This page was not yet optimized for use on mobile
devices.
PikeOS Separation Kernel, 4.2.4
CSV information
| Status | active |
|---|---|
| Valid from | 07.03.2022 |
| Valid until | 07.03.2027 |
| Scheme | 🇩🇪 DE |
| Manufacturer | SYSGO GmbH |
| Category | Operating Systems |
| Security level | EAL3+, ALC_FLR.3 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1041-V2-2022
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 3, EAL 2, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLRCertificates
BSI-DSZ-CC-1041-V2-2022Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Trusted Execution Environments
PSPSecurity level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 2+, EAL3+, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP, ADV_FSP, ALC_FLR.3, ALC_FLR, ATE_INDCertificates
BSI-DSZ-CC-1041-V2-2022, BSI-DSZ-CC-1041-2018Evaluation facilities
atsecSide-channel analysis
side channelsCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 4, 17.02.2022, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 25.01.2022, Master Document List, 16162-9101- MDL.xlsxStandards
AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-1041-v2-2022 |
|---|---|
| Subject | Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 4.2.4 |
| Keywords | "Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, BSI-DSZ-CC-1041-V2" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20220311124935+01'00' |
| Modification date | D:20220314065024+01'00' |
| Pages | 28 |
| Creator | Writer |
| Producer | LibreOffice 6.3 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1041-V2-2022 |
|---|---|
| Certified item | PikeOS Separation Kernel 4.2.4 |
| Certification lab | BSI |
| Developer | SYSGO GmbH |
References
Outgoing- BSI-DSZ-CC-1041-2018 - archived - PikeOS Separation Kernel 4.2.2
Security target
Extracted keywords
Trusted Execution Environments
PSPSecurity level
EAL 3, EAL 3+, EAL 3 augmentedClaims
T.DISCLOSURE, T.MODIFICATION, T.DEPLETION, T.EXECUTION, A.PRIVILEGED_EXECUTABLES, A.HARDWARE, A.EXCLUSIVE_RESOURCES, A.PHYSICAL, A.TRUSTWORTHY_PERSONNEL, OT.CONFIDENTIALITY, OT.INTEGRITY, OT.RESOURCE_AVAILABILITY, OT.API_PROTECTION, OE.PRIVILEGED_EXECUTABLES, OE.HARDWARE, OE.EXCLUSIVE_RESOURCES, OE.PHYSICAL, OE.TRUSTWORTHY_PERSONNELSecurity Assurance Requirements (SAR)
ALC_FLR.3, AVA_VAN.2Security Functional Requirements (SFR)
FDP_ACF, FDP_ACF.1, FDP_ACC.2, FDP_ACC, FDP_IFC.2, FDP_IFF.1, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MTD, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FRU_RSA, FRU_RSA.2File metadata
| Title | Security Target |
|---|---|
| Subject | PikeOS Separation Kernel v4.2.4 |
| Author | Dominic Eschweiler / Andreas Paukert |
| Creation date | D:20220126153000+01'00' |
| Modification date | D:20220126153008+01'00' |
| Pages | 46 |
| Creator | Acrobat PDFMaker 15 for Word |
| Producer | Adobe PDF Library 15.0 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1041-V2-2022Extracted SARs
ALC_FLR.3, AVA_VAN.2Scheme data
| Cert Id | BSI-DSZ-CC-1041-V2-2022 | |
|---|---|---|
| Product | PikeOS Separation Kernel, 4.2.4 | |
| Vendor | SYSGO GmbH | |
| Certification Date | 07.03.2022 | |
| Category | Operating systems | |
| Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1041_1041V2.html | |
| Enhanced | ||
| Product | PikeOS Separation Kernel, 4.2.4 | |
| Applicant | SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim | |
| Evaluation Facility | atsec information security GmbH | |
| Assurance Level | EAL3,ALC_FLR.3 | |
| Certification Date | 07.03.2022 | |
| Expiration Date | 06.03.2027 | |
| Entries | [frozendict({'id': 'BSI-DSZ-CC-1041-V2-2022', 'description': 'is referenced as PikeOS 4.2.4 base product build S6120 for Linux and Windows development host with PikeOS 4.2.4 Certification Kit build S6120.'}), frozendict({'id': 'BSI-DSZ-CC-1041-2018-MA-01 (18.03.2019)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-1041-2018 (Ausstellungsdatum / Certification Date 10.12.2018, gültig bis / valid until 09.12.2023) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificat', 'description': 'Build'})] | |
| Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2a_pdf.pdf?__blob=publicationFile&v=2 | |
| Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2b_pdf.pdf?__blob=publicationFile&v=3 | |
| Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2c_pdf.pdf?__blob=publicationFile&v=2 | |
| Description | The TOE is the PikeOS Separation Kernel version 4.2.2 running on the microprocessor family (x86 64-bit, ARMv7, or ARMv8) hosting different applications. The TOE is referenced as PikeOS 4.2.2 base product build S5400 for Linux and Windows development host with PikeOS 4.2.2 Certification Kit build S5400. | |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2c_pdf.pdf",
"dgst": "1168d0d6a313f497",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1041-V2-2022",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.2.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1041-2018"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1041-2018"
]
}
},
"scheme_data": {
"category": "Operating systems",
"cert_id": "BSI-DSZ-CC-1041-V2-2022",
"certification_date": "2022-03-07",
"enhanced": {
"applicant": "SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim",
"assurance_level": "EAL3,ALC_FLR.3",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2022-03-07",
"description": "The TOE is the PikeOS Separation Kernel version 4.2.2 running on the microprocessor family (x86 64-bit, ARMv7, or ARMv8) hosting different applications. The TOE is referenced as PikeOS 4.2.2 base product build S5400 for Linux and Windows development host with PikeOS 4.2.2 Certification Kit build S5400.",
"entries": [
{
"description": "is referenced as PikeOS 4.2.4 base product build S6120 for Linux and Windows development host with PikeOS 4.2.4 Certification Kit build S6120.",
"id": "BSI-DSZ-CC-1041-V2-2022"
},
{
"description": "Security Target",
"id": "BSI-DSZ-CC-1041-2018-MA-01 (18.03.2019)"
},
{
"description": "Build",
"id": "BSI-DSZ-CC-1041-2018 (Ausstellungsdatum / Certification Date 10.12.2018, g\u00fcltig bis / valid until 09.12.2023) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificat"
}
],
"evaluation_facility": "atsec information security GmbH",
"expiration_date": "2027-03-06",
"product": "PikeOS Separation Kernel, 4.2.4",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2b_pdf.pdf?__blob=publicationFile\u0026v=3"
},
"product": "PikeOS Separation Kernel, 4.2.4",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1041_1041V2.html",
"vendor": "SYSGO GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SYSGO GmbH",
"manufacturer_web": "https://www.SYSGO.com",
"name": "PikeOS Separation Kernel, 4.2.4",
"not_valid_after": "2027-03-07",
"not_valid_before": "2022-03-07",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1041V2c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1041-V2-2022": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1,
"EAL 3 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1041V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 3 augmented by ALC_FLR.3",
"cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1041-V2-2022",
"cert_item": "PikeOS Separation Kernel 4.2.4",
"cert_lab": "BSI",
"developer": "SYSGO GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1041-2018": 3,
"BSI-DSZ-CC-1041-V2-2022": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1,
"ADV_IMP": 1
},
"ALC": {
"ALC_FLR": 3,
"ALC_FLR.3": 4
},
"ATE": {
"ATE_IND": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 3": 4,
"EAL 3 augmented": 3,
"EAL 4": 1,
"EAL3+": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 4, 17.02.2022, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 25.01.2022, Master Document List, 16162-9101- MDL.xlsx": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 38": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {
"AMD": {
"PSP": 5
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20220311124935+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, BSI-DSZ-CC-1041-V2\"",
"/ModDate": "D:20220314065024+01\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 4.2.4",
"/Title": "Certification Report BSI-DSZ-CC-1041-v2-2022",
"pdf_file_size_bytes": 387582,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/zertifizierungsreporte",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "1041V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.EXCLUSIVE_RESOURCES": 4,
"A.HARDWARE": 3,
"A.PHYSICAL": 4,
"A.PRIVILEGED_EXECUTABLES": 4,
"A.TRUSTWORTHY_PERSONNEL": 4
},
"OE": {
"OE.EXCLUSIVE_RESOURCES": 3,
"OE.HARDWARE": 2,
"OE.PHYSICAL": 2,
"OE.PRIVILEGED_EXECUTABLES": 3,
"OE.TRUSTWORTHY_PERSONNEL": 3
},
"OT": {
"OT.API_PROTECTION": 4,
"OT.CONFIDENTIALITY": 7,
"OT.INTEGRITY": 4,
"OT.RESOURCE_AVAILABILITY": 7
},
"T": {
"T.DEPLETION": 4,
"T.DISCLOSURE": 4,
"T.EXECUTION": 4,
"T.MODIFICATION": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 4
},
"AVA": {
"AVA_VAN.2": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 6,
"EAL 3 augmented": 2,
"EAL 3+": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 31,
"FDP_ACC.2": 13,
"FDP_ACF": 31,
"FDP_ACF.1": 28,
"FDP_IFC.2": 8,
"FDP_IFF.1": 11
},
"FIA": {
"FIA_UID.2": 6
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 2,
"FMT_MTD": 12,
"FMT_MTD.1": 3,
"FMT_SMF.1": 5,
"FMT_SMR.1": 7
},
"FRU": {
"FRU_RSA": 10,
"FRU_RSA.2": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"AMD": {
"PSP": 32
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Dominic Eschweiler / Andreas Paukert",
"/BuildID": "S6120",
"/Company": "",
"/CreationDate": "D:20220126153000+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 15 for Word",
"/DOORS-Baseline": "N.A.",
"/DocID": "00101-8000-ST",
"/Keywords": "",
"/ModDate": "D:20220126153008+01\u002700\u0027",
"/Producer": "Adobe PDF Library 15.0",
"/Revision": "20.12",
"/SourceModified": "D:20220126142947",
"/Status": "App",
"/Subject": "PikeOS Separation Kernel v4.2.4",
"/SupplierCode": "N.A.",
"/TemplateAuthor": "HJT",
"/TemplateDate": "2012-09-10",
"/TemplateID": "00014-9102-BOOK_ENG",
"/TemplateRevision": "01.3",
"/Title": "Security Target",
"/Ziel": "4.2.4",
"pdf_file_size_bytes": 465508,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"EAL3+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "55c8a6b06caa6ab08d8a6799d57100518efd8aa4ae6f27ca138c31a61024d7b1",
"txt_hash": "242c9542c9020a2fdd61a1cce04bb22dbbe84cf335b2e431759585c4745cb81f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "b771c3ff5432b400c34aa8c58f641cf5692a05c6f334823a2811861b1164f946",
"txt_hash": "8e0c87716a6f687002657fb56195a505295a1bed06b0485736b1c9bffe3c9555"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "6316210dce040bd79f1ac95a56f45220341344d60a3b33cf5105db3467980de2",
"txt_hash": "3bec919018a908477f9e511e295da10bc5e7bc87085460fd76ab58b8f69c456a"
}
},
"status": "active"
}