,
"FDP_IFF.2.1": 1,
"FDP_IFF.2.3": 1,
"FDP_IFF.2.4": 1,
"FDP_IFF.2.5": 1,
"FDP_IFF.2.6": 1,
"FDP_ITC.1": 11,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 9,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_RIP.1": 1,
"FDP_RIP.2": 7,
"FDP_RIP.2.1": 1,
"FDP_UCT.1": 7,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 6,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_ATD.1": 15,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 9,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 6,
"FIA_UAU.7.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 9,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 18,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA.1": 28,
"FMT_MSA.1.1": 2,
"FMT_MSA.2": 7,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 29,
"FMT_MSA.3.1": 4,
"FMT_MSA.3.2": 3,
"FMT_MTC.1": 1,
"FMT_MTD.1": 101,
"FMT_MTD.1.1": 10,
"FMT_REV.1": 29,
"FMT_REV.1.1": 2,
"FMT_REV.1.2": 2,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 14,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 3,
"FPT_ITC.1": 1,
"FPT_RVM.1": 5,
"FPT_SEP.1": 5,
"FPT_STM.1": 8,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TEE": 1,
"FPT_TEE.1": 12,
"FPT_TEE.1.1": 1
},
"FTP": {
"FTP_ITC.1": 12,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 24
},
"OpenSSL": {
"OpenSSL": 3
}
},
"crypto_protocol": {
"IKE": {
"IKE": 15,
"IKEv2": 2
},
"IPsec": {
"IPsec": 7
},
"SSH": {
"SSH": 23,
"SSHv2": 5
},
"TLS": {
"SSL": {
"SSL": 38
},
"TLS": {
"TLS": 21
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 3
},
"MAC": {
"MAC": 32
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 4,
"SHA-256": 5,
"SHA-384": 4,
"SHA-512": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"CC": {
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1,
"CCMB-2007-09-004": 1
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS 197": 1,
"FIPS 46-3": 2
},
"PKCS": {
"PKCS#1": 7,
"PKCS#11": 17,
"PKCS#12": 1,
"PKCS#7": 1
},
"RFC": {
"RFC 1510": 1,
"RFC 1777": 1,
"RFC 1778": 1,
"RFC 1779": 1,
"RFC 1823": 1,
"RFC 2052": 1,
"RFC 2078": 1,
"RFC 2203": 1,
"RFC 2222": 1,
"RFC 2251": 1,
"RFC 2252": 1,
"RFC 2253": 1,
"RFC 2254": 1,
"RFC 2255": 1,
"RFC 2256": 1,
"RFC 2402": 1,
"RFC 2404": 1,
"RFC 2406": 1,
"RFC 2409": 1,
"RFC 2459": 2,
"RFC 2560": 1,
"RFC 2623": 1,
"RFC 2829": 1,
"RFC 2830": 1,
"RFC 2831": 1,
"RFC 2849": 1,
"RFC 3268": 1,
"RFC 3530": 1,
"RFC 3602": 1,
"RFC 3961": 1,
"RFC 3962": 1,
"RFC 4217": 2,
"RFC 4253": 1,
"RFC1510": 1,
"RFC1777": 1,
"RFC1778": 1,
"RFC1779": 1,
"RFC1823": 1,
"RFC1964": 1,
"RFC2052": 1,
"RFC2203": 1,
"RFC2222": 1,
"RFC2251": 1,
"RFC2252": 1,
"RFC2253": 1,
"RFC2254": 1,
"RFC2255": 1,
"RFC2256": 1,
"RFC2401": 1,
"RFC2402": 1,
"RFC2406": 1,
"RFC2408": 2,
"RFC2409": 1,
"RFC2459": 1,
"RFC2560": 1,
"RFC2623": 1,
"RFC2744": 1,
"RFC2829": 1,
"RFC2830": 1,
"RFC2831": 1,
"RFC2849": 1,
"RFC3268": 2,
"RFC3530": 1,
"RFC3602": 1,
"RFC3692": 1,
"RFC3961": 3,
"RFC4217": 2,
"RFC4251": 2,
"RFC4252": 1,
"RFC4253": 8,
"RFC4301": 1,
"RFC4302": 1,
"RFC4303": 1,
"RFC4304": 1,
"RFC4305": 1,
"RFC4308": 1,
"RFC4835": 1
},
"X509": {
"X.509": 8
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 46,
"AES-128": 1,
"AES-256": 1,
"AES128": 3,
"AES256": 2
},
"RC": {
"RC4": 6
}
},
"DES": {
"DES": {
"DES": 67
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_RSA_WITH_RC4_128_SHA": 1
}
},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Walter Farrell, Helmut Kurth",
"/CreationDate": "D:20090316140319-04\u002700\u0027",
"/Creator": "Writer",
"/Producer": "OpenOffice.org 3.0",
"/Subject": "z/OS Evaluation",
"/Title": "Security Target for IBM z/OS Version 1 Release 10",
"pdf_file_size_bytes": 1427013,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"ftp://ftp.rfc-editor.org/in-notes/rfc2401.txt",
"http://www1.es.net/pub/rfcs/rfc4835.txt",
"http://www1.es.net/pub/rfcs/rfc4302.txt",
"http://en.wikipedia.org/wiki/Integrity",
"http://www1.es.net/pub/rfcs/rfc4305.txt",
"http://rfc.net/rfc3602.html",
"http://wp.netscape.com/eng/ssl3/draft302.txt",
"http://niap.bahialab.com/cc-scheme/pp/index.cfm",
"http://www1.es.net/pub/rfcs/rfc4303.txt",
"http://www.sdsusa.com/dictionary/glossAZ/r.htm#racf",
"ftp://ftp.rfc-editor.org/in-notes/rfc2246.txt",
"http://www1.es.net/pub/rfcs/rfc4304.txt",
"http://www1.es.net/pub/rfcs/rfc4308.txt",
"http://rfc.net/rfc2560.html#sX.509",
"http://www1.es.net/pub/rfcs/rfc4301.txt",
"ftp://FTP.system-name.ftp-daemon-name.PORTnnnn/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 188
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0534a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0534b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "bdec15919cef3e41a52a8949ada4fe60d2c0f6601569baf40a089dd679e873c0",
"txt_hash": "0a993f7cc12a4abfb68b8300ae392b1437f4c25bb0157d26caa4b7deb656ed76"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "f712c5ba8c5b3832668347e9821040bd6c72b658f35d13d1de2b306efe7d978b",
"txt_hash": "ccef79cbfe692604cf46de48cc65b5f6d77bcc9178069524bf392ba8ef815d00"
}
},
"status": "archived"
}