{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185c_pdf.pdf",
"dgst": "34fd0553bb4a99ab",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1185-2023",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.1.0",
"5.1.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1146-2022"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1146-2022"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "SYSGO GmbH",
"manufacturer_web": "https://www.SYSGO.com",
"name": "PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0",
"not_valid_after": "2028-09-17",
"not_valid_before": "2023-09-18",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1185c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1185-2023": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP.2": 1
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5": 2,
"EAL 5 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel",
"/Title": "Certificate BSI-DSZ-CC-1185-2023",
"pdf_file_size_bytes": 337655,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1185a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5 valid until: 17 September 2028",
"cc_version": "Product specific Security Target Common Criteria Part 2 conformant",
"cert_id": "BSI-DSZ-CC-1185-2023",
"cert_item": "PikeOS Separation Kernel v5.1.3 for the NXP LS 1023A/LS1043A Processor, Version 3.1.0",
"cert_lab": "BSI",
"developer": "SYSGO GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1146-2022": 2,
"BSI-DSZ-CC-1185-2023": 15
},
"NL": {
"CC-1146-2022": 1
}
},
"cc_claims": {
"OE": {
"OE.EXCLUSIVE_RESOURCES": 1,
"OE.HARDWARE": 1,
"OE.PHYSICAL": 1,
"OE.PRIVILEGED_EXECUTABLES": 1,
"OE.TRUSTWORTHY_PERSONNEL": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.5": 1,
"ADV_IMP.2": 5,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"ALC": {
"ALC_CMC.5": 5,
"ALC_CMS.5": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 3,
"ALC_FLR.3": 5,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_DPT.3": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 4,
"EAL 5": 7,
"EAL 5 augmented": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 4, 2023-08-30, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE (Master Document List), 2023-07-27, 20069-0000- MDL.xlsx, Sysgo": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"confidential document) [9] Guidance documentation for the TOE, see table 2 in chapter 2 7 specifically \u2022 AIS 32, Version": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 2,
"AIS 38": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {
"AMD": {
"PSP": 8
}
},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 11
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, SYSGO SAS, PikeOS, Separation Kernel",
"/Title": "Certification Report BSI-DSZ-CC-1185-2023",
"pdf_file_size_bytes": 509913,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1185b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.EXCLUSIVE_RESOURCES": 4,
"A.HARDWARE": 4,
"A.PHYSICAL": 4,
"A.PRIVILEGED_EXECUTABLES": 5,
"A.TRUSTWORTHY_PERSONNEL": 4
},
"OE": {
"OE.EXCLUSIVE_RESOURCES": 3,
"OE.HARDWARE": 2,
"OE.PHYSICAL": 2,
"OE.PRIVILEGED_EXECUTABLES": 3,
"OE.TRUSTWORTHY_PERSONNEL": 3
},
"OT": {
"OT.API_PROTECTION": 4,
"OT.CONFIDENTIALITY": 6,
"OT.INTEGRITY": 4,
"OT.RESOURCE_AVAILABILITY": 6
},
"T": {
"T.DEPLETION": 4,
"T.DISCLOSURE": 4,
"T.EXECUTION": 4,
"T.MODIFICATION": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 4,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.5": 4,
"ALC_DVS.2": 5,
"ALC_FLR.3": 4,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_DPT.1": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 5,
"EAL 5 augmented": 2,
"EAL 5+": 1,
"EAL5": 3
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 32,
"FDP_ACC.2": 12,
"FDP_ACF": 34,
"FDP_ACF.1": 27,
"FDP_IFC.2": 8,
"FDP_IFF.1": 11
},
"FIA": {
"FIA_UID.2": 6
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 2,
"FMT_MTD": 12,
"FMT_MTD.1": 3,
"FMT_SMF.1": 5,
"FMT_SMR.1": 7
},
"FRU": {
"FRU_RSA": 10,
"FRU_RSA.2": 5
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"AMD": {
"PSP": 27
}
},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 71
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Guillaume Fumaroli",
"/Keywords": "operating system, separation kernel, MILS, multiple independent levels of security, virtualization, hypervisor, embedded, BSI-VS-AP-0015-2019, qualification renforc\u00e9",
"/Subject": "",
"/Title": "Security Target for the PikeOS Separation Kernel v5.1.3 for the NXP LS1023A/LS1043A Processor",
"pdf_file_size_bytes": 897440,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sysgo.com",
"mailto:[email protected]",
"mailto:[email protected]",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 59
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5",
"ALC_FLR.3",
"ADV_IMP.2",
"AVA_VAN.5",
"ALC_CMC.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1185b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7aab71a9965001df03e6ab353c77774979c260b215c388e90c45b93bc2d6bb53",
"txt_hash": "0e8963f498187d19017613c9ee5b64a9f948498c8a647b70bd15d8c9ff0a9f19"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4b7787f075925db72862923c8d8add72cc8c696c73f20d2d9c087de348ebe7e1",
"txt_hash": "ac2d6cda8dae87853844014abc3bcbfab66e26a2603d78e2d1c4554d22a2764d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2c136d2dc8ae3acc46dd11150fa4649b76b74e4c731a4c6ca28f805a701c02b1",
"txt_hash": "8626ebe4ca8d75a85e90669032fa46c0894e9dbe4bd3024ec5399b935e342da4"
}
},
"status": "active"
}