DiamondTEK (DiamondCentral NSC (also sold as CC200) Application S/W Version 2.4.0.5, NSD-Prime F/W Version 2.4.0.3; and NSD (DiamondLink (also sold as CL100), DiamondPak (also sold as CP102, CP104, CP106), Diamond VPN (also sold as CV100); DiamondSAT

CSV information ?

Status archived
Valid from 01.12.2005
Valid until 07.09.2012
Scheme 🇺🇸 US
Manufacturer Cryptek Inc.
Category Other Devices and Systems
Security level EAL4

Heuristics summary ?

Certificate ID: CCEVS-VR-0139-2005

Certificate ?

Certification report ?

Extracted keywords

Protocols
IPsec, VPN

Vendor
Oberthur

Security level
EAL4, EAL 4
Certificates
CCEVS-VR-05-0139

Standards
FIPS 188, RFC 2401, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Validation Report for Trend Micro VirusWall
Author Franklin Haskell and Kathleen Cunningham
Creation date D:20060130142016-05'00'
Modification date D:20060130142549-05'00'
Pages 37
Creator Acrobat PDFMaker 5.0 for Word
Producer Acrobat Distiller 5.0.5 (Windows)

Frontpage

Certificate ID CCEVS-VR-05-0139
Certified item Cryptek, Inc. • Sterling, VA DiamondTEK™ 2.4
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
DES, 3DES
Asymmetric Algorithms
Diffie-Hellman
Hash functions
SHA-1
Schemes
Key Exchange
Protocols
IKE, IPsec, VPN

Vendor
Oberthur

Security level
EAL 4, EAL4
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_HLD.1, ADV_FSP, ADV_HLD, ADV_LLD, ADV_IMP, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM.2, FDP_ACC.1, FDP_IFC.1, FDP_IFF.1, FDP_IFF.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_IFF.2.1, FDP_IFF.2.2, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_IFF.2.7, FDP_ITC.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1, FIA_UAU.1, FIA_UAU, FMT_MOF.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1, FPT_STM.1.1

Side-channel analysis
physical tampering

Standards
FIPS 188, FIPS 140-2, FIPS 46-3, FIPS 180-1, RFC 2401, RFC 2406, RFC 2409, ISO/IEC 15408, ISO/IEC 15408-2, ISO/IEC 15408-3

File metadata

Title DiamondTEK Security Target
Author James Arnold
Creation date D:20060130142756-05'00'
Modification date D:20060130143606-05'00'
Pages 71
Creator Acrobat PDFMaker 5.0 for Word
Producer Acrobat Distiller 5.0.5 (Windows)

Heuristics ?

Certificate ID: CCEVS-VR-0139-2005

Extracted SARs

ATE_DPT.1, ALC_LCD.1, ADV_FSP.2, ADV_HLD.2, ALC_TAT.1, ADV_SPM.1, AVA_VLA.2, ATE_IND.2, ADV_LLD.1, AGD_USR.1, ADV_IMP.1, ALC_DVS.1, ADV_RCR.1, ATE_COV.2, AGD_ADM.1, AVA_SOF.1, ATE_FUN.1, AVA_MSU.2

Similar certificates

Name Certificate ID
Cryptek Inc. DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD (DiamondLink, DiamondPak, DiamondVPN, DiamondSAT, DiamondUTC) F/W version 2.4.0.3) 04, CP 106), Diamond VPN (also sold as CV100); DiamondSAT CCEVS-VR-0054-2006 Compare
DiamondTEK Product (DiamondCentral: NSC Application S/W version 2.0.1; NSD-Prime F/W version 2.1.4) and NSD (DiamondLink, DiamondPak, DiamondVPN) F/W version 2.1.4 CCEVS-VR-0021-2002 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) ANSSI-CC-2020/65v2 Compare
eEye Retina Enterprise Suite, comprising the following eEye components: Retina Network Security Scanner Version 5.4.21.53, REM version 3.0.2.571, and REM Events Server version 2.2.0.194 CCEVS-VR-0043-2007 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
McAfee Threat Intelligence Exchange 2.0.0 and Data Exchange Layer 3.0.0 with ePolicy Orchestrator 5.3.2 383-4-396 Compare
Showing 5 out of 7.

Scheme data ?

Product Cryptek, Inc., DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD (DiamondLink, DiamondPak, DiamondVPN, DiamondSAT, DiamondUTC) F/W version 2.4.0.3) 04, CP106), Diamond VPN (also sold as CV100); DiamondSAT
Id CCEVS-VR-VID4043
Url https://www.niap-ccevs.org/product/4043
Certification Date 2005-12-30T00:12:00Z
Expiration Date None
Category Firewall, Guard, Multiple Domain Solution, Network Management, Sensitive Data Protection, System Access Control, Virtual Private Network, Wireless Monitoring
Vendor Cryptek, Inc.
Evaluation Facility Leidos Common Criteria Testing Laboratory
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '651f06cad3c56531d3525cee83f4a59be7407ad6955e43790e9e1147449c8017', 'txt_hash': '5ab3fcfedfa1ed40798b1e1a699b04ca613f4a905fd1a32681dd21a231283287'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 975147, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'Franklin Haskell and Kathleen Cunningham', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20060130142549-05'00'", '/Title': 'Validation Report for Trend Micro VirusWall', '/CreationDate': "D:20060130142016-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-05-0139', 'cert_item': 'Cryptek, Inc. • Sterling, VA DiamondTEKâ„¢ 2.4', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-05-0139': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL 4': 7}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Oberthur': {'Oberthur': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'IPsec': {'IPsec': 7}, 'VPN': {'VPN': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 188': 1}, 'RFC': {'RFC 2401': 1}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid4043-vr.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-0139-2005.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4043-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4043-st.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bf672ee4bf454269d0ec06a23799526611aca15ce748c5a10490cfa3e0ef482c', 'txt_hash': '623204b088546f1a24bf23786649f65a73fb205ab3c9d025be830e16210a218a'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1340418, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 71, '/Producer': 'Acrobat Distiller 5.0.5 (Windows)', '/Author': 'James Arnold', '/Creator': 'Acrobat PDFMaker 5.0 for Word', '/ModDate': "D:20060130143606-05'00'", '/Title': 'DiamondTEK Security Target', '/CreationDate': "D:20060130142756-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 6, 'EAL4': 3}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 10, 'ACM_CAP.4': 20, 'ACM_SCP.2': 7}, 'ADO': {'ADO_DEL.2': 11, 'ADO_IGS.1': 9}, 'ADV': {'ADV_FSP.2': 8, 'ADV_HLD.2': 12, 'ADV_IMP.1': 7, 'ADV_LLD.1': 15, 'ADV_RCR.1': 5, 'ADV_SPM.1': 10, 'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_IMP': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM.1': 16, 'AGD_USR.1': 12}, 'ALC': {'ALC_DVS.1': 8, 'ALC_LCD.1': 8, 'ALC_TAT.1': 9}, 'ATE': {'ATE_COV.2': 6, 'ATE_DPT.1': 5, 'ATE_FUN.1': 10, 'ATE_IND.2': 8, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.2': 14, 'AVA_SOF.1': 8, 'AVA_VLA.2': 14}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 6, 'FAU_GEN.1': 13, 'FAU_GEN.2': 6, 'FAU_SAA.1': 6, 'FAU_SAR.1': 8, 'FAU_SAR.2': 6, 'FAU_SAR.3': 6, 'FAU_SEL.1': 5, 'FAU_STG.1': 10, 'FAU_STG.3': 12, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 11, 'FCS_CKM.4': 10, 'FCS_COP.1': 21, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 3, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACC.1': 8, 'FDP_IFC.1': 27, 'FDP_IFF.1': 17, 'FDP_IFF.2': 8, 'FDP_IFC.1.1': 3, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2, 'FDP_IFF.2.1': 1, 'FDP_IFF.2.2': 1, 'FDP_IFF.2.3': 1, 'FDP_IFF.2.4': 1, 'FDP_IFF.2.5': 1, 'FDP_IFF.2.6': 1, 'FDP_IFF.2.7': 1, 'FDP_ITC.1': 4}, 'FIA': {'FIA_AFL.1': 7, 'FIA_ATD.1': 8, 'FIA_UAU.2': 8, 'FIA_UID.2': 6, 'FIA_USB.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.1': 3, 'FIA_UAU.1': 1, 'FIA_UAU': 1}, 'FMT': {'FMT_MOF.1': 8, 'FMT_MSA.2': 13, 'FMT_MSA.1': 22, 'FMT_MSA.3': 20, 'FMT_MTD.1': 11, 'FMT_SMR.1': 14, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 3, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 3, 'FMT_MTD.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF': 2}, 'FPT': {'FPT_ITT.1': 6, 'FPT_RVM.1': 5, 'FPT_SEP.1': 7, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1': 6, 'FPT_STM.1.1': 1}}, 'cc_claims': {}, 'vendor': {'Oberthur': {'Oberthur': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 6}, '3DES': {'3DES': 5}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 3}}, 'crypto_protocol': {'IKE': {'IKE': 1}, 'IPsec': {'IPsec': 7}, 'VPN': {'VPN': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 188': 1, 'FIPS 140-2': 7, 'FIPS 46-3': 3, 'FIPS 180-1': 2}, 'RFC': {'RFC 2401': 1, 'RFC 2406': 1, 'RFC 2409': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 15408-2': 1, 'ISO/IEC 15408-3': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid4043-st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}]}.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name DiamondTEK (DiamondCentral NSC (also sold as CC200) Application S/W Version 2.4.0.5, NSD-Prime F/W Version 2.4.0.3; and NSD (DiamondLink (also sold as CL100), DiamondPak (also sold as CP102, CP104, CP106), Diamond VPN (also sold as CV100); DiamondSAT was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "eed47d240dc3aeb7",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-0139-2005",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.4.0.3",
        "2.4.0.5"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Firewall, Guard, Multiple Domain Solution, Network Management, Sensitive Data Protection, System Access Control, Virtual Private Network, Wireless Monitoring",
      "certification_date": "2005-12-30T00:12:00Z",
      "evaluation_facility": "Leidos Common Criteria Testing Laboratory",
      "expiration_date": null,
      "id": "CCEVS-VR-VID4043",
      "product": "Cryptek, Inc., DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD (DiamondLink, DiamondPak, DiamondVPN, DiamondSAT, DiamondUTC) F/W version 2.4.0.3) 04, CP106), Diamond VPN (also sold as CV100); DiamondSAT ",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/4043",
      "vendor": "Cryptek, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Cryptek Inc.",
  "manufacturer_web": "https://www.cryptek.com",
  "name": "DiamondTEK (DiamondCentral NSC (also sold as CC200) Application S/W Version 2.4.0.5, NSD-Prime F/W Version 2.4.0.3; and NSD (DiamondLink (also sold as CL100), DiamondPak (also sold as CP102, CP104, CP106), Diamond VPN (also sold as CV100); DiamondSAT",
  "not_valid_after": "2012-09-07",
  "not_valid_before": "2005-12-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid4043-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-05-0139",
        "cert_item": "Cryptek, Inc. \u2022 Sterling, VA DiamondTEK\u2122 2.4",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-05-0139": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 4": 7,
          "EAL4": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 7
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "FIPS": {
          "FIPS 188": 1
        },
        "RFC": {
          "RFC 2401": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Oberthur": {
          "Oberthur": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Franklin Haskell and Kathleen Cunningham",
      "/CreationDate": "D:20060130142016-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 for Word",
      "/ModDate": "D:20060130142549-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0.5 (Windows)",
      "/Title": "Validation Report for Trend Micro VirusWall",
      "pdf_file_size_bytes": 975147,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    },
    "st_filename": "st_vid4043-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 10,
          "ACM_CAP.4": 20,
          "ACM_SCP.2": 7
        },
        "ADO": {
          "ADO_DEL.2": 11,
          "ADO_IGS.1": 9
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 8,
          "ADV_HLD": 1,
          "ADV_HLD.1": 2,
          "ADV_HLD.2": 12,
          "ADV_IMP": 1,
          "ADV_IMP.1": 7,
          "ADV_LLD": 1,
          "ADV_LLD.1": 15,
          "ADV_RCR": 1,
          "ADV_RCR.1": 5,
          "ADV_SPM": 1,
          "ADV_SPM.1": 10
        },
        "AGD": {
          "AGD_ADM.1": 16,
          "AGD_USR.1": 12
        },
        "ALC": {
          "ALC_DVS.1": 8,
          "ALC_LCD.1": 8,
          "ALC_TAT.1": 9
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 6,
          "ATE_DPT": 1,
          "ATE_DPT.1": 5,
          "ATE_FUN": 1,
          "ATE_FUN.1": 10,
          "ATE_IND": 1,
          "ATE_IND.2": 8
        },
        "AVA": {
          "AVA_MSU.2": 14,
          "AVA_SOF.1": 8,
          "AVA_VLA.2": 14
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 6,
          "EAL4": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 6,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 13,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1,
          "FAU_SAA.1": 6,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 6,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 5,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 10,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 12
        },
        "FCS": {
          "FCS_CKM.1": 11,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 10,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 21,
          "FCS_COP.1.1": 3
        },
        "FDP": {
          "FDP_ACC.1": 8,
          "FDP_IFC.1": 27,
          "FDP_IFC.1.1": 3,
          "FDP_IFF.1": 17,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 2,
          "FDP_IFF.1.3": 2,
          "FDP_IFF.1.4": 2,
          "FDP_IFF.1.5": 2,
          "FDP_IFF.1.6": 2,
          "FDP_IFF.2": 8,
          "FDP_IFF.2.1": 1,
          "FDP_IFF.2.2": 1,
          "FDP_IFF.2.3": 1,
          "FDP_IFF.2.4": 1,
          "FDP_IFF.2.5": 1,
          "FDP_IFF.2.6": 1,
          "FDP_IFF.2.7": 1,
          "FDP_ITC.1": 4
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 8,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 3,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 6,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 22,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.2": 13,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 20,
          "FMT_MSA.3.1": 3,
          "FMT_MSA.3.2": 3,
          "FMT_MTD.1": 11,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 2,
          "FMT_SMR.1": 14,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT.1": 6,
          "FPT_RVM.1": 5,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 7,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "IPsec": {
          "IPsec": 7
        },
        "VPN": {
          "VPN": 3
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 7,
          "FIPS 180-1": 2,
          "FIPS 188": 1,
          "FIPS 46-3": 3
        },
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 15408-2": 1,
          "ISO/IEC 15408-3": 1
        },
        "RFC": {
          "RFC 2401": 1,
          "RFC 2406": 1,
          "RFC 2409": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 5
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Oberthur": {
          "Oberthur": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "James Arnold",
      "/CreationDate": "D:20060130142756-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 for Word",
      "/ModDate": "D:20060130143606-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0.5 (Windows)",
      "/Title": "DiamondTEK Security Target",
      "pdf_file_size_bytes": 1340418,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 71
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4043-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4043-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "651f06cad3c56531d3525cee83f4a59be7407ad6955e43790e9e1147449c8017",
      "txt_hash": "5ab3fcfedfa1ed40798b1e1a699b04ca613f4a905fd1a32681dd21a231283287"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bf672ee4bf454269d0ec06a23799526611aca15ce748c5a10490cfa3e0ef482c",
      "txt_hash": "623204b088546f1a24bf23786649f65a73fb205ab3c9d025be830e16210a218a"
    }
  },
  "status": "archived"
}