{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2c_pdf.pdf",
"dgst": "1168d0d6a313f497",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1041-V2-2022",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.2.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1041-2018"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1041-2018"
]
}
},
"scheme_data": {
"category": "Operating systems",
"cert_id": "BSI-DSZ-CC-1041-V2-2022",
"certification_date": "2022-03-07",
"enhanced": {
"applicant": "SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim",
"assurance_level": "EAL3,ALC_FLR.3",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2022-03-07",
"description": "The TOE is the PikeOS Separation Kernel version 4.2.2 running on the microprocessor family (x86 64-bit, ARMv7, or ARMv8) hosting different applications. The TOE is referenced as PikeOS 4.2.2 base product build S5400 for Linux and Windows development host with PikeOS 4.2.2 Certification Kit build S5400.",
"entries": [
{
"description": "is referenced as PikeOS 4.2.4 base product build S6120 for Linux and Windows development host with PikeOS 4.2.4 Certification Kit build S6120.",
"id": "BSI-DSZ-CC-1041-V2-2022"
},
{
"description": "Security Target",
"id": "BSI-DSZ-CC-1041-2018-MA-01 (18.03.2019)"
},
{
"description": "Build",
"id": "BSI-DSZ-CC-1041-2018 (Ausstellungsdatum / Certification Date 10.12.2018, g\u00fcltig bis / valid until 09.12.2023) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificat"
}
],
"evaluation_facility": "atsec information security GmbH",
"expiration_date": "2027-03-06",
"product": "PikeOS Separation Kernel, 4.2.4",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2b_pdf.pdf?__blob=publicationFile\u0026v=3"
},
"product": "PikeOS Separation Kernel, 4.2.4",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1041_1041V2.html",
"vendor": "SYSGO GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SYSGO GmbH",
"manufacturer_web": "https://www.SYSGO.com",
"name": "PikeOS Separation Kernel, 4.2.4",
"not_valid_after": "2027-03-07",
"not_valid_before": "2022-03-07",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1041V2c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1041-V2-2022": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1,
"EAL 3 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20220311124753+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, BSI-DSZ-CC-1041-V2\"",
"/ModDate": "D:20220311214111+01\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 4.2.4",
"/Title": "Certification Report BSI-DSZ-CC-1041-v2-2022",
"pdf_file_size_bytes": 245703,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1041V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ALC_FLR.3",
"cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1041-V2-2022",
"cert_item": "PikeOS Separation Kernel 4.2.4",
"cert_lab": "BSI",
"developer": "SYSGO GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1041-2018": 3,
"BSI-DSZ-CC-1041-V2-2022": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1,
"ADV_IMP": 1
},
"ALC": {
"ALC_FLR": 3,
"ALC_FLR.3": 4
},
"ATE": {
"ATE_IND": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 3": 4,
"EAL 3 augmented": 3,
"EAL 4": 1,
"EAL3+": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 4, 17.02.2022, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 25.01.2022, Master Document List, 16162-9101- MDL.xlsx": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 38": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {
"AMD": {
"PSP": 5
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20220311124935+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, BSI-DSZ-CC-1041-V2\"",
"/ModDate": "D:20220314065024+01\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 4.2.4",
"/Title": "Certification Report BSI-DSZ-CC-1041-v2-2022",
"pdf_file_size_bytes": 387582,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"http://www.commoncriteriaportal.org/cc/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "1041V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.EXCLUSIVE_RESOURCES": 4,
"A.HARDWARE": 3,
"A.PHYSICAL": 4,
"A.PRIVILEGED_EXECUTABLES": 4,
"A.TRUSTWORTHY_PERSONNEL": 4
},
"OE": {
"OE.EXCLUSIVE_RESOURCES": 3,
"OE.HARDWARE": 2,
"OE.PHYSICAL": 2,
"OE.PRIVILEGED_EXECUTABLES": 3,
"OE.TRUSTWORTHY_PERSONNEL": 3
},
"OT": {
"OT.API_PROTECTION": 4,
"OT.CONFIDENTIALITY": 7,
"OT.INTEGRITY": 4,
"OT.RESOURCE_AVAILABILITY": 7
},
"T": {
"T.DEPLETION": 4,
"T.DISCLOSURE": 4,
"T.EXECUTION": 4,
"T.MODIFICATION": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 4
},
"AVA": {
"AVA_VAN.2": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 6,
"EAL 3 augmented": 2,
"EAL 3+": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 31,
"FDP_ACC.2": 13,
"FDP_ACF": 31,
"FDP_ACF.1": 28,
"FDP_IFC.2": 8,
"FDP_IFF.1": 11
},
"FIA": {
"FIA_UID.2": 6
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 2,
"FMT_MTD": 12,
"FMT_MTD.1": 3,
"FMT_SMF.1": 5,
"FMT_SMR.1": 7
},
"FRU": {
"FRU_RSA": 10,
"FRU_RSA.2": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"AMD": {
"PSP": 32
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Dominic Eschweiler / Andreas Paukert",
"/BuildID": "S6120",
"/Company": "",
"/CreationDate": "D:20220126153000+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 15 for Word",
"/DOORS-Baseline": "N.A.",
"/DocID": "00101-8000-ST",
"/Keywords": "",
"/ModDate": "D:20220126153008+01\u002700\u0027",
"/Producer": "Adobe PDF Library 15.0",
"/Revision": "20.12",
"/SourceModified": "D:20220126142947",
"/Status": "App",
"/Subject": "PikeOS Separation Kernel v4.2.4",
"/SupplierCode": "N.A.",
"/TemplateAuthor": "HJT",
"/TemplateDate": "2012-09-10",
"/TemplateID": "00014-9102-BOOK_ENG",
"/TemplateRevision": "01.3",
"/Title": "Security Target",
"/Ziel": "4.2.4",
"pdf_file_size_bytes": 465508,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"EAL3+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "55c8a6b06caa6ab08d8a6799d57100518efd8aa4ae6f27ca138c31a61024d7b1",
"txt_hash": "242c9542c9020a2fdd61a1cce04bb22dbbe84cf335b2e431759585c4745cb81f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "b771c3ff5432b400c34aa8c58f641cf5692a05c6f334823a2811861b1164f946",
"txt_hash": "8e0c87716a6f687002657fb56195a505295a1bed06b0485736b1c9bffe3c9555"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "6316210dce040bd79f1ac95a56f45220341344d60a3b33cf5105db3467980de2",
"txt_hash": "3bec919018a908477f9e511e295da10bc5e7bc87085460fd76ab58b8f69c456a"
}
},
"status": "active"
}